*The 2nd IEEE International Conference on Cyber Security and Cloud
Computing (CSCloud 2015)*
Nov. 3-5, 2015, New York, USA


General Chair
Meikang Qiu, Pace University, USA

Program Chair
Shui Yu, Deakin University, Australia
Yongxin Zhu, Shanghai Jiaotong University, China
Jack Dongarra, University of Tennessee, USA

Program Committee

Malek Ben Salem, Accenture Technology Lab, USA
Jun Ho Huh, Honeywell Technology Solutions Lab, USA
Zongming Fei, University of Kentucky, USA
Yingwei Luo, Peking University, China
Lei Ju, Shandong University, China
Jiawei Huang, Nvidia, USA
Thomas Austin, San Jose State University, USA
Shan Lin, Temple University, USA
Ruixuan Li, Huazhong University of Science and Technology, China
Xingang Liu, University of Electronic Science and Technology, China
Bin Wang, Wright State University, USA
Xing Fu, VMware, USA
Younghee Park, San Jose State University, USA
Fei Hu, University of Alabama, USA
Hongjun Dai, Shandong University, China
Huansheng Ning, Beihang University, China
Zonghua Gu, Zhejiang University, China
Yongxin Zhu, Shanghai Jiao Tong University, China
Hui Lu, Beihang University, China

Scope and Topics of Interest

Cyberspace has changed our daily lives. To avoid system fragility and defend
against vulnerabilities exploration from cyber attacker, various cyber secur
ity techniques and tools have been developed. This is the major focus of CSC
loud 2015.

The emerging paradigm of cloud computing provides a new way to address the c
onstraints of limited energy, capabilities, and resources. With big data pro
cessing, computation, distribution, and storage capability, cloud computing
has been embraced by researchers and practitioners as a new approach that h
as the potential for a profound impact in our daily life and world economy.
Cloud computing is the second focus of CSCloud 2015. This includes cloud mod
els, heterogeneous architecture, resource allocation, load balance, multimed
ia, and QoS, etc.

The objective of CSCloud 2015 is to provide a prime international forum for
scientists, researchers, and industrial practitioners to discuss and exchang
e their new ideas, novel results, work in progress and experience on all asp
ects of cyber security and cloud computing. Topics of particular interest in
clude, but are not limited to:

 .           Cyber Security in New Paradigms
 .           Cyber hacking, next generation fire wall
 .           Cyber monitoring, incident response
 .           Digital forensics
 .           Big data security, Database security
 .           Social engineering, insider threats, advance spear phishing
 .           Cyber threat intelligence
 .           Security and fault tolerance for embedded or ubiquitous systems
 .           Cloud security
 .           Tele-health security
 .           Sensor network security
 .           Embedded networks and sensor network optimizations
 .           Cloud computing and networking models
 .           Heterogeneous architecture for cloud computing
 .           Dynamic resource sharing algorithm for cloud computing
 .           Load balance for cloud computing
 .           Cloud-based audio/video streaming techniques
 .           MapReduce
 .           Visualization
 .           Cloud-based real-time multimedia techniques
 .           Mobile cloud computing
 .           Green cloud computing
 .           Quality of Service (QoS) improvements techniques
 .           Case studies for various applications
 .           Cyber   Security   in   emergent   technologies,   infrastructures
               and applications

Important Dates

Paper submission due: June 30th, 2015 (extended, firm)
Author notification: Aug. 1st, 2015
Camera-ready due: Aug. 20th, 2015
Author registration: Aug. 20th, 2015
Early registration: Sep. 20th, 2015
Conference date: Nov. 3-5., 2015

Submission Information

Submissions should include abstract, 5-10 keywords, and the e-mail
address of the corresponding author and be in PDF format. Each
submission must not exceed 6 pages in the IEEE 8.5 x 11 two-column
format with 10-12 point font (Template: DOC or LaTeX), including
tables and figures. Each accepted paper needs at least one author to
register in the conference. Each submissionshould be regarded as an
undertaking that, should the submission be accepted, at least one of
the authors must attend the conference to present the work in order
that the accepted paper can be put into digital library. The final
version of an accepted paper will be limited to 10 pages in IEEE
proceeding format. Please submit papers in PDF format through the
CSCloud web site. Manuscript should be prepared following the IEEE
Computer Society Press Proceedings. Author Guidelines that can be
found at:


The accepted papers have to be presented orally at the conference and will
be published by IEEE Computer Society Press (indexed by EI) and included in
IEEE Digital Library. Selected best papers will be recommended to the spe
cial issues of well-regarded SCI journals.