Abbrevation
CSCloud
City
New YorkNY
Country
United States
Deadline Paper
Start Date
End Date
Abstract

<table class="MsoNormalTable" width="1625" border="0" cellpadding="0" cellspacing="0"><tbody><tr style="mso&#8211;yfti&#8211;irow:12"><td colspan="7" style="width:800&#046;95pt;padding:0in 5&#046;4pt 0in 5&#046;4pt" valign="top" width="1068"><p class="MsoNormal"><span style="font&#8211;size:14&#046;0pt;font&#8211;family:&quot;Calibri&quot;,sans&#8211;serif; color:#3B3838">The objective of CSCloud 2015 is to provide a prime international forum for scientists, researchers, and industrial practitioners to discuss and exchange their new ideas, novel results, work in progress and experience on all aspects of cyber security and cloud computing&#046; Topics of particular interest include, but are not limited to:</span></p> </td> <td colspan="4" style="width:375&#046;35pt;padding:0in 5&#046;4pt 0in 5&#046;4pt" valign="top" width="500"> <p class="MsoNormal"> </p> </td> </tr> <tr style="mso&#8211;yfti&#8211;irow:13"> <td style="width:42&#046;1pt;padding:0in 5&#046;4pt 0in 5&#046;4pt" valign="top" width="56"> <p class="MsoNormal"> </p> </td> <td colspan="7" style="width:800&#046;95pt;padding:0in 5&#046;4pt 0in 5&#046;4pt" valign="top" width="1068"> <p class="MsoNormal"><span style="color:#3B3838"> </span></p> </td> <td colspan="4" style="width:375&#046;35pt;padding:0in 5&#046;4pt 0in 5&#046;4pt" valign="top" width="500"> <p class="MsoNormal"> </p> </td> </tr> <tr style="mso&#8211;yfti&#8211;irow:14"> <td style="width:42&#046;1pt;padding:0in 5&#046;4pt 0in 5&#046;4pt" valign="top" width="56"> <p class="MsoNormal"> </p> </td> <td colspan="7" style="width:800&#046;95pt;padding:0in 5&#046;4pt 0in 5&#046;4pt" valign="top" width="1068"> <p class="MsoNormal" style="margin&#8211;left:21&#046;0pt"><span style="font&#8211;size:14&#046;0pt; font&#8211;family:&quot;Calibri&quot;,sans&#8211;serif;color:#3B3838">Cyber Security in New Paradigms</span></p> <p class="MsoNormal" style="margin&#8211;left:21&#046;0pt"><span style="font&#8211;size:14&#046;0pt; font&#8211;family:&quot;Calibri&quot;,sans&#8211;serif;color:#3B3838">Cyber hacking, next generation fire wall</span></p> <p class="MsoNormal" style="margin&#8211;left:21&#046;0pt"><span style="font&#8211;size:14&#046;0pt; font&#8211;family:&quot;Calibri&quot;,sans&#8211;serif;color:#3B3838">Cyber monitoring, incident response</span></p> <p class="MsoNormal" style="margin&#8211;left:21&#046;0pt"><span style="font&#8211;size:14&#046;0pt; font&#8211;family:&quot;Calibri&quot;,sans&#8211;serif;color:#3B3838">Digital forensics</span></p> <p class="MsoNormal" style="margin&#8211;left:21&#046;0pt"><span style="font&#8211;size:14&#046;0pt; font&#8211;family:&quot;Calibri&quot;,sans&#8211;serif;color:#3B3838">Big data security, Database security</span></p> <p class="MsoNormal" style="margin&#8211;left:21&#046;0pt"><span style="font&#8211;size:14&#046;0pt; font&#8211;family:&quot;Calibri&quot;,sans&#8211;serif;color:#3B3838">Social engineering, insider threats, advance spear phishing</span></p> <p class="MsoNormal" style="margin&#8211;left:21&#046;0pt"><span style="font&#8211;size:14&#046;0pt; font&#8211;family:&quot;Calibri&quot;,sans&#8211;serif;color:#3B3838">Cyber threat intelligence</span></p> <p class="MsoNormal" style="margin&#8211;left:21&#046;0pt"><span style="font&#8211;size:14&#046;0pt; font&#8211;family:&quot;Calibri&quot;,sans&#8211;serif;color:#3B3838">Security and fault tolerance for embedded or ubiquitous systems</span></p> <p class="MsoNormal" style="margin&#8211;left:21&#046;0pt"><span style="font&#8211;size:14&#046;0pt; font&#8211;family:&quot;Calibri&quot;,sans&#8211;serif;color:#3B3838">Cloud security</span></p> <p class="MsoNormal" style="margin&#8211;left:21&#046;0pt"><span style="font&#8211;size:14&#046;0pt; font&#8211;family:&quot;Calibri&quot;,sans&#8211;serif;color:#3B3838">Tele&#8211;health security</span></p> <p class="MsoNormal" style="margin&#8211;left:21&#046;0pt"><span style="font&#8211;size:14&#046;0pt; font&#8211;family:&quot;Calibri&quot;,sans&#8211;serif;color:#3B3838">Sensor network security</span></p> <p class="MsoNormal" style="margin&#8211;left:21&#046;0pt"><span style="font&#8211;size:14&#046;0pt; font&#8211;family:&quot;Calibri&quot;,sans&#8211;serif;color:#3B3838">Embedded networks and sensor network optimizations</span></p> <p class="MsoNormal" style="margin&#8211;left:21&#046;0pt"><span style="font&#8211;size:14&#046;0pt; font&#8211;family:&quot;Calibri&quot;,sans&#8211;serif;color:#3B3838">Cloud computing and networking models</span></p> <p class="MsoNormal" style="margin&#8211;left:21&#046;0pt"><span style="font&#8211;size:14&#046;0pt; font&#8211;family:&quot;Calibri&quot;,sans&#8211;serif;color:#3B3838">Heterogeneous architecture for cloud computing </span></p> <p class="MsoNormal" style="margin&#8211;left:21&#046;0pt"><span style="font&#8211;size:14&#046;0pt; font&#8211;family:&quot;Calibri&quot;,sans&#8211;serif;color:#3B3838">Dynamic resource sharing algorithm for cloud computing</span></p> <p class="MsoNormal" style="margin&#8211;left:21&#046;0pt"><span style="font&#8211;size:14&#046;0pt; font&#8211;family:&quot;Calibri&quot;,sans&#8211;serif;color:#3B3838">Load balance for cloud computing </span></p> <p class="MsoNormal" style="margin&#8211;left:21&#046;0pt"><span style="font&#8211;size:14&#046;0pt; font&#8211;family:&quot;Calibri&quot;,sans&#8211;serif;color:#3B3838">Cloud&#8211;based audio/video streaming techniques </span></p> <p class="MsoNormal" style="margin&#8211;left:21&#046;0pt"><span style="font&#8211;size:14&#046;0pt; font&#8211;family:&quot;Calibri&quot;,sans&#8211;serif;color:#3B3838">MapReduce</span></p> <p class="MsoNormal" style="margin&#8211;left:21&#046;0pt"><span style="font&#8211;size:14&#046;0pt; font&#8211;family:&quot;Calibri&quot;,sans&#8211;serif;color:#3B3838">Visualization</span></p> <p class="MsoNormal" style="margin&#8211;left:21&#046;0pt"><span style="font&#8211;size:14&#046;0pt; font&#8211;family:&quot;Calibri&quot;,sans&#8211;serif;color:#3B3838">Cloud&#8211;based real&#8211;time multimedia techniques</span></p> <p class="MsoNormal" style="margin&#8211;left:21&#046;0pt"><span style="font&#8211;size:14&#046;0pt; font&#8211;family:&quot;Calibri&quot;,sans&#8211;serif;color:#3B3838">Mobile cloud computing</span></p> <p class="MsoNormal" style="margin&#8211;left:21&#046;0pt"><span style="font&#8211;size:14&#046;0pt; font&#8211;family:&quot;Calibri&quot;,sans&#8211;serif;color:#3B3838">Green cloud computing </span></p> <p class="MsoNormal" style="margin&#8211;left:21&#046;0pt"><span style="font&#8211;size:14&#046;0pt; font&#8211;family:&quot;Calibri&quot;,sans&#8211;serif;color:#3B3838">Quality of Service (QoS) improvements techniques </span></p> <p class="MsoNormal" style="margin&#8211;left:21&#046;0pt"><span style="font&#8211;size:14&#046;0pt; font&#8211;family:&quot;Calibri&quot;,sans&#8211;serif;color:#3B3838">Case studies for various applications</span></p> <p class="MsoNormal" style="margin&#8211;left:21&#046;0pt"><span style="font&#8211;size:14&#046;0pt; font&#8211;family:&quot;Calibri&quot;,sans&#8211;serif;color:#3B3838">Cyber Security in emergent technologies, infrastructures and applications</span></p></td></tr></tbody></table><br>