[Om-announce] ICC 2014 Security Symposium Deadline extended to September 30 (firm)

Shui Yu shuiyucfp at gmail.com
Mon Sep 16 03:18:27 CEST 2013


IEEE International Conference on Communications
IEEE ICC 2014
Communications: The Centrepoint of Digital Economy
10 - 14 June 2014, Sydney, Australia

*Communications and Information Systems Security Symposium (CISS)*

The 2014 IEEE International Conference on Communications (ICC) will be held
in
the beautiful city of Sydney, Australia between 10  and 14 June 2014. The
theme
of this flagship conference of IEEE Communications Society for 2014 is
“Communications: The Centrepoint of Digital Economy.” The conference will
feature
a comprehensive technical program including twelve Symposia and a number of
Tutorials and Workshops. IEEE ICC 2014 will also include an attractive expo
program including keynote speakers, and Industry Forum & Exhibitions
(IF&E). We
invite you to submit your original technical papers, industry forum,
workshop,
and tutorial proposals to this event. Accepted and presented papers will be
published in the IEEE ICC 2014 Conference Proceedings and in IEEE Xplore®.
Full
details of submission procedures are available at
http://www.ieee-icc.org/2014.

Scope and Topics of Interest:
The Communications and Information Systems Security Symposium (CISS) will
focus
on all aspects of security, privacy, trust, and risk management, which pose
a
serious challenge to today's globally connected society. The symposium
welcomes
novel contributions on evaluation, modeling, analysis, and design of
communication
and information systems security solutions, from the physical layer to the
application layer. In addition, this year’s CISS puts a stronger emphasis
on
network oriented security and privacy, such as security related topics of
cloud
computing, networking related security in Big Data, IoT, and so on.

To ensure complete coverage of the advances in communication and
information
systems security, the topics of interest of the CISS include, but are not
limited to, the following areas:
- Anonymity, anonymous communication, metrics and their performance analysis

- Authentication protocols and message authentication
- Authorization and access control
- Availability and survivability of secure services and systems
- Big Data security and privacy
- Biometric security
- Botnet detection, prevention, and defense
- Cloud and distributed application security
- Computer and network forensics
- Cryptography and evaluation
- Data center security
- Firewall technologies; intrusion detection, localization, and avoidance
- Formal trust models, security modeling and protocol design
- Key distribution and management
- Lightweight security
- Location-based services and their security and privacy aspects
- Mobile and Wireless network security
- Mobile App security and privacy
- Multi-mode surveillance and homeland security
- Network public opinion analysis and monitoring
- Network security metrics and their performance evaluation
- Operating systems and application security and analysis tools
- Online Social Networks and their security aspects
- Physical security and hardware/software security
- Privacy and privacy enhancing technologies
- Quantum cryptography and communication applications
- Resource allocation, incentives, and game-theoretic approaches
- Security in virtual machine environments
- Security in wired systems and optical networks
- Security of Cyber-physical systems
- Security risk management
- Trust models, management and certificate handling
- Virtual private networks and group security
- Vulnerability, exploitation tools and virus analysis
- Web, e-commerce, and m-commerce security

Submission Guidelines:
Prospective authors are invited to submit original technical papers by the
deadline 15 September 2013 for publication in the IEEE ICC 2014 Conference

Proceedings and for oral or poster presentation(s). All submissions should
be written in English with a maximum paper length of six (6) printed pages
(10-point font) including figures without incurring additional page charges
(a maximum of one additional page will be accepted, subject to over-length
charge).

Standard IEEE Transactions templates for Microsoft Word or LaTeX formats
found at
http://www.ieee.org/portal/pages/pubs/transactions/stylesheets.html
Alternatively you can follow the sample instructions in template.pdf at
http://www.comsoc.org/confs/globecom/2008/downloads/template.pdf
Only PDF files will be accepted for the review process and all submissions
must be done through EDAS at
https://edas.info/newPaper.php?c=15399

Important dates:
Paper Submission:        30 September 2013 (firm deadline)
Acceptance Notification: 12 January 2014
Camera-Ready:            13 February 2014

Symposium Co-Chairs:
Peter Mueller, IBM Zurich Research, Switzerland, pmu [at] zurich.ibm.com
Shui Yu, Deakin University, Australia, syu [at] deakin.edu.au
Thorsten Strufe, TU Darmstadt, Germany, strufe [at] cs.tu-darmstadt.de.

-- 

 -----------------------------

Shui YU, PhD, Senior Lecturer

School of Information Technology, Deakin University,

221 Burwood Highway, Burwood, VIC 3125,  Australia.

Telephone:0061 3 9251 7744

http://www.deakin.edu.au/~syu
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://openmath.org/pipermail/om-announce/attachments/20130916/ede2f920/attachment-0001.html>


More information about the Om-announce mailing list