Due to more and more Automotive OEMs need network and cyber information security solutions to protect connected and autonomous vehicles from hacker intrusions, the industry need further networking and cooperation. Against that background “(ACSS2018) The 3rd Annual China Automotive Cyber Security Summit 2018”organized by Genesis Resourcing Consulting China will be held on the 25th -26th January 2018 in Shanghai.
ACSS2018 will as always provide networking and cooperation platform for Automotive OEMs, Tier 1s and network and cyber security solutions providers to together explore the latest network vulnerability, Enterprise IT safety, the updated laws and regulations and end-to-end cloud safety etc. hot topics. Automotive technology has always been in the forefront of various innovative applications; Block Chain and Machine Learning and other new technologies will soon be applied to the field of automotive network information security.
ICCSCT 2018 is an opportunity for academics, students, scholars, scientists and engineers from around the world who are involved in the study, management, development and implementation of systems and concepts to combat information warfare or to improve information systems security & connected technologies to come together and exchange ideas. This conference is trying to establish itself as a key event for the understanding of threats and risks to information systems, the development of a strong security culture, and incident investigation.
Please consider submitting to this conference. We are interested in the entire range of concepts from theory to practice, including case studies, works-in-progress, and conceptual explorations.
Prospective authors are invited to submit original technical papers by the deadline for publication in the ICCSCT 2018 Conference Proceedings and for presentation(s) in the symposia listed below. Deadlines will be strictly matched and late papers will be summarily rejected. The conference welcomes papers on the following (but not limited to) research topics.
In today’s information society, we witness an explosive growth of the amount of information becoming available in electronic form and stored in large databases. . For example, many companies operate huge data warehouses collecting many different types of information about their customers. As the workshops of ICIVC conference, ICDDM is for presenting novel and fundamental advances in the fields of Database and Data Mining. It also serves to foster communication among researchers and practitioners working in a wide variety of scientific areas with a common interest in improving Database and Data Mining related techniques.
The 1st International Conference on Science of Cyber Security (SciSec 2018) will be held August 12-14, 2018 in Beijing, China. The conference is organized by the Institute of Information Engineering, Chinese Academy of Sciences. This new forum aims to catalyze the research collaborations between the relevant communities and disciplines that can work together to deepen our understanding of, and build a firm foundation for, the emerging Science of Cyber Security. Publications in this venue would distinguish themselves from others by taking or thinking from a holistic perspective about cyber security, rather than the building-block perspective. Each submission will be reviewed (double blind) by at least 3 reviewers. The program committee plans to select and award a Best Paper and a Best Student Paper. The post-conference proceedings will be published in Springer’s Lecture Notes in Computer Science (LNCS) series.
The first ever HITB Security Conference in Beijing, featuring 3-days of hands on technical training sessions, a 2-day triple track conference and a 2-day Capture the Flag competition, technology exhibition with hackerspaces, Artificial Intelligence and hardware related exhibits plus a free-to-attend track of 30 and 60 minute talks! The first round of speakers will be announced in January. For the latest event updates and news, please follow @HITBSecConf on Twitter.
The increased size and complexity of the communications and the networking infrastructures are making it difficult the investigation of the resiliency, security assessment, safety and crimes. Mobility, anonymity, counterfeiting, are characteristics that add more complexity in Internet of Things and Cloud-based solutions. Cyber-physical systems exhibit a strong link between the computational and physical elements. Techniques for cyber resilience, cyber security, protecting the cyber infrastructure, cyber forensic and cyber crimes have been developed and deployed. Some of new solutions are nature-inspired and social-inspired leading to self-secure and self-defending systems. Despite the achievements, security and privacy, disaster management, social forensics, and anomalies/crimes detection are challenges within cyber-systems.
CYBER 2018, The Third International Conference on Advances in Cyber-Technologies and Cyber-Systems, continues the inaugural event covering many aspects related to cyber-systems and cyber-technologies considering the issues mentioned above and potential solutions. It is also intended to illustrate appropriate current academic and industry cyber-system projects, prototypes, and deployed products and services.
The internet of things (IoT) is a platform that allows a network of devices (sensors, smart meters, etc.) to communicate, analyse data and process information collaboratively in the service of individuals or organisations. The IoT network can generate large amounts of data in a variety of formats and using different protocols which can be stored and processed in the cloud. The conference looks to address the issues surrounding IoT devices, their interconnectedness and services they may offer, including efficient, effective and secure analysis of the data IoT produces using machine learning and other advanced techniques, models and tools, and issues of security, privacy and trust that will emerge as IoT technologies mature and become part of our everyday lives.
Big Data (BD) has core values of volume, velocity, variety and veracity. After collecting much data from IoT, BD can be jointly used with machine learning, AI, statistical and other advanced techniques, models and methods, which can create values for people and organizations adopting it, since forecasting, deep analysis and analytics can help identify weaknesses and make improvements based on different analysis.
Maintaining a high level of security and privacy for data in IoT are crucial and we welcome recommendations, solutions, demonstrations and best practices for all forms of security and privacy for IoT and BD.