Abbrevation
ATCI
City
Ningbo
Country
China
Deadline Paper
Start Date
End Date
Abstract

The 2017 International Conference on Applications and Techniques in Cyber Intelligence (ATCI), building on the previous successes in Guangzhou, China (2016), Dallas, USA (2015), Beijing, China (2014), and Sydney, Australia (2013), is proud to be in the 5th consecutive conference year&#046; Previously, the event is known as the International Workshop on Applications and Techniques in Cyber Security (ATCS 2016), held in conjunction with the International Conference on Security and Privacy in Communication Networks (SecureComm)&#046;<br>The 2017 International Conference on Applications and Techniques in Cyber Security and Intelligence focuses on all aspects on techniques and applications in cyber and electronics security and intelligence research&#046; The purpose of ATCI 2017 is to provide a forum for presentation and discussion of innovative ideas, cutting edge research results, and novel techniques, methods and applications on all aspects of cyber and electronics security and intelligence&#046;<br>What is Our Goal?<br>As in previous years, the conference intends to attract the cyber security and cyber intelligence (e&#046;g&#046; big data) research community from around the world&#046; Each submission will be reviewed by at least three independent experts, and the acceptance rate will be below 30%&#046; We will invite three internationally renowned keynote speakers for this conference&#046;<br>Areas of interest include, but are not limited to:<br>&#8211; Access control<br>&#8211; Language&#8211;based Security<br>&#8211; Anti&#8211;Virus and Anti&#8211;Worms<br>&#8211; Malicious software<br>&#8211; Authentication and Authorization<br>&#8211; Network Security<br>&#8211; Cloud Security<br>&#8211; Operating System Security<br>&#8211; Computer / Digital Forensics<br>&#8211; Privacy Protection<br>&#8211; Big Data Security<br>&#8211; Risk Evaluation and Security Certification<br>&#8211; Data and System Integrity<br>&#8211; Security for Cyber&#8211;physical Systems<br>&#8211; Distributed Systems Security<br>&#8211; Security for Mobile Computing<br>&#8211; Electronic Commerce Security<br>&#8211; Security Models<br>&#8211; Crypto/Security Systems<br>&#8211; Security Protocols<br>&#8211; Information Hiding and Watermarking<br>&#8211; Smartphone Security<br>&#8211; Intellectual Property Protection<br>&#8211; Software Security<br>&#8211; Algorithms for efficient classification and clustering<br>&#8211; Smart grid cyber security<br>&#8211; Forensic computing<br>&#8211; Data leakage detection<br>&#8211; Intrusion Detection<br>&#8211; Trusted and Trustworthy Computing<br>&#8211; Sensitive data identification and protection<br>&#8211; Applied Electronic Technology<br>&#8211; Electric Automatization Technology<br>&#8211; Computer network technology<br>&#8211; Key Management and Key Recovery<br>&#8211; Smartphone Security<br>