Call for Papers of FCS 2024

Conference Overview

The Seventh International Conference on Frontiers in Cyber Security (FCS 2024) will be co-organized by the College of Computer Science, Chongqing University, and the School of Computer Science, Zhengzhou University of Light Industry. It will be held in Chongqing, P.R. China, from July 26 to July 28, 2024. Cyber security is being paid more and more attention by industry and academia. New cyber security technologies are emerging. Many universities and institutions have set up research centers or schools for cyber security. Both government and enterprises strongly support teaching and research in cyber security. However, how to conduct research and education on cyber security is inexperienced; how to run a center for cyber security is also worth exploring since it involves many departments. The FCS conference provides a good platform for researchers and practitioners to exchange the latest research results in cyber security. The conference proceedings will be published by Springer Communications in Computer and Information Science (CCIS), which is indexed by EI.

Author Instructions:

Authors are invited to submit original papers written in English. Each paper must not appear in other conferences with proceedings or journals. The submission must be anonymous, with no author names, affiliations, acknowledgements, or obvious references. Original contributions are invited up to 16 pages in length (single column), excluding appendices and bibliography, and up to 20 pages in total, using at least 11-point fonts and with reasonable margins. It is highly recommended to prepare the papers in the Springer LNCS format http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0. Only PDF files will be accepted. If accepted, one of the authors is expected to present the paper at the conference. Papers must be submitted through https://easychair.org/conferences/?conf=fcs2024 .

Areas of Interest:

  • Access control
  • Social networks security, privacy and trust
  • Key management and key recovery
  • Software defined networking security
  • Anonymity
  • Embedded systems security
  • Language-based security
  • Security management
  • Applied cryptography
  • Security models, metrics, and policies
  • Malware and anti-malware
  • Fraud and cyber-crime
  • Authentication and authorization
  • Security and privacy of Big Data
  • Mobile computing security and privacy
  • Hardware security
  • Biometrics security
  • Security of critical Infrastructures
  • Network security
  • Identity access management
  • Blockchain security and privacy
  • Trust and reputation systems
  • Cloud computing and edge computing security
  • Trusted and trustworthy computing technologies
  • Operating systems security
  • Usable security and privacy
  • Computer and digital forensics
  • Insider threat detection
  • Cyber-physical systems security
  • Underground economy
  • Privacy protection
  • Intellectual property protection
  • Data and system integrity
  • Verification of security protocols
  • Privacy-preserving data mining
  • Intrusion detection
  • Database security
  • Web security
  • Wireless security
  • IoT security and privacy
  • Distributed systems security
  • Others