<html><body><div style="color:#000; background-color:#fff; font-family:arial, helvetica, sans-serif;font-size:12pt">Apologies if you received multiple copies of this CSS-13 preliminary CFP.<br><div style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><div style="font-family: times new roman, new york, times, serif; font-size: 12pt;"><div id="yiv320106098"><div><div style="color:#000;background-color:#fff;font-family:arial, helvetica, sans-serif;font-size:12pt;"><br>-----------------------------------------------------------------------------------<br>Call for Papers for the 5th International Symposium on<br>Cyberspace Safety and Security (CSS 2013)<br> <br><br>Organizers:<br>Central South University, China<br>National University of Defense Technology, China<br>Hunan University, China<br>Jishou University, China<br><br><br>Technical Co-Sponsorship:<br>Deakin University, Australia<br>Springer Lecture Notes in Computer Science<br>School
of Information Science and Engineering, Central South University, China<br>School of Software, Central South University, China<br><br><br>Venue & Dates:<br>Zhangjiajie, China, November 13-15, 2013<br><br><br>Conference
Website:<br>http://trust.csu.edu.cn/conference/css2013<br> <br><br>Introduction<br><br>A large fraction of the population in the world now spends a great deal of time in cyberspace. Cyberspace has become a critical infrastructure that is embedded in almost all other critical infrastructures and enables every movement of human society. It is thus very much in the public interest to have a safe and secure cyberspace. <br><br>In the past several years, there has been a large number of attacks in cyberspace, such as attacks on the Internet, attacks on embedded/real-time computing and control systems, and attacks on dedicated computing facilities. Many research efforts have been made to achieve cyberspace safety and security, such as blocking and limiting the impact of compromise, enabling accountability, promoting deployment of defense systems, and deterring potential attackers and penalizing attackers. <br><br>In this context, we will focus our
program on cyberspace safety and security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace. The aim of this symposium is to provide a leading edge forum to foster interaction between researchers and developers with the cyberspace safety and security communities, and to give attendees an opportunity to network with experts in this area. The symposium will be a highly focused, professional, high quality, and social event. <br><br>In the past, CSS has been held in Melbourne, Australia (2012), Milan, Italy (2011), Chengdu, China (2009), and Sydney, Australia (2008). <br> <br><br>Scope and Interests <br><br>1. Attack Containment <br>2. Active Defense Techniques and Systems <br>3. Attack Recovery <br>4. Access Control and Trust Management <br>5. Digital Rights Management <br>6. Software and System Assurance <br>7. Intelligent Defense Systems <br>8. Internet
and Network Forensics <br>9. Secure Design and Testing <br>10. Viruses, Worms, and Other Malicious Code <br>11. Security Theory and Tools <br>12. Identity Management and Authentication <br>13. Spam Detection and Prevention <br>14. Security for P2P Systems and Grid Systems <br>15. Security in Web Services and Clouds <br>16. Security for Ad-Hoc and Sensor Networks <br>17. Secure Network Architectures <br>18. Social and Legal Issues in Cyber Security <br>19. Risk Assessment in Cyber Security <br>20. Security in Pervasive and Embedded Systems <br>21. Benchmark, Analysis and Evaluation of Cyber Security <br>22. Security for Large-scale Systems and Critical Infrastructures <br>23. Distributed Intrusion Detection / Prevention Systems <br>24. Implementation, Deployment and Management of Cyber Security <br>25. Denial-of-Service Attacks and Countermeasures <br>26. Emerging Topics Outside the Box <br> <br><br>Submission and Publication Information<br><br>The
accepted papers from this conference will be published by Springer Lecture Notes in Computer Science (EI indexed). Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be clearly presented in English, must not exceed 15 pages (or 20 pages with the over length charge), including tables, figures, references and appendixes, in Springer LNCS Format with Portable Document Format (.pdf). Please submit your paper at https://www.easychair.org/conferences/?conf=css2013.<br><br>Papers will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation. Distinguished papers, after further revisions, will be published in several SCI & EI indexed special issues. The program committee will select two winners for the Best Paper Awards for this conference. Submission of a paper should be
regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the conference to present the work.<br><br><br>Important Dates<br><br>(1) Paper Submission Due: June 15, 2013 <br>(2) Notification of Decision: August 15, 2013<br>(3) Camera-ready Papers Due: September 15, 2013<br> <br><br>Steering Co-Chairs<br><br>Yang Xiang, Deakin University, Australia<br>Wanlei Zhou, Deakin University, Australia<br><br> <br>General Co-Chairs<br><br>Guojun Wang, Central South University, China<br>Vijay Varadharajan, Macquarie University, Australia<br>Gregorio Martinez, University of Murcia, Spain<br> <br><br>Program Co-Chairs<br><br>Indrakshi Ray, Colorado State University, USA<br>Dengguo Feng, Institute of Software,
Chinese Academy of Sciences, China<br>Muttukrishnan Rajarajan, City University, UK<br><br> <br>Workshop Co-Chairs<br><br>Jemal H.Abawajy, Deakin University, Australia<br>Jin-Hee Cho, U.S. Army Research Laboratory, USA<br>Yanjiang Yang, Institute for Infocomm Research, Singapore<br>Yeong-Deok Kim, Woosong University, Korea<br> <br><br>Organizing Co-Chairs<br><br>Zhigang Chen, Central South University, China<br>Zhiying Wang, National University of Defense Technology, China<br>Chengzhong Xu, Hunan University, China<br>Bin Hu, Jishou University, China<br><br> <br>Publicity Co-Chairs<br><br>Peter Mueller, IBM Zurich Research, Switzerland <br>Yulei Wu, Chinese Academy of Sciences, China<br>Scott Fowler, Linkoping University, Sweden<br><br><br>Publication Co-Chairs<br><br>Wang Yang, Central South University, China<br>Zhe Tang, Central South University, China<br><br><br>Finance Co-Chairs<br><br>Guihua Duan, Central South University, China<br>Jin
Zheng, Central South University, China<br><br><br>Local Arrangement Chair<br><br>Guomin Cai, Jishou University, China<br><br> <br>Secretariats<br><br>Fang Qi, Central South University, China<br>Tao Peng, Central South University, China<br><br><br>Webmaster<br><br>Biao Deng, Central South University, China <br><br><br>Contact<br><br>Please email inquiries concerning CSS 2013 to: <br>Prof. Guojun Wang: csgjwang AT gmail DOT com and the conference organizers (css2013zhangjiajie AT gmail DOT com).<br><br>Copyright @ Trusted Computing Institute, CSU<br>http://trust.csu.edu.cn/<br>-----------------------------------------------------------------------------------<div></div></div></div></div><br><br> </div> </div> </div></body></html>