担任DSC2016PC member,欢迎大家投稿。
来源: 刘忆宁/
无业
2780
8
0
2018-04-03

http://dsc2018.nsysu.edu.tw/

The 2018 IEEE Conference on Dependable and Secure Computing

Kaohsiung • Taiwan | December 10—13, 2018


Regular Track: Computer Systems, Networks and Software/Hardware

  • Advanced Persistent Threat (APT)

  • Network Attack and Defense Techniques

  • Botnet and Intrusion Detection

  • Cryptographic Methods and Toolkits

  • Cyber attacks

  • Software Vulnerabilities and Security

  • Database Security and Privacy

  • Embedded Systems and IoT Devices

  • Mobile and Cloud Computing security

  • AI and Big Data Analysis for security

  • Malware Mutation

  • Deep Learning for Attack and Defense

  • Block Chain and Finance Security

  • Security Hardware and Circuits

  • Authentication and Authorization

  • Soft-Error Analysis and Models

  • CAD Algorithms and Tools

  • Electronic Circuits and Systems

  • Fault-Tolerance and Reliability

  • Industrial Design Experiences

  • Noise- and Power-Aware Designs

  • Stochastic Circuits and Systems

  • Temperature-Aware Designs

  • Variable-Latency Designs

 

Experience and Practice

The DSC conference will also include a submission category for experience and practice papers on new findings in the two aforementioned topics. The PC will evaluate a submission to the experience and practice track with the understanding that it predominantly contributes to design knowhow or the extension of the community’s knowledge about how the security protection of known techniques fares in real-world operations. Authors have to submit a 2-page paper along with a supplemental video to demonstrate the implementation and/or the practicability of the work. Topics of interest include, but are not limited to:

  • Attacks on Information Systems and Digital Storage

  • CSIRTs, Incident Analysis and Response

  • Hacking Techniques and Countermeasures

  • Honeypots/Honeynets

  • Malware Analysis and Reversing

  • Mobile Communications Security and Vulnerabilities

  • Newly discovered vulnerabilities

  • Offensive Information Technology

  • Reverse Engineering, Forensics, and Anti-Forensics

  • Spyware, Phishing and Distributed Attacks

  • VLSI/CAD Design Knowhow


登录用户可以查看和发表评论, 请前往  登录 或  注册
SCHOLAT.com 学者网
免责声明 | 关于我们 | 联系我们
联系我们: