Network Security Analysis for Cyberspace (NSAC 2022)

Scope

With more and more serious network threats happening in recent years, attackers and defenders make fierce confrontations in all areas of cyberspace. To better solve these challenges, new models and methods are constantly emerging. This workshop, collocated with the 6th IEEE International Conference on Data Science in Cyberspace (IEEE DSC2022), will bring researchers together to exchange their ideas, innovations, and original methods for network secure analysis, and to identify future research directions. NSAC 2022 workshop aims to research from various domains, including but not limited to software vulnerability fuzzing, malware behavior analysis, encrypted traffic flow analysis, intrusion detection, honeypot detection, etc, and how these innovations can be applied in real-world cyberspace applications.


WORKSHOP AREAS

Topics of interest include but not limited to:

1.Software vulnerability fuzzing
2.Malware behavior analysis
3.Encrypted traffic flow analysis
4.Network measurement and behavior analysis
5.Intrusion detection
6.Honeypot detection
7.Network attack detection and analysis
8.Event analysis and audit of AI theory
9.Big data analysis
10.Research challenges on data security
11.Threat information analysis
12.Blockchain analysis


PAPER SUBMISSION

All submissions should be written in English and submitted via our submission system: https://cmt3.research.microsoft.com/NSAC2022. A paper submitted to NSAC 2022 cannot be under review for any other conference or journal during the entire period that it is considered for NSAC 2022, and must be substantially different from any previously published work. Submissions are reviewed in a single-blind manner. Please note that all submissions must strictly adhere to the IEEE templates as provided below. The templates also act as a guideline regarding formatting. In particular, all submissions must use either the LATEX template or the MS-Word template. Please follow exactly the instructions below to ensure that your submission can ultimately be included in the proceedings.


IMPORTANT DATES

Full paper due: April 30, 2022
Acceptance notification: June 18, 2022
Camera-ready copy: June 26, 2022
Conference Date: July 11-13, 2022

ORGANIZATION

WORKSHOP GENERAL CHAIRS

Xiang CuiGuangzhou University, Guangdong, China
Yanhui GuoUniversity of Illinois Springfield, IL, USA
Zhongru WangChinese Academy of Cyberspace Studies, Beijing, China
Jinqiao ShiBeijing University of Posts and Telecommunications, Beijing, China
Lidong ZhaiInstitute of Information Engineering, CAS, Beijing, China
Chunlai Du North China University of Technology, Beijing, China

Program Committee

Li Ma, North China University of Technology, Beijing, China
Qixu Liu, Institute of Information Engineering, CAS, Beijing, China
Yuehai Wang, North China University of Technology, Beijing, China
Hongsong Chen, University of Science and Technology Beijing, Beijing, China
Hongmei Li, First Research Institute of the Ministry of Public Security of PRC, Beijing, China
Chaoge Liu, Institute of Information Engineering, CAS, Beijing, China
Gaotao Shi, Tianjin University, Tianjin, China
Yuanzhe Yao, University of Electronic Science and Technology of China, Sichuan, China
Wei Zhao, Harbin Institute of Technology, Heilongjiang, China
Yanbin Sun, Guangzhou University, Guangdong, China



footer