[Om-announce] SocialSec 2017 Melbourne: Submission Deadline Extended to 20 Sep 2017
*** 3rd International Symposium on Security and Privacy in Social Networks and Big Data Melbourne, Australia, 13-15 December 2017 http://nsclab.org/socialsec2017/ *** Symposium Outline = Social Networks and Big Data have pervaded all aspects of our daily lives. With their unparalleled popularity, social networks have evolved from the platforms for social communication and news dissemination, to indispensable tools for professional networking, social recommendations, marketing, and online content distribution. Social Networks, together with other activities, produce Big Data that is beyond the ability of commonly used computer software and hardware tools to capture, manage, and process within a tolerable elapsed time. It has been widely recognised that security and privacy are the critical challenges for Social Networks and Big Data applications due to their scale, complexity and heterogeneity. The 3rd International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec 2017) will be held in Melbourne, Australia on 13-15 December 2017. It follows the success of SocialSec 2015 in Hangzhou, China and SocialSec 2016 in Fiji. The aim of the symposium is to provide a leading edge forum to foster interactions between researchers and developers with the security and privacy communities in Social Networks and Big Data, and to give attendees an opportunity to interact with experts in academia, industry, and governments. Co-located Events = - 13th International Conference on Information Security Practice and Experience (ISPEC 2017) Important Dates === Paper Submission Due: Extended to 20 September 2017 Author Notification: 30 September 2017 Camera-ready Paper Due: 05 October 2017 Registration Due: 05 October 2017 Symposium Date: 13-15 December 2017 Symposium Topics The symposium seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and privacy in Social Networks and Big Data. Papers describing case studies, implementation experiences, and lessons learned are also encouraged. Topics of interest include but are not limited to: - Attacks in/via social networks - Information control and detection - Malicious behaviour modelling in social networks - Malicious information propagation via social networks - Phishing problems in social networks - Privacy protection in social networks - Big data analytics for threats and attacks prediction - Spam problems in social networks - Trust and reputations in social networks - Big data outsourcing - Big data forensics - Security and privacy in big database - Applied cryptography for big data - Big data system security - Mobile social networks security - Security and privacy in cloud - Forensics in social networks and big data Instructions for authors Submission Portal: https://easychair.org/conferences/?conf=socialsec2017 Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. The page limit is 16 pages excluding appendices and bibliography and up to 20 pages in total, using at least 11-point fonts and with reasonable margins. Detailed auther instructions and LaTeX/Word templates for LNCS publications can be found via the following link. Springer LNCS Author Information: http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0 Papers will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation. All papers accepted by SocialSec 2017 will be included in a special track of the ISPEC 2017 conference proceedings, published by Springer as part of the Lecture Notes in Computer Science (LNCS) series, and indexed by EI Engineering, ISI Conference Proceedings Index, Scopus and other major indexing services. Journal Special Issue = Selected papers presented at SocialSec 2017 will be invited to consider submission after significant extension for the following special issue in SCI-Indexed Journal: Special Issue on Social Network Security and Privacy Concurrency and Computation: Practice and Experience (CCPE) (Impact Factor: 1.133) http://www.cc-pe.net/journalinfo/issues/2018.html#ISPEC/SocialSec2017 Conference Organisation === General Chair - Symeon Papadopoulos, CERTH-ITI, Greece Yang Xiang, Swinburne University of Technology, Australia Wanlei Zhou, Deakin University, Australia Program Committee Chair --- Yuhong Liu, Santa Clara University, USA Yu Wang, Deakin University, Australia Publicity Chair --- Joseph K. Liu, Monash University, Australia Program Committee
[Om-announce] CFP: IDCS 2017, 11-13 December 2017, Mana Island Resort and Spa, Fiji
urne, Australia Giancarlo Fortino, University of Calabria, Italy Dimitrios Georgakopolous, RMIT University, Australia Mukaddim Pathan, Telstra, Australia Conference Contact == Email: neer...@unifiji.ac.fj ___ Om-announce mailing list Om-announce@openmath.org http://openmath.org/mailman/listinfo/om-announce
[Om-announce] CFP: CSS 2017, Xi'an, China, October 23-25, 2017
CSS 2017 CFP The CSS-2017 symposium is the 9th International Symposium on Cyberspace Safety and Security. It provides a leading edge forum to foster interaction between researchers and developers with the cyberspace safety and security communities, and to give attendees an opportunity to network with experts in this area. It focusses on Cyberspace Safety and Security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace. *Venue & Time*: Xi’an China, October 23-25, 2017 *Important Dates*: May 27, 2017 (Paper Submission Due), August 15, 2017 (Acceptance Notification) *Tracks* · Track 1: Privacy Preserving · Track 2: Intrusion Detection and Forensics · Track 3: Cyber Physical System Security · Track 4: Big Data Security · Track 5: Mobile Security *Special issues* Future Generation Computer Science (SCI, IF=2.786) Concurrency and Computation: Practice and Experience (SCI, IF=0.94) Cluster Computing (SCI, IF=1.514) *Scope* We invite submissions from academia, government, and industry presenting novel research on all theoretical and practical aspects of computer and network security. Areas of interest for CSS 2017 include, but are not limited to: Web security [Track 1,2,4] Database security [Track 4] Adversary machine learning [Track 4] Data mining security [Track 4] Watermarking [Track 2] Security in social networks [Track 1,2,4] Access control [Track 2,3,5] Cyber physical security [Track 3] Trust computing [Track 2,3,5] Digital forensics [Track 2] Intrusion detection [Track 2] Malware and botnet [Track 2] Vulnerability and risk assessment [Track 2,3,5] Denial-of-Service attacks [Track 2,3] Anonymous communication [Track 2] Security in wireless communication [Track 2,5] Security in mobile devices [Track 5] Privacy preserving [Track 1] Attacks to privacy [Track 1] Cloud computing security [Track 1,2,4] Operation system security [Track 2,5] Software security [Track 2,5] Security architecture [Track 2,3] *Instructions for authors* The accepted papers from this conference will be submitted for publication in IEEE Xplore as well as other Abstracting and Indexing (A) databases (EI Compendex). Distinguished papers, after further revisions, will be considered for possible publication in several SCI & EI indexed special issues of prestigious international journals. By submitting a paper to the conference, authors assure that if the paper is accepted, at least one author will attend the conference and present the paper. Papers should be written in English conforming to the IEEE conference proceedings format (8.5" x 11", Two-Column). Papers should be submitted through the paper submission system at the conference website. Full Papers (up to 8 pages, or 12 pages with the over length charge) and Short Papers (up to 4 pages) are solicited. ___ Om-announce mailing list Om-announce@openmath.org http://openmath.org/mailman/listinfo/om-announce
[Om-announce] CFP: SocialSec 2016, Fiji with new SCI-Indexed Journal Special Issue
2nd IEEE International Symposium on Security and Privacy in Social Networks and Big Data Shangri-La's Fijian Resort and Spa, Fiji, 8-10 December 2016 http://nsclab.org/socialsec2016/ We are delighted to announce that SocialSec 2016 will feature a special issue on Social Network Security and Privacy in Concurrency and Computation: Practice and Experience (CCPE). JOURNAL SPECIAL ISSUE = Selected papers presented at the SocialSec 2016 will be invited to consider submission (after significant extension) for the following special issue in CCPE. Special Issue on Social Network Security and Privacy Concurrency and Computation: Practice and Experience (CCPE) http://www.cc-pe.net/journalinfo/ Symposium Outline = Social Networks and Big Data have pervaded all aspects of our daily lives. With their unparalleled popularity, social networks have evolved from the platforms for social communication and news dissemination, to indispensable tools for professional networking, social recommendations, marketing, and online content distribution. Social Networks, together with other activities, produce Big Data that beyond the ability of commonly used computer software and hardware tools to capture, manage, and process within a tolerable elapsed time. Due to their scale, complexity and heterogeneity, a number of technical and social challenges in Social Networks and Big Data must be addressed. It has been widely recognised that security and privacy are the critical issues. On one hand, Social Networks and Big Data have been an effective platform for the attackers to launch attacks and distribute malicious information. On the other hand, privacy leakage through Social Networks and Big Data has become common exercise. Following the success of the first event, the aim of the 2nd IEEE International Symposium on Security and Privacy in Social Networks and Big Data (IEEE SocialSec 2016) is to provide a leading edge forum to foster interactions between researchers and developers with the security and privacy communities in Social Networks and Big Data, and to give attendees an opportunity to interact with experts in academia, industry, and governments. IEEE SocialSec 2016 will be held at Shangri-La's Fijian Resort and Spa, Yanuca Island, Fiji on 8-10 December 2016. Get ready to enjoy a unique trip in an wonderful island in this Globe. Co-located Events = - 6th International Symposium on Cloud and Service Computing (SC2-2016) - 3rd International Conference on Internet of Vehicles (IOV 2016) - 16th International Conference on Computer and Information Technology (CIT 2016) Important Dates === Paper Submission Due: 7 September 2016 Author Notification: 28 September 2016 Camera-ready Paper due: 5 October 2016 Registration due: 5 October 2016 Symposium Date: 8-10 December 2016 Symposium Topics The symposium seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and privacy in Social Networks and Big Data. Papers describing case studies, implementation experiences, and lessons learned are also encouraged. Topics of interest include but are not limited to: - Attacks in/via social networks - Information control and detection - Malicious behaviour modelling in social networks - Malicious information propagation via social networks - Phishing problems in social networks - Privacy protection in social networks - Big data analytics for threats and attacks prediction - Spam problems in social networks - Trust and reputations in social networks - Big data outsourcing - Big data forensics - Security and privacy in big database - Applied cryptography for big data - Big data system security - Mobile social networks security - Security and privacy in cloud - Forensics in social networks and big data Instructions for authors Submission Website: https://easychair.org/conferences/?conf=socialsec2016 Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be clearly presented in English, must not exceed 8 pages in A4 format, including tables, figures, references and appendixes, in IEEE Computer Society proceedings format with Portable Document Format (.pdf). Please refer to http://www.ieee.org/conferences_events/conferences/publishing/templates.html for preparing the submission. Papers will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation. Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the symposium
[Om-announce] SCI-Indexed Journal Special Issue for CIT 2016, Fiji, 8-10 December 2016
*** IEEE CIT 2016 CFP *** 16th IEEE International Conference on Computer and Information Technology Shangri-La's Fijian Resort and Spa, Fiji, 8-10 December 2016 http://nsclab.org/cit2016/ * We are delighted to announce that CIT 2016 will feature a special issue on Security and Privacy in Social Big Data in Future Generation Computer Systems (FGCS). JOURNAL SPECIAL ISSUE = Selected papers presented at the CIT 2016 will be invited to consider submission (after significant extension) for the following special issue in FGCS. Special Issue on Security and Privacy in Social Big Data Future Generation Computer Systems (FGCS) http://www.journals.elsevier.com/future-generation-computer-systems INTRODUCTION IEEE CIT 2016 is the 16th edition of the highly successful International Conference on Computer and Information Technology. The goal of the conference is to provide a forum for scientists, engineers and researchers to discuss and exchange novel ideas, results, experiences and work-in-process on all aspects of computer and information technology. CIT has become a major platform for researchers and industry practitioners from different fields of computer and information technology. Each year, CIT attendees appreciate and benefit from multidisciplinary exchanges in computer and information technology. In previous years, CIT has attracted many high quality research papers spanning over the various aspects of information technology, computing science and computer engineering. These papers highlight foundational work that strives to push beyond limits of existing computer technologies, including experimental efforts, innovative systems, and investigations that identify weaknesses in existing IT services. IEEE CIT 2016 will be held on 8-10 December 2016 in Shangri-La's Fijian Resort and Spa, Fiji, co-located with SC2-2016, IOV 2016, and IEEE SocialSec 2016. CO-LOCATED EVENTS = - 6th International Symposium on Cloud and Service Computing (SC2-2016) - 3rd International Conference on Internet of Vehicles (IOV 2016) - 2nd IEEE International Symposium on Security and Privacy in Social Networks and Big Data (IEEE SocialSec 2016) IMPORTANT DATES === Paper Submission Due: 7 September 2016 (Firm Deadline) Author Notification: 28 September 2016 Camera-ready Paper due: 5 October 2016 Registration due: 5 October 2016 Symposium: 8-10 December 2016 SCOPE AND TOPICS Topics of particular interests include the following tracks, but are not limited to: - Information Technology - Computer Science - Signal Processing - Networking and Internet of Things - Reliability, Security, Privacy and Trust - Applications, Business and Social Issues - Database and Data Management - Software Engineering - Microwave and Radar - System Software and Software Engineering - Pattern Recognition, Data Mining and Artificial Intelligence - Information Technology for Biomedicine and Smart Health - Wireless Communications - Mobile Multimedia Communications - Wireless and Mobile Computing - Future Internet - Cellular Network and 5G - Social Computing and Social Network - Web Technologies AUTHOR GUIDELINE All papers need to be submitted electronically through the paper submission system (http://cse.stfx.ca/~cit2016/sub/) with PDF format. The materials presented in the papers should not be published or under submission elsewhere. Each paper is limited to 8 pages (or 10 pages with over length charge) including figures and references using IEEE Computer Society Proceedings Manuscripts style (two columns, single-spaced, 10 fonts). You can confirm the IEEE Computer Society Proceedings Author Guidelines at the following web page (http://www.computer.org/web/cs-cps/). Once accepted, the paper will be included into the IEEE conference proceedings published by IEEE Computer Society Press (indexed by EI). At least one of the authors of any accepted paper is requested to register the paper at the conference. ORGANISATION COMMITTEES === General Chairs -- A B M Shawkat Ali, The University of Fiji, Fiji Yang Xiang, Deakin University, Australia Albert Zomaya, The University of Sydney, Australia Program Chairs -- Jiannong Cao, The Hong Kong Polytechnic University, Hong Kong Qun Jin, Waseda University, Japan Xiaodong Lin, University of Ontario Institute of Technology, Canada Vincenzo Piuri, Universita' degli Studi di Milano, Italy Program Vice-Chairs --- Aniello Castiglione, University of Salerno and University of Naples, Italy Yu Wang, Deakin University, Australia Jun Zhang, Deakin University, Australia Publicity Chairs Al-Sakib Khan Pathan, Southeast University, Bangladesh Yi Qian, University of Nebraska-Lincoln, USA Xin Zhu,The University of Aizu, Japan Workshop
[Om-announce] Extended Deadline for CIT 2016, Fiji, 8-10 December 2016
*** IEEE CIT 2016 CFP *** 16th IEEE International Conference on Computer and Information Technology Shangri-La's Fijian Resort and Spa, Fiji, 8-10 December 2016 http://nsclab.org/cit2016/ * INTRODUCTION IEEE CIT 2016 is the 16th edition of the highly successful International Conference on Computer and Information Technology. The goal of the conference is to provide a forum for scientists, engineers and researchers to discuss and exchange novel ideas, results, experiences and work-in-process on all aspects of computer and information technology. CIT has become a major platform for researchers and industry practitioners from different fields of computer and information technology. Each year, CIT attendees appreciate and benefit from multidisciplinary exchanges in computer and information technology. In previous years, CIT has attracted many high quality research papers spanning over the various aspects of information technology, computing science and computer engineering. These papers highlight foundational work that strives to push beyond limits of existing computer technologies, including experimental efforts, innovative systems, and investigations that identify weaknesses in existing IT services. IEEE CIT 2016 will be held on 8-10 December 2016 in Shangri-La's Fijian Resort and Spa, Fiji, co-located with SC2-2016, IOV 2016, and IEEE SocialSec 2016. CO-LOCATED EVENTS = - 6th International Symposium on Cloud and Service Computing (SC2-2016) - 3rd International Conference on Internet of Vehicles (IOV 2016) - 2nd IEEE International Symposium on Security and Privacy in Social Networks and Big Data (IEEE SocialSec 2016) IMPORTANT DATES === Paper Submission Due: 7 September 2016 (Firm Deadline) Author Notification: 28 September 2016 Camera-ready Paper due: 5 October 2016 Registration due: 5 October 2016 Symposium: 8-10 December 2016 SCOPE AND TOPICS Topics of particular interests include the following tracks, but are not limited to: - Information Technology - Computer Science - Signal Processing - Networking and Internet of Things - Reliability, Security, Privacy and Trust - Applications, Business and Social Issues - Database and Data Management - Software Engineering - Microwave and Radar - System Software and Software Engineering - Pattern Recognition, Data Mining and Artificial Intelligence - Information Technology for Biomedicine and Smart Health - Wireless Communications - Mobile Multimedia Communications - Wireless and Mobile Computing - Future Internet - Cellular Network and 5G - Social Computing and Social Network - Web Technologies AUTHOR GUIDELINE All papers need to be submitted electronically through the paper submission system (http://cse.stfx.ca/~cit2016/sub/) with PDF format. The materials presented in the papers should not be published or under submission elsewhere. Each paper is limited to 8 pages (or 10 pages with over length charge) including figures and references using IEEE Computer Society Proceedings Manuscripts style (two columns, single-spaced, 10 fonts). You can confirm the IEEE Computer Society Proceedings Author Guidelines at the following web page (http://www.computer.org/web/cs-cps/). Once accepted, the paper will be included into the IEEE conference proceedings published by IEEE Computer Society Press (indexed by EI). At least one of the authors of any accepted paper is requested to register the paper at the conference. ORGANISATION COMMITTEES === General Chairs -- A B M Shawkat Ali, The University of Fiji, Fiji Yang Xiang, Deakin University, Australia Albert Zomaya, The University of Sydney, Australia Program Chairs -- Jiannong Cao, The Hong Kong Polytechnic University, Hong Kong Qun Jin, Waseda University, Japan Xiaodong Lin, University of Ontario Institute of Technology, Canada Vincenzo Piuri, Universita' degli Studi di Milano, Italy Program Vice-Chairs --- Yu Wang, Deakin University, Australia Jun Zhang, Deakin University, Australia Publicity Chairs Al-Sakib Khan Pathan, Southeast University, Bangladesh Yi Qian, University of Nebraska-Lincoln, USA Xin Zhu,The University of Aizu, Japan Workshop Chairs --- Md Zakirul Alam Bhuiyan, Temple University, USA Wenxi Chen, University of Aizu, Japan Sheng Wen, Deakin University, Australia Finance Chair - Neeraj Sharma, The University of Fiji, Fiji International Advisory Committee Mohammed Atiquzzaman, University of Oklahoma, USA Hsiao-Hwa Chen, National Cheng Kung University, Taiwan Hai Jin, Huazhong University of Science and Technology, China George A. Papadopoulos, University of Cyprus, Cyprus Wanlei Zhou, Deakin University, Australia Steering Committee -- Daming Wei
[Om-announce] CFP: SocialSec 2016, Shangri-La's Fijian Resort, Fiji, 8-10 December 2016
2nd IEEE International Symposium on Security and Privacy in Social Networks and Big Data Shangri-La's Fijian Resort and Spa, Fiji, 8-10 December 2016 http://nsclab.org/socialsec2016/ Symposium Outline = Social Networks and Big Data have pervaded all aspects of our daily lives. With their unparalleled popularity, social networks have evolved from the platforms for social communication and news dissemination, to indispensable tools for professional networking, social recommendations, marketing, and online content distribution. Social Networks, together with other activities, produce Big Data that beyond the ability of commonly used computer software and hardware tools to capture, manage, and process within a tolerable elapsed time. Due to their scale, complexity and heterogeneity, a number of technical and social challenges in Social Networks and Big Data must be addressed. It has been widely recognised that security and privacy are the critical issues. On one hand, Social Networks and Big Data have been an effective platform for the attackers to launch attacks and distribute malicious information. On the other hand, privacy leakage through Social Networks and Big Data has become common exercise. Following the success of the first event, the aim of the 2nd IEEE International Symposium on Security and Privacy in Social Networks and Big Data (IEEE SocialSec 2016) is to provide a leading edge forum to foster interactions between researchers and developers with the security and privacy communities in Social Networks and Big Data, and to give attendees an opportunity to interact with experts in academia, industry, and governments. IEEE SocialSec 2016 will be held at Shangri-La's Fijian Resort and Spa, Yanuca Island, Fiji on 8-10 December 2016. Get ready to enjoy a unique trip in an wonderful island in this Globe. Co-located Events = - 6th International Symposium on Cloud and Service Computing (SC2-2016) - 3rd International Conference on Internet of Vehicles (IOV 2016) - 16th International Conference on Computer and Information Technology (CIT 2016) Important Dates === Paper Submission Due: 7 September 2016 Author Notification: 28 September 2016 Camera-ready Paper due: 5 October 2016 Registration due: 5 October 2016 Symposium Date: 8-10 December 2016 Symposium Topics The symposium seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and privacy in Social Networks and Big Data. Papers describing case studies, implementation experiences, and lessons learned are also encouraged. Topics of interest include but are not limited to: - Attacks in/via social networks - Information control and detection - Malicious behaviour modelling in social networks - Malicious information propagation via social networks - Phishing problems in social networks - Privacy protection in social networks - Big data analytics for threats and attacks prediction - Spam problems in social networks - Trust and reputations in social networks - Big data outsourcing - Big data forensics - Security and privacy in big database - Applied cryptography for big data - Big data system security - Mobile social networks security - Security and privacy in cloud - Forensics in social networks and big data Instructions for authors Submission Website: https://easychair.org/conferences/?conf=socialsec2016 Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be clearly presented in English, must not exceed 8 pages in A4 format, including tables, figures, references and appendixes, in IEEE Computer Society proceedings format with Portable Document Format (.pdf). Please refer to http://www.ieee.org/conferences_events/conferences/publishing/templates.html for preparing the submission. Papers will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation. Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the symposium to present the work. Conference Organisation === General Chairs -- Shawkat Ali, University of Fiji, Fiji David Chadwick, University of Kent, UK Yang Xiang, Deakin University, Australia Program Committee Chairs Jun Zhang, Deakin University, Australia Mirosław Kutyłowski, Wroclaw University of Technology, Porland Murat Kantarcioglu, University of Texas at Dallas, US Workshop Chairs --- Motoki Sakai, Chiba University of Commerce, Japan Aniello Castiglione,
[Spam:*****] [Om-announce] CFP: NSS 2016 Taipei - Paper Submission Due 30th April
* NSS 2016 CFP * The 10th International Conference on Network and System Security Taipei, Taiwan, September 28-30, 2016 http://nsclab.org/nss2016/ Important Dates === Paper Submission Deadline: 30th April, 2016 Author Notification: 15th June, 2016 Camera-ready and Registration: 15th July, 2016 Conference Dates: 28-30 September, 2016 Journal Special Issues == Selected papers will be invited to the following journal special issues: 1. Future Generation Computer Systems (FGCS, SCI indexed, Impact Factor: 2.786) 2. Journal of Information Security and Applications (JISA, SCIE indexed) 3. Journal of Internet Technology (JIT, SCIE indexed, Impact Factor: 0.44) INTRODUCTION While the attack systems have become more easy-to-use, sophisticated, and powerful, interest has greatly increased in the field of building more effective, intelligent, adaptive, active and high performance defense systems which are distributed and networked. The NSS conference will cover research on all theoretical and practical aspects related to network and system security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability of computer networks and systems. The aim of NSS is to provide a leading edge forum to foster interaction between researchers and developers with the network and system security communities, and to give attendees an opportunity to interact with experts in academia, industry, and governments. NSS 2016 is the next event in a series of highly successful events of Network and System Security. Previous editions were held in: New York City, USA (2015), Xi'an, China (2014), Madrid, Spain (2013); Wu Yi Shan, China (2012); Milan, Italy (2011); Melbourne, Australia; (2010); Gold Coast, Australia (2009); Shanghai, China (2008); and Dalian, China (2007). In this year, NSS 2016 will be held in The Grand Hotel in Taipei, Taiwan on September 28-30, 2016. SCOPE AND TOPICS Topics of interest include but are not limited to: - Active Defense Systems - Adaptive Defense Systems - Analysis, Benchmark of Security Systems - Applied Cryptography - Authentication - Big Data Security and Privacy - Biometric Security - Complex Systems Security - Database and System Security - Data Protection - Data/System Integrity - Digital Forensics - Distributed Access Control - Distributed Attack Systems - Denial-of-Service - High Performance Network Virtualization - High Performance Security Systems - Hardware Security - Identity Management - Intelligent Defense Systems - Insider Threats - Intellectual Property Rights Protection - Internet and Network Forensics - Intrusion Detection and Prevention - Key Distribution and Management - Large-scale Attacks and Defense - Malware - Network Resiliency - Network Security - RFID/NFC Security and Privacy - Security Architectures - Security for Critical Infrastructures - Security for Cyber Physical Systems - Security in Cloud and Grid Systems - Security in Pervasive/Ubiquitous Computing - Security and Privacy in Smart Grid - Security and Privacy in Social Networks - Security and Privacy in Wireless Networks - Secure Mobile Agents and Mobile Code - Security Policy - Security Protocols - Security Simulation and Tools - Security Theory and Tools - Standards and Assurance Methods - Trusted Computing - Trust Management - World Wide Web Security Submission Guidelines = Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be clearly presented in English, must not exceed 14 pages, including tables, figures, references and appendixes, in Springer LNCS Format with Portable Document Format (.pdf). Please submit your paper at: https://www.easychair.org/conferences/?conf=nss2016 Papers will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation. Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the conference to present the work. Organization Committee == Honorary Chairs --- D. J. Guan, National Sun Yat-Sen University, Taiwan Yen-Nun Huang, Academia Sinica, Taiwan Der-Tsai Lee, Academia Sinica, Taiwan General Chairs -- Chun-I Fan, National Sun Yat-Sen University, Taiwan Nai-Wei Lo, National Taiwan University of Science and Technology, Taiwan Shiuhpyng (Winston) Shieh, National Chiao Tung University, Taiwan Tzong-Chen Wu, National Taiwan University of Science and Technology, Taiwan Program Chairs -- Jiageng Chen, Central China Normal University, China Vincenzo Piuri, University of Milan, Italy Chunhua Su, Japan Advanced
[Spam:*****] [Om-announce] IEEE DASC 2016 CFP: Paper Submission Deadline Extended to March 31, 2016
The 14th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2016) http://cse.stfx.ca/~dasc2016/ Auckland, New Zealand, 8-12 August 2016 Sponsored by IEEE, IEEE Computer Society and IEEE Technical Committee of Scalable Computing (TCSC) INTRODUCTION = As computer systems become increasingly large and complex, their Dependability, Security and Autonomy play critical role at supporting next-generation science, engineering, and commercial applications. These systems consist of heterogeneous software/hardware/network components of changing capabilities, availability, and in varied contexts. They provide computing services to large pools of users and applications, and thus are exposed to a number of dangers such as accidental/deliberate faults, virus infections, malicious attacks, illegal intrusions, natural disasters, etc. As a result, too often computer systems fail, become compromised, or perform poorly and therefore untrustworthy. Thus, it remains a challenge to design, analyse, evaluate, and improve the dependability and security for a trusted computing environment. Trusted computing targets computing and communication systems as well as services that are autonomous, dependable, secure, privacy protect-able, predictable, traceable, controllable, assessable and sustainable. The scale and complexity of information systems evolve towards overwhelming the capability of system administrators, programmers, and designers. This calls for the autonomic computing paradigm, which meets the requirements of self-management by providing self-optimization, self-healing, self-configuration, and self-protection. As a promising means to implement dependable and secure systems in a self-managing manner, autonomic computing technology needs to be further explored. On the other hand, any autonomic system must be trustworthy to avoid the risk of losing control and retain confidence that the system will not fail. Trusted and autonomic computing and communications need synergistic research efforts covering many disciplines, ranging from computer science and engineering, to the natural sciences and the social sciences. It requires scientific and technological advances in a wide variety of fields, as well as new software, system architectures, and communication systems that support the effective and coherent integration of the constituent technologies. DASC 2016 will be held on 8-12 August 2016 in Auckland, New Zealand, co-located with CyberSciTech 2016, IEEE DataCom 2016 and IEEE PICom 2016. It aims to bring together computer scientists, industrial engineers, and researchers to discuss and exchange experimental and theoretical results, novel designs, work-in-progress, experience, case studies, and trend-setting ideas in the areas of dependability, security, trust and/or autonomic computing systems. SCOPE AND TOPICS Topics of particular interests include the following tracks, but are not limited to: - Autonomic Computing Theory, Models, Architectures and Communications - Cloud Computing with Autonomic and Trusted Environment - Dependable Automatic Control Techniques and Systems - Dependability Models and Evaluation Algorithms - Dependable Sensors, Devices, Embedded Systems - Dependable Electronic-Mechanical Systems, Optic-Electronic Systems - Self-improvement in Dependable Systems - Self-healing, Self-protection and Fault-tolerant Systems - Hardware and Software Reliability, Verification and Testing - Software Engineering for Dependable Systems - vSafety-critical Systems in Transportation and Power System - Security Models and Quantifications - Trusted P2P, Web Service, SoA, SaaS, EaaS, and PaaS - Self-protection and Intrusion-detection in Security - DRM, Watermarking Technology, IP Protection - Context-aware Access Control - Virus Detections and Anti-virus Techniques/Software - Cyber Attack, Crime and Cyber War - Human Interaction with Trusted and Autonomic Computing Systems - Security, Dependability and Autonomic Issues in Ubiquitous Computing - QoS in Communications and Services - Information and System Security - Reliable Computing and Trusted Computing - Wireless Emergency and Security Systems - Information Technology in Biomedicine - Multimedia Security Issues over Mobile and Wireless Networks - Multimedia in Mobile Computing: Issues, System Design, and Performance Evaluation - Software Architectures and Design for Emerging Systems - Software Engineering for Emerging Networks, Systems, and Mobile Systems - Service Oriented Architectures IMPORTANT DATES === Workshop Proposal Due: 29 February 2016 Paper Submission Due: 31 March 2016 Author Notification: 30 April 2016 Demo/Poster Papers Submission Due: 5 May 2016 Author Notification: 20 May 2016 Camera-ready Paper Due: 31 May 2016 Registration Due: 31 May 2016 PAPER SUBMISSION GUIDELINE == Authors are invited to submit their original research work that has not
[Spam:*****] [Om-announce] Call For Papers: DASC 2016, Auckland, New Zealand, 8-12 August 2016
Apologies if you receive multiple copies of this message IEEE DASC 2016 CFP *** The 14th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2016) http://cse.stfx.ca/~dasc2016/ Auckland, New Zealand, 8-12 August 2016 Sponsored by IEEE, IEEE Computer Society and IEEE Technical Committee of Scalable Computing (TCSC) INTRODUCTION = As computer systems become increasingly large and complex, their Dependability, Security and Autonomy play critical role at supporting next-generation science, engineering, and commercial applications. These systems consist of heterogeneous software/hardware/network components of changing capabilities, availability, and in varied contexts. They provide computing services to large pools of users and applications, and thus are exposed to a number of dangers such as accidental/deliberate faults, virus infections, malicious attacks, illegal intrusions, natural disasters, etc. As a result, too often computer systems fail, become compromised, or perform poorly and therefore untrustworthy. Thus, it remains a challenge to design, analyse, evaluate, and improve the dependability and security for a trusted computing environment. Trusted computing targets computing and communication systems as well as services that are autonomous, dependable, secure, privacy protect-able, predictable, traceable, controllable, assessable and sustainable. The scale and complexity of information systems evolve towards overwhelming the capability of system administrators, programmers, and designers. This calls for the autonomic computing paradigm, which meets the requirements of self-management by providing self-optimization, self-healing, self-configuration, and self-protection. As a promising means to implement dependable and secure systems in a self-managing manner, autonomic computing technology needs to be further explored. On the other hand, any autonomic system must be trustworthy to avoid the risk of losing control and retain confidence that the system will not fail. Trusted and autonomic computing and communications need synergistic research efforts covering many disciplines, ranging from computer science and engineering, to the natural sciences and the social sciences. It requires scientific and technological advances in a wide variety of fields, as well as new software, system architectures, and communication systems that support the effective and coherent integration of the constituent technologies. DASC 2016 will be held on 8-12 August 2016 in Auckland, New Zealand, co-located with CyberSciTech 2016, IEEE DataCom 2016 and IEEE PICom 2016. It aims to bring together computer scientists, industrial engineers, and researchers to discuss and exchange experimental and theoretical results, novel designs, work-in-progress, experience, case studies, and trend-setting ideas in the areas of dependability, security, trust and/or autonomic computing systems. SCOPE AND TOPICS Topics of particular interests include the following tracks, but are not limited to: - Autonomic Computing Theory, Models, Architectures and Communications - Cloud Computing with Autonomic and Trusted Environment - Dependable Automatic Control Techniques and Systems - Dependability Models and Evaluation Algorithms - Dependable Sensors, Devices, Embedded Systems - Dependable Electronic-Mechanical Systems, Optic-Electronic Systems - Self-improvement in Dependable Systems - Self-healing, Self-protection and Fault-tolerant Systems - Hardware and Software Reliability, Verification and Testing - Software Engineering for Dependable Systems - Safety-critical Systems in Transportation and Power System - Security Models and Quantifications - Trusted P2P, Web Service, SoA, SaaS, EaaS, and PaaS - Self-protection and Intrusion-detection in Security - DRM, Watermarking Technology, IP Protection - Context-aware Access Control - Virus Detections and Anti-Virus Techniques/Software - Cyber Attack, Crime and Cyber War - Human Interaction with Trusted and Autonomic Computing Systems - Security, Dependability and Autonomic Issues in Ubiquitous Computing - QoS in Communications and Services - Information and System Security - Reliable Computing and Trusted Computing - Wireless Emergency and Security Systems - Information Technology in Biomedicine - Multimedia Security Issues over Mobile and Wireless Networks - Multimedia in Mobile Computing: Issues, System Design and Performance Evaluation - Software Architectures and Design for Emerging Systems - Software Engineering for Emerging Networks, Systems, and Mobile Systems - Service Oriented Architectures IMPORTANT DATES === Workshop Proposal Due: 29 February 2016 Paper Submission Due: 15 March 2016 Author Notification: 30 April 2016 Camera-ready Paper Due: 31 May 2016 Registration Due: 31 May 2016 Conference Date: 8-12 August 2016 PAPER SUBMISSION GUIDELINE
[Spam:*****] [Om-announce] Submission Deadline Extended: ACISP 2016, Melbourne, Australia, 4-6 July 2016
The 21st Australasian Conference on Information Security and Privacy (ACISP) Melbourne, Australia 4-6 July 2016 http://nsclab.org/acisp2016/ The 21st Australasian Conference on Information Security and Privacy (ACISP) will be held in Melbourne on 4-6 July 2016, organized by Deakin University. ACISP was established in 1996 in Wollongong. Now in its 21st year, the conference is a key forum for international researchers and industry experts to discuss the latest trends, breakthroughs and challenges in information security and privacy. Cyber Security Winter School 2016 (a FREE winter school) will be held in conjunction with ACISP, on 7-8 July 2016. http://nsclab.org/csws2016/ Important Dates --- Paper Submission Due: *Extended to 04 March 2016 (firm deadline)* Notification of Acceptance: Extended to 13 April 2016 Camera-Ready Paper Due: 20 April 2016 Conference Date: 4-6 July 2016 Cyber Security Winter Schoo: 7-8 July 2016 Conference Topics - We invite submissions from academia, government, and industry presenting novel research on all aspects of information security and privacy primitives or protocols, which include but are not limited to the areas listed as below. This year we particularly welcome submissions from areas in cyber-physical security, mobile security, software security and network security which are under represented in previous ACISP series. - Cryptology - Applied cryptography - Mobile security - Cloud security - Access control - Privacy enhanced technology - Viruses and malware - Software security - Database security - Web security - Operating system security - Intrusion detection - Big data security and privacy - Biometric Security - Implementation - Network security - Key management - Security and privacy in ubiquitous computing - Secure electronic payment system - Formal methods for security - Digital forensics - Security for critical infrastructures - Embedded systems security - Lightweight security - Smart grid security - Cyber security for urban transportation - Cyber-physical security Journal Recommendations --- Selected papers presented at the ACISP 2016 will be invited to consider submission (after significant extension) for special issues or topical selections in the following journals: - Special Issue for Future Generation Computer Systems (FGCS) (impact factor: 2.786): Security and Privacy Issues in Fog Computing - Topical Selection for Journal of Medical Systems (impact factor: 2.213): Medical Data Security - Special Issue for Computers & Security (impact factor: 1.031): Security Data Science and Cyber Threat Management - Special Issue for Pervasive and Mobile Computing (impact factor: 2.079): Cybersecurity for Ubiquitous Cities - Special Issue for Personal and Ubiquitous Computing (impact factor: 1.518): Security and Privacy for Smart Cities Author Instructions --- Authors are invited to submit original papers: they must not substantially duplicate work that any of the authors have published elsewhere or have submitted in parallel to any other conferences that have proceedings or any journal. The submission must be anonymous, with no author names, affiliations, acknowledgements, or obvious references. Original contributions are invited up to 12 pages in length (single column) excluding appendices and bibliography and up to 20 pages in total, using at least 11-point fonts and with reasonable margins. Submissions not meeting the submission guidelines risk rejection without consideration of their merits. Papers should be submitted via easychair ( https://easychair.org/conferences/?conf=acisp2016). Authors of accepted papers must guarantee that at least one of the authors will register and attend the conference and present their paper. The proceeding will be published by Springer as a volume of the Lecture Notes in Computer Science (LNCS) series. Keynote Speakers Professor Elisa Bertino Purdue University, United States. Professor Chris Mitchell Royal Holloway, University of London, United Kingdom Conference Organization --- General Chair Yang Xiang, Deakin University, Australia Program Co-Chairs Joseph K. Liu, Monash University, Australia Ron Steinfeld, Monash University, Australia Publication Co-Chairs Dong Seong Kim, University of Canterbury, New Zealand Kaitai Liang, Aalto University, Finland Publicity Chair Nalin Asanka, University of New South Wales, Australia Web Chair Yu Wang, Deakin University, Australia Program Committee Cristina Alcaraz, University of Malaga, Spain Myrto Arapinis, University of Edinburgh, UK Claudio A. Ardagna, Università degli Studi di Milano, Italy David Aspinall, University of Edinburgh, UK Giuseppe Ateniese, Sapienza University of Rome, Italy
[Spam:*****] [Om-announce] The 14th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2016), Auckland, New Zealand, 8-12 August 2016
Apologies if you receive multiple copies of this message IEEE DASC 2016 CFP *** The 14th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2016) http://cse.stfx.ca/~dasc2016/ Auckland, New Zealand, 8-12 August 2016 Sponsored by IEEE, IEEE Computer Society and IEEE Technical Committee of Scalable Computing (TCSC) INTRODUCTION = As computer systems become increasingly large and complex, their Dependability, Security and Autonomy play critical role at supporting next-generation science, engineering, and commercial applications. These systems consist of heterogeneous software/hardware/network components of changing capabilities, availability, and in varied contexts. They provide computing services to large pools of users and applications, and thus are exposed to a number of dangers such as accidental/deliberate faults, virus infections, malicious attacks, illegal intrusions, natural disasters, etc. As a result, too often computer systems fail, become compromised, or perform poorly and therefore untrustworthy. Thus, it remains a challenge to design, analyse, evaluate, and improve the dependability and security for a trusted computing environment. Trusted computing targets computing and communication systems as well as services that are autonomous, dependable, secure, privacy protect-able, predictable, traceable, controllable, assessable and sustainable. The scale and complexity of information systems evolve towards overwhelming the capability of system administrators, programmers, and designers. This calls for the autonomic computing paradigm, which meets the requirements of self-management by providing self-optimization, self-healing, self-configuration, and self-protection. As a promising means to implement dependable and secure systems in a self-managing manner, autonomic computing technology needs to be further explored. On the other hand, any autonomic system must be trustworthy to avoid the risk of losing control and retain confidence that the system will not fail. Trusted and autonomic computing and communications need synergistic research efforts covering many disciplines, ranging from computer science and engineering, to the natural sciences and the social sciences. It requires scientific and technological advances in a wide variety of fields, as well as new software, system architectures, and communication systems that support the effective and coherent integration of the constituent technologies. DASC 2016 will be held on 8-12 August 2016 in Auckland, New Zealand, co-located with CyberSciTech 2016, IEEE DataCom 2016 and IEEE PICom 2016. It aims to bring together computer scientists, industrial engineers, and researchers to discuss and exchange experimental and theoretical results, novel designs, work-in-progress, experience, case studies, and trend-setting ideas in the areas of dependability, security, trust and/or autonomic computing systems. SCOPE AND TOPICS Topics of particular interests include the following tracks, but are not limited to: - Autonomic Computing Theory, Models, Architectures and Communications - Cloud Computing with Autonomic and Trusted Environment - Dependable Automatic Control Techniques and Systems - Dependability Models and Evaluation Algorithms - Dependable Sensors, Devices, Embedded Systems - Dependable Electronic-Mechanical Systems, Optic-Electronic Systems - Self-improvement in Dependable Systems - Self-healing, Self-protection and Fault-tolerant Systems - Hardware and Software Reliability, Verification and Testing - Software Engineering for Dependable Systems - Safety-critical Systems in Transportation and Power System - Security Models and Quantifications - Trusted P2P, Web Service, SoA, SaaS, EaaS, and PaaS - Self-protection and Intrusion-detection in Security - DRM, Watermarking Technology, IP Protection - Context-aware Access Control - Virus Detections and Anti-Virus Techniques/Software - Cyber Attack, Crime and Cyber War - Human Interaction with Trusted and Autonomic Computing Systems - Security, Dependability and Autonomic Issues in Ubiquitous Computing - QoS in Communications and Services - Information and System Security - Reliable Computing and Trusted Computing - Wireless Emergency and Security Systems - Information Technology in Biomedicine - Multimedia Security Issues over Mobile and Wireless Networks - Multimedia in Mobile Computing: Issues, System Design and Performance Evaluation - Software Architectures and Design for Emerging Systems - Software Engineering for Emerging Networks, Systems, and Mobile Systems - Service Oriented Architectures IMPORTANT DATES === Workshop Proposal Due: 29 February 2016 Paper Submission Due: 15 March 2016 Author Notification: 30 April 2016 Camera-ready Paper Due: 31 May 2016 Registration Due: 31 May 2016 Conference Date: 8-12 August 2016 PAPER SUBMISSION GUIDELINE
[Spam:*****] [Om-announce] [CFP] 2nd ACM Cyber-Physical System Security Workshop (ACM CPSS’16)
*** Apologies for multiple copies *** C a l l F o r P a p e r s ACM CPSS’16 CALL FOR PAPERS 2nd ACM Cyber-Physical System Security Workshop Xi’an, China - May 31, 2016 (in conjunction with ACM AsiaCCS'16) http://icsd.i2r.a-star.edu.sg/cpss16/ === Important Dates --- Submission due:Dec 5, 2015 Notification: Feb 15, 2016 Camera-ready due: March 15, 2016 Cyber-Physical Systems (CPS) consist of large-scale interconnected systems of heterogeneous components interacting with their physical environments. There are a multitude of CPS devices and applications being deployed to serve critical functions in our lives. The security of CPS becomes extremely important. This workshop will provide a platform for professionals from academia, government, and industry to discuss how to address the increasing security challenges facing CPS. Besides invited talks, we also seek novel submissions describing theoretical and practical security solutions to CPS. Papers that are pertinent to the security of embedded systems, SCADA, smart grid, and critical infrastructure networks are all welcome, especially in the domains of energy and transportation. Topics of interest include, but are not limited to: - Adaptive attack mitigation for CPS - Authentication and access control for CPS - Availability, recovery and auditing for CPS - Data security and privacy for CPS - Embedded systems security - EV charging system security - Intrusion detection for CPS - IoT security - Key management in CPS - Legacy CPS system protection - Lightweight crypto and security - SCADA security - Security of industrial control systems - Smart grid security - Threat modeling for CPS - Urban transportation system security - Vulnerability analysis for CPS - Wireless sensor network security Steering Committee -- Dieter Gollmann (Hamburg University of Technology, Germany) Ravishankar Iyer (UIUC, USA) Douglas Jones (ADSC, Singapore) Javier Lopez (University of Malaga, Spain) Jianying Zhou (I2R, Singapore) ñ Chair Program Chairs -- Jianying Zhou (I2R, Singapore) Javier Lopez (University of Malaga, Spain) Publicity Chair --- Cristina Alcaraz (University of Malaga, Spain) Publication Chair - Ying Qiu (I2R, Singapore) Program Committee - Cristina Alcaraz (University of Malaga, Spain) Raheem Beyah (Georgia Tech, USA) Levente Buttyan (BME, Hungary) Alvaro Cardenas (UT Dallas, USA) Aldar Chan (ASTRI, HK) Binbin Chen (ADSC, Singapore) Songqing Chen (George Mason University, USA) Richard Chow (Intel, USA) Mauro Conti (University of Padua, Italy) Miguel Correia (University of Lisbon, Portugal) Roy Dong (UC Berkeley, USA) Xinshu Dong (ADSC, Singapore) Aurelien Francillon (EURECOM, France) Adrian Gheorghe (Old Dominion University, USA) Dieter Gollmann (Hamburg Uni of Tech, Germany) Felix Gomez-Marmol (NEC Labs, Germany) Huaqun Guo (I2R, Singapore) Adam Hahn (Washington State University, USA) Bernhard H‰mmerli (HSLU & ACRIS GmbH, Switzerland) Jin Han (Twitter, USA) Jinguang Han (NUFE, China) Feng Hao (Newcastle University, UK) Ravishankar Iyer (UIUC, USA) Douglas Jones (ADSC, Singapore) Zbigniew Kalbarczyk (UIUC, USA) Frank Kargl (University of Ulm, Germany) Sokratis Katsikas (Gj¯vik Uni College, Norway) Shinsaku Kiyomoto (KDDI R Labs, Japan) Marina Krotofil (Hamburg Uni of Tech, Germany) Alptekin K¸pÁ¸ (KoÁ University, Turkey) Miroslaw Kutylowski (Wroclaw Uni of Tech, Poland) Jason Larson (IOActive, USA) Xiapu Luo (Hong Kong Polytechnic University, HK) Ivan Martinovic (University of Oxford, UK) Weizhi Meng (I2R, Singapore) Chris Mitchell (RHUL, UK) Philippe Owezarski (LAAS-CNRS, France) Michael Papay (Northrop Grumman, USA) Jonathan Petit (University College Cork, Ireland) Axel Poschmann (NXP, Germany) Lillian J. Ratliff (UC Berkeley, USA) Erich Rome (Fraunhofer-IAIS, Germany) Roberto Setola (Universit‡ CAMPUS, Italy) Christoph Schmittner (AIT, Austria) Martin Strohmeier (University of Oxford, UK) Nils Kalstad Svendsen (Gjovik Uni College, Norway) Tsuyoshi Takagi (Kyushu University, Japan) Juan Tapiador (Uni Carlos III de Madrid, Spain) Nils Ole Tippenhauer (SUTD, Singapore) Long Wang (IBM Research, USA) Jia Xu (I2R, Singapore) Qiang Yan (Google, Switzerland) Yanjiang Yang (I2R, Singapore) David Yau (SUTD, Singapore) Siu-Ming Yiu (University of Hong Kong, HK) Ye Zhang (Google, USA) Peng Zhou (Shanghai University, China) Wanlei Zhou (Deakin University, Australia) Submission Instructions --- Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. All submissions should be appropriately anonymized (i.e., papers should not contain author names or affiliations, or obvious citations). Submissions must be in double-column ACM SIG Proceedings format, and should not exceed 12 pages. Position papers
[Om-announce] CFP: NSS 2015 New York - NEW SCI-Indexed Journal Special Issues
== NSS 2015 CALL FOR PAPERS The 9th International Conference on Network and System Security November 3-5, 2015, New York City, USA http://anss.org.au/nss2015/ == * NEWS * NSS2015 is now featuring four journal special issues, including IEEE Transactions on Dependable and Secure Computing, ACM Transactions on Embeded Computing, Concurrency and Computation: Practice and Experience, and Future Generation Computer Systems. *IMPORTANT DATES* Paper submission: June 30, 2015 Notification of acceptance: August 1, 2015 Camera-Ready due: August 20, 2015 *SCOPE* NSS is an annual international conference covering research in network and system security. The objective of NSS'15 is to provide an opportunity for researchers from academia, industry, and government to present novel research on all theoretical and practical aspects of network security, privacy, applications security, and system security. Besides the usual presentations at the regular paper track, we are going to organize a Work-in-Process (WiP) session on cyber security. The WiP session will be devoted to the presentation of new and on-going research on cyber security, and we are especially interested in new and creative ideas and approaches. Contributors to the WiP session will be asked to give a short presentation of their work and prepare a poster for discussion during the poster sessions. The scope for this call is similar to that of the CFP for the papers track. Topics of interest include, but are not limited to: - Active Defense Systems - Adaptive Defense Systems - Applied Cryptography - Analysis, Benchmark of Security Systems - Authentication - Biometric Security - Complex Systems Security - Database and System Security - Data Protection - Data/System Integrity - Distributed Access Control - Distributed Attack Systems - Denial-of-Service - High Performance Network Virtualization - Hardware Security - High Performance Security Systems - Identity Management - Intelligent Defense Systems - Insider Threats - Intellectual Property Rights Protection - Internet and Network Forensics - Intrusion Detection and Prevention - Key Distribution and Management - Large-scale Attacks and Defense - Malware - Network Resiliency - Network Security - RFID Security and Privacy - Security Architectures - Security for Critical Infrastructures - Security in P2P systems - Security in Cloud and Grid Systems - Security in E-Commerce - Security in Pervasive/Ubiquitous Computing - Security and Privacy in Smart Grid - Security and Privacy in Wireless Networks - Security Policy - Secure Mobile Agents and Mobile Code - Security Theory and Tools - Standards and Assurance Methods - Trusted Computing - Trust Management - World Wide Web Security *SUBMISSION INSTRUCTIONS* Only PDF files will be accepted. If accepted, one of the authors is expected to present the paper at the conference. Regular and Short Paper Session --- Submissions must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Submissions should be at most 14 pages for regular papers and 8 pages for short papers in LNCS format, including the bibliography and appendices. Authors are encouraged to prepare their submissions following Springer's LNCS Author Guidelines. The submission must be anonymous, with no author names, affiliations, acknowledgements, or obvious references. Conference proceedings will be published by Springer-Verlag as a volume of the Lecture Notes in Computer Science (LNCS) series. Work-in-Progress Session WiP submissions should be at most 2 pages in IEEE format, including the bibliography. All accepted WiP papers will be included in a proceeding published by IEEE. Submission Portal - Submissions must be made to the submission website at https://www.easychair.org/conferences/?conf=nss2015. *JOURNAL SPECIAL ISSUES* Selected papers of NSS2015 will be invited to the following journal special issues: IEEE Transactions on Dependable and Secure Computing, ACM Transactions on Embeded Computing, Concurrency and Computation: Practice and Experience, and Future Generation Computer Systems. *CONFERENCE COMMITTEES* General Chairs Meikang Qiu, Pace University, USA Elisa Bertino, Purdue University, USA Program Chair Shouhuai Xu, University of Texas at San Antonio, USA Moti Yung, Columbia University, USA Haibo Zhang, University of Otago, New Zealand WebPublicity Chair Qingji Zheng, Huawei Research, USA Steering Committees Elisa Bertino, Purdue University, USA Robert H. Deng, Singapore Management University, Singapore Dieter Gollmann, Hamburg University of Technology, Germany Xinyi
[Om-announce] CFP SocialSec 2015 featuring 4 SCI-Indexed Journal Special Issues
International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec 2015), Hangzhou, China, 16-18 November, 2015 http://anss.org.au/socialsec2015/ Important Dates === Submission: 30 June 2015 (Extended) Author Notification: 10 August 2015 Registration and camera-ready due: 24 August 2015 Conference: 16-18 November 2015 Special Issues === Selected papers will be invited to the following journal special issues: [1] Social Network Security in IEEE Transactions on Dependable and Secure Computing (Impact Factor: 1.137) [2] Embedded Device Forensics and Security: State of the Art Advances in ACM Transactions on Embedded Computing (Impact Factor: 0.68) http://acmtecs.acm.org/special-issues/15/edfs2015.html [3] Security and Privacy in Social Networks in Concurrency and Computation: Practice and Experience (Impact Factor: 0.784) http://www.cc-pe.net/journalinfo/issues/2015.html#NSS2015 [4] Advance in Secure Data Storage and Computation in Cloud in Security and Communication Networks (pending, Impact Factor: 0.433) Keynote Speeches Keynote 1: Data-Driven Privacy Analysis Professor Keith W. Ross Dean of Engineering and Computer Science, NYU Shanghai Leonard J. Shustek Professor of Computer Science, CSE Dept, NYU Keynote 2: Identifying Propagation Sources in Social Networks Professor Wanlei Zhou Alfred Deakin Professor, Chair of Information Technology, School of Information Technology, Deakin University, Melbourne, Australia Conference Outline == Social Networks and Big Data have pervaded all aspects of our daily lives. With their unparalleled popularity, social networks have evolved from the platforms for social communication and news dissemination, to indispensable tools for professional networking, social recommendations, marketing, and online content distribution. Social Networks, together with other activities, produce Big Data that beyond the ability of commonly used computer software and hardware tools to capture, manage, and process within a tolerable elapsed time. Due to their scale, complexity and heterogeneity, a number of technical and social challenges in Social Networks and Big Data must be addressed. It has been widely recognized that security and privacy are the critical issues. On one hand, Social Networks and Big Data have been the effective platform for the attackers to launch attacks and distribute malicious information. On the other hand, privacy leakage through Social Networks and Big Data has become common exercise. The aim of SocialSec 2015 is to provide a leading edge forum to foster interactions between researchers and developers with the security and privacy communities in Social Networks and Big Data, and to give attendees an opportunity to interact with experts in academia, industry, and governments. Conference Topics = The conference seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and privacy in Social Networks and Big Data. Papers describing case studies, implementation experiences, and lessons learned are also encouraged. Topics of interest include but are not limited to: -Attacks in/via Social Networks -Information control and detection -Malicious behaviour modelling in Social Networks -Malicious information propagation via Social Networks -Phishing problems in Social Networks -Privacy protection in Social Networks -Big Data analytics for threats and attacks prediction -Spam problems in Social Networks -Trust and reputations in Social Networks -Big Data outsourcing -Big Data forensics -Big SociaData -Security and privacy in Big Database -Applied Cryptography for Big Data -Big Data system security -Mobile Social Networks security -Security and privacy in cloud -Forensics in Social Networks and Big Data Instructions for authors Submission Website: https://easychair.org/conferences/?conf=snab2015 Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be clearly presented in English, must not exceed 8 pages in A4 format, including tables, figures, references and appendixes, in IEEE Computer Society proceedings format with Portable Document Format (.pdf). Please refer to http://www.ieee.org/conferences_events/conferences/publishing/templates.html for preparing the submission. Papers will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation. Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the conference to present the work. Conference Organisation
[Om-announce] CFP SocialSec 2015, Hangzhou, China, 16-18 November, 2015
International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec 2015), Hangzhou, China, 16-18 November, 2015 http://anss.org.au/socialsec2015/ Important Dates === Submission: 15 June 2015 Author Notification: 10 August 2015 Registration and camera-ready due: 24 August 2015 Conference: 16-18 November 2015 Keynote Speeches Keynote 1: Data-Driven Privacy Analysis Professor Keith W. Ross Dean of Engineering and Computer Science, NYU Shanghai Leonard J. Shustek Professor of Computer Science, CSE Dept, NYU Keynote 2: Identifying Propagation Sources in Social Networks Professor Wanlei Zhou Alfred Deakin Professor, Chair of Information Technology, School of Information Technology, Deakin University, Melbourne, Australia Conference Outline == Social Networks and Big Data have pervaded all aspects of our daily lives. With their unparalleled popularity, social networks have evolved from the platforms for social communication and news dissemination, to indispensable tools for professional networking, social recommendations, marketing, and online content distribution. Social Networks, together with other activities, produce Big Data that beyond the ability of commonly used computer software and hardware tools to capture, manage, and process within a tolerable elapsed time. Due to their scale, complexity and heterogeneity, a number of technical and social challenges in Social Networks and Big Data must be addressed. It has been widely recognized that security and privacy are the critical issues. On one hand, Social Networks and Big Data have been the effective platform for the attackers to launch attacks and distribute malicious information. On the other hand, privacy leakage through Social Networks and Big Data has become common exercise. The aim of SocialSec 2015 is to provide a leading edge forum to foster interactions between researchers and developers with the security and privacy communities in Social Networks and Big Data, and to give attendees an opportunity to interact with experts in academia, industry, and governments. Conference Topics = The conference seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and privacy in Social Networks and Big Data. Papers describing case studies, implementation experiences, and lessons learned are also encouraged. Topics of interest include but are not limited to: -Attacks in/via Social Networks -Information control and detection -Malicious behaviour modelling in Social Networks -Malicious information propagation via Social Networks -Phishing problems in Social Networks -Privacy protection in Social Networks -Big Data analytics for threats and attacks prediction -Spam problems in Social Networks -Trust and reputations in Social Networks -Big Data outsourcing -Big Data forensics -Big SociaData -Security and privacy in Big Database -Applied Cryptography for Big Data -Big Data system security -Mobile Social Networks security -Security and privacy in cloud -Forensics in Social Networks and Big Data Instructions for authors Submission Website: https://easychair.org/conferences/?conf=snab2015 Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be clearly presented in English, must not exceed 8 pages in A4 format, including tables, figures, references and appendixes, in IEEE Computer Society proceedings format with Portable Document Format (.pdf). Please refer to http://www.ieee.org/conferences_events/conferences/publishing/templates.html for preparing the submission. Papers will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation. Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the conference to present the work. Conference Organisation === General Chairs -- Jifeng He, East China Normal University, China Yang Xiang, Deakin University, Australia Program Chairs -- Wenzhi Chen, Zhejiang University, China Elisa Bertino, Purdue University, USA Xinyi Huang, Fujian Normal University, China Program Committee - Gail-Joon Ahn, Arizona State University, USA Cristina Alcaraz, University of Malaga, Spain Man Ho Au, Hong Kong Polytechnic University Joonsang Baek, KUSTAR, UAE Filipe Beato, University of Leuven, Belgium Ero Balsa, University of Leuven, Belgium Barbara Carminati, University of Insubria, Italy David Chadwick, University of Kent, UK Richard Chbeir, CNRS, France Xiaofeng Chen,
[Om-announce] CFP: NSS 2015, New York City, USA, November 3-5, 2015
= NSS 2015 CALL FOR PAPERS The 9th International Conference on Network and System Security November 3-5, 2015, New York City, USA http://anss.org.au/nss2015/ = *IMPORTANT DATES* Paper submission: May 30, 2015 Notification of acceptance: August 1, 2015 Camera-Ready due: August 20, 2015 *SCOPE* NSS is an annual international conference covering research in network and system security. The objective of NSS'15 is to provide an opportunity for researchers from academia, industry, and government to present novel research on all theoretical and practical aspects of network security, privacy, applications security, and system security. Besides the usual presentations at the regular paper track, we are going to organize a Work-in-Process (WiP) session on cyber security. The WiP session will be devoted to the presentation of new and on-going research on cyber security, and we are especially interested in new and creative ideas and approaches. Contributors to the WiP session will be asked to give a short presentation of their work and prepare a poster for discussion during the poster sessions. The scope for this call is similar to that of the CFP for the papers track. Topics of interest include, but are not limited to: - Active Defense Systems - Adaptive Defense Systems - Applied Cryptography - Analysis, Benchmark of Security Systems - Authentication - Biometric Security - Complex Systems Security - Database and System Security - Data Protection - Data/System Integrity - Distributed Access Control - Distributed Attack Systems - Denial-of-Service - High Performance Network Virtualization - Hardware Security - High Performance Security Systems - Identity Management - Intelligent Defense Systems - Insider Threats - Intellectual Property Rights Protection - Internet and Network Forensics - Intrusion Detection and Prevention - Key Distribution and Management - Large-scale Attacks and Defense - Malware - Network Resiliency - Network Security - RFID Security and Privacy - Security Architectures - Security for Critical Infrastructures - Security in P2P systems - Security in Cloud and Grid Systems - Security in E-Commerce - Security in Pervasive/Ubiquitous Computing - Security and Privacy in Smart Grid - Security and Privacy in Wireless Networks - Security Policy - Secure Mobile Agents and Mobile Code - Security Theory and Tools - Standards and Assurance Methods - Trusted Computing - Trust Management - World Wide Web Security *SUBMISSION INSTRUCTIONS* Only PDF files will be accepted. If accepted, one of the authors is expected to present the paper at the conference. Regular and Short Paper Session --- Submissions must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Submissions should be at most 14 pages for regular papers and 8 pages for short papers in LNCS format, including the bibliography and appendices. Authors are encouraged to prepare their submissions following Springer's LNCS Author Guidelines. The submission must be anonymous, with no author names, affiliations, acknowledgements, or obvious references. Conference proceedings will be published by Springer-Verlag as a volume of the Lecture Notes in Computer Science (LNCS) series. Work-in-Progress Session WiP submissions should be at most 2 pages in IEEE format, including the bibliography. All accepted WiP papers will be included in a proceeding published by IEEE. Submission Portal - Submissions must be made to the submission website at https://www.easychair.org/conferences/?conf=nss2015. *JOURNAL SPECIAL ISSUES* Selected papers from the proceedings will be invited to two SCI-indexed Journal special issues: One is Concurrency and Computation: Practice and Experience and the other is Future Generation Computer Systems. *CONFERENCE COMMITTEES* General Chairs Meikang Qiu, Pace University, USA Elisa Bertino, Purdue University, USA Program Chair Shouhuai Xu, University of Texas at San Antonio, USA Moti Yung, Columbia University, USA Haibo Zhang, University of Otago, New Zealand WebPublicity Chair Qingji Zheng, Huawei Research, USA Steering Committees Elisa Bertino, Purdue University, USA Robert H. Deng, Singapore Management University, Singapore Dieter Gollmann, Hamburg University of Technology, Germany Xinyi Huang, Fujian Normal University, China Kui Ren, University at Buffalo,State University of New York, USA Ravi Sandhu, University of Texas at San Antonio, USA Yang Xiang (Chair), Deakin University, Australia Wanlei Zhou, Deakin University, Australia ___ Om-announce mailing list Om-announce@openmath.org
[Om-announce] CFP: UbiSafe 2015, Helsinki, Finland, 20-22 August, 2015
*** Please accept our apologies if you receive multiple copies of this Final CFP *** *** IEEE UbiSafe 2015 paper submission deadline has been extended to 1 May, 2015 (Firm Deadline) *** *** *** *** *** *** Highlight with SCI EI indexed journal special issues *** *** *** *** *** Distinguished papers, after further revisions, will be published in several SCI EI indexed special issues: (1) Future Generation Computer Systems - Elsevier (SCIEI Indexed, Impact Factor: 2.639) http://www.journals.elsevier.com/future-generation-computer-systems/ (2) Concurrency Computation: Practice Experience - Wiley (SCIEI Indexed, Impact Factor: 0.784) http://www.cc-pe.net/journalinfo/ (3) IEICE Transactions on Information and Systems (SCIEI Indexed, Impact Factor: 0.191) http://www.ieice.org/eng/index.html *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** Final Call for Papers for the 7th IEEE International Symposium on UbiSafe Computing (UbiSafe 2015) Helsinki, Finland, 20-22 August, 2015 http://trust.csu.edu.cn/conference/UbiSafe2015/ In Conjunction with IEEE TrustCom 2015 The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2015) Helsinki, Finland, 20-22 August, 2015 https://research.comnet.aalto.fi/Trustcom2015/ Organizers: Central South University, China Aalto University, Finland Introduction Computers are now available anytime, anywhere, by different means, and distributed unobtrusively throughout everyday environments in which physical objects/artifacts embedded with invisible computers are sensible and networked locally and globally. Such any computers open tremendous opportunities to provide numerous novel services/applications in both real world and cyber spaces, and exist ubiquitously in our daily life, working, learning, traveling, entertainment, medicine, etc. Although it is yet unclear what exactly the real-cyber integrated worlds would be, there is no doubt that they must be safe. The 7th IEEE International Symposium on Ubisafe Computing (UbiSafe 2015) will be held in conjunction with The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2015). It follows the success of UbiSafe 2014 in Beijing, China. It aims at bringing together researchers and practitioners in the world working on theories and technologies for ubiquitous artifacts to function safely for different purposes; for ubiquitous systems to work safely in various situations; and for ubiquitous environments to behave safely with all people. Scope and Interests UbiSafe 2015 is an international symposium for presenting and discussing emerging ideas and trends in aspects of UbiSafe computing, but are not limited to: (1) Fundamentals UbiSafe concepts, definitions, basic elements, models, frameworks and methodologies, human-centric paradigms, multi-disciplinary/inter-disciplinary/trans-disciplinary approaches, semantics, ontologies, UbiSafe requirements and formal specifications and validations, information assurance, etc. (2) Technologies Security and privacy protection, reliability and fault tolerance, risk analysis, uncertainty and exception handling, socially intelligent agents, intuitive/natural user interface, interaction design, context-awareness, intelligent computing, service-oriented computing, hardware, software, middleware, etc. (3) Systems Embedded systems, wearable systems, augmented systems, context-based systems, communication systems, safety-critical systems, survivable systems, persistent systems, autonomous/autonomic systems, proactive systems, network infrastructure, sensor networks, etc. (4) Applications Smart objects, smart environments, information appliance and artifacts, everyday gadgets, robots, safety care, healthcare, medical care and services, working, learning, traveling, entertainment, case studies, etc. (5) Measures and Assessments UbiSafe attributes and measures for safety, trust, faith, amenity, easiness, comfort, satisfaction and worry, UbiSafe levels and relations, UbiSafe quality, assessment criteria and authority, subjective and objective assessment standards, evaluation methodologies, testing, measuring and monitoring tools, etc. (6) Human Factors and Social Issues Human and social aspects of UbiSafe, UbiSafe sources and factors, social rules, regulations and laws, human factors, human behavior analysis, modeling of human feelings, traditional and cultural issues, ethical issues, etc. Submission and Publication Information All presented papers in the conference will be published in the proceedings of the conference and submitted to the IEEE Xplore Digital Library. Papers should be written in English conforming to the IEEE conference proceedings format (8.5 x 11, Two-Column). Papers should be submitted through the paper submission system at the symposium website. Each paper is limited to 6 pages (or 8 pages with the over length
[Om-announce] GPC 2015 Fiji Deadline Approaching: 01 March 2015 - Accepted Papers Published in SCI and EI Journals Directly
- 10th International Conference on Green, Pervasive and Cloud Computing (GPC 2015) Plantation Island, Fiji, 4-6 May 2015http://anss.org.au/gpc2015/ Paper submission deadline: 01 March 2015 - *** The best selected papers will be published in IEEE Systems Journal (SCI indexed), and others will be published in IJES (EI, Scopus indexed), directly. *** GPC 2015 Call For Papers GPC 2015 aims to establish a high-standard world forum for researchers and developers to share their novel ideas and experiences in the areas of green computing, pervasive computing and cloud computing. GPC 2015 features a special journal publication model: accepted papers will be directly published in IEEE Systems Journal (SCI indexed), and the International Journal of Embedded Systems (EI, Scopus indexed). Important Dates === Paper submission due: 01 March 2015 (final extension) Notification of decisions: 01 April 2015 Camera ready and registration due: 15 April 2015 Conference/Workshop dates: 4-6 May 2015 Overview Green computing in the context of cloud and pervasive computing is a newly-emerging research field in computer science and engineering. Pervasive computing and cloud computing are two promising paradigms in human's daily life. With the exponential growth in the deployments of techniques in pervasive computing and cloud computing, both of them have to face the critical issues on energy consumption, for example, controlling the energy consumed by the large-scale cloud datacenters, and prolonging the battery life of mobile devices in pervasive computing and Internet of Things (IoT). Therefore, new architectures, systems and related techniques, such as mobile cloud computing (MCC), software-defined networking (SDN) and hybrid cloud services, are being developed to make the computing in cloud datacenters and in pervasive wireless devices more productive and energy efficient, for shaping a Green world in the future. GPC 2015 is the next event in a series of highly successful events focusing on pervasive and environmentally sustainable computing. In the last nine years, the GPC conference has been successfully held and organised all over the world: Taichung, Taiwan (2006), Paris, France (2007), Kunming, China (2008), Geneva, Switzerland (2009), Hualien, Taiwan (2010), Oulu, Finland (2011), Hong Kong (2012), Seoul, Korea (2013), and Wuhan, China (2014). Topics == We invite submissions on a wide range of green computing, pervasive computing and cloud computing topics, including, but not limited to: * Energy-efficient computing, communication and virtualisation architectures and protocols * Monitoring, sensing, control and management of energy-aware systems * Integration, scheduling and management of renewable energy sources * Cloud, cluster and grid computing * Mobile, peer-to-peer and pervasive computing * Service-oriented computing * Ubiquitous communications and networks * Social network and services * Sensor, ad hoc networks, mobile agents and networking * Multimedia communications, machine to machine communications * Multi-core systems, parallel and distributed systems * Internet of things, and cyber physical systems * Trade-offs between performance, energy and other resources in cloud datacenters and pervasive computing * Energy-aware mobile cloud systems and large-scale applications * Semantic web, semantic grid, metadata and ontology related to pervasive and distributed computing * Programming models, tools and environments for distributed and pervasive computing * Modeling and control of variability in demand and supply of green energy sources * Economy and business models in cloud computing and pervasive computing * Incentives and innovative pricing for the management of cloud resources * Service Level Agreements (SLAs) guarantee for customers in cloud computing * Data analytics for energy-efficient systems * Innovative technologies for robustness and reliability of energy-aware systems * Security and privacy in pervasive and cloud computing * Grid and pervasive applications, including eScience and eBusiness applications Submission == Authors are invited to submit original research contributions by following the instructions below. Step 1 Prepare your paper by using the journal format template as in the Author Instructions Page (http://www.ieeesystemsjournal.org/author-instructions/). Step 2 Prepare the cover letter and explicitly state that the paper is submitted to the Special Issue on Green Pervasive and Ubiquitous Systems IMPORTANT!. Step 3 Submit your paper with the cover letter through the Submission Page (http://mc.manuscriptcentral.com/ieee-sj). Step 4 Send a copy of your paper with the cover letter to gpc2...@easychair.org. Note: all submissions to GPC 2015 shall go through the
[Om-announce] CFP: PE-WASUN 2015, Cancun, Mexico, November 2nd - 6th, 2015
Apologies if you receive multiple copies of this Call for Papers ** C a l l F o r P a p e r s ACM* PE-WASUN 2015 12th ACM* International Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks (Jointly with the 18th ACM MSWiM Conference) http://sertel.upc.es/pe-wasun15/ Cancun, Mexico November 2nd - 6th, 2015 (*ACM sponsorship approval pending) ** * Scope * Wireless ad hoc, sensor, along with ubiquitous networks have recently witnessed their fastest growth period ever in history, and this trend is likely to continue for the foreseeable future. However, as such networks become increasingly complex, performance modelling and evaluation will play a crucial part in their design process to ensure their successful deployment and exploitation in practice. This symposium will bring together scientists, engineers, and practitioners to share and exchange their experiences, discuss challenges, and report state-of-the-art and in-progress research on all aspects of wireless ad hoc, sensor, and ubiquitous networks with a specific emphasis on their performance evaluation and analysis. Topics of interest include, but are not limited to: - Predictive performance models of ad hoc, sensor, and ubiquitous networks - Probabilistic models for ad hoc, sensor and ubiquitous networks - Queuing and network information theoretic analysis - Analytical modeling and simulation methods - Automatic performance analysis - Tracing and trace analysis - Software tools for network performance and evaluation - Performance measurement, evaluation and monitoring tools for ad hoc, sensor and ubiquitous networks - Case studies demonstrating the role of performance evaluation in the design of ad hoc, sensor and ubiquitous networks - Network performance improvement through optimization and tuning - Mobility modeling and management - Traffic models for ad hoc, sensor networks - Performance evaluation of wireless mesh networks - Performance evaluation of pervasive and ubiquitous networks - Performance evaluation of VANETs - Performance of wireless and sensor devices - Performance of spectrum agile and cognitive wireless sensor networks - Analysis of multimedia applications over wireless ad-hoc and sensor networks - Performance of pervasive computing and services - Analysis of mobile cloud networking and computing - Performance of continuity of service over heterogeneous networks, seamless connectivity - Analysis of security and privacy in ad hoc networks and ubiquitous networks General Chair -- Mónica Aguilar Igartua Universitat Politècnica de Catalunya (UPC), Spain monica.agui...@entel.upc.edu Program Co-Chairs -- Carolina Tripp Barba Universidad Autónoma de Sinaloa, Mexico ctr...@uas.edu.mx Cristina Alcaraz Tello University of Malaga, Spain alca...@lcc.uma.es Poster/Demo/Tools Chair Luis Urquiza Aguiar Universitat Politècnica de Catalunya, Spain luis.urqu...@entel.upc.edu Publicity Chair Xinyi Huang Fujian Normal University, China xyhu...@fjnu.edu.cn Program Committee Members -- http://sertel.upc.edu/pe-wasun15/committees.html * Paper Submission * Authors are required to submit their papers through EasyChair on the following link: https://www.easychair.org/conferences/?conf=pewasun2015. The length of the papers should not exceed 8 single-spaced pages (in two-column format), ACM style including tables and figures. A template for ACM SIG Proceedings style (LaTeX2e and MS Word) can be found at http://www.acm.org/sigs/pubs/proceed/template.html. Accepted papers will appear in the ACM symposium proceedings. The authors of accepted papers must guarantee that their paper will be presented at the Symposium. At least one author of each accepted paper must be registered for the symposium, in order for that paper to appear in the proceedings and to be scheduled for presentation. Important Dates Full paper due: June 5th, 2015 Acceptance notification: July 10th, 2015 Camera ready due: TBA Speaker Author Registration: TBA Symposium: November 2nd - 6th, 2015 - Jointly with MSWiM'15 We hope to see you in Mexico. Yours sincerely, --- Mónica Aguilar Igartua Associate Professor Department of Telematic Engineering Universitat Politècnica de Catalunya (UPC), Barcelona, Spain Email: monica.agui...@entel.upc.edu URL: http://sertel.upc.es/users/maguilar --- Carolina Tripp Barba Assistant Professor Facultad de Informática Mazatlán Universidad Autónoma de Sinaloa, Mexico Email: ctr...@uas.edu.mx URL: https://sites.google.com/site/carotripp ---
[Om-announce] CFP 11th Information Security Practice and Experience Conference (ISPEC 2015), 5-8 May 2015, Beijing, China
*** Apologies for multiple copies *** Call For Papers The 11th Information Security Practice and Experience Conference (ISPEC 2015) 5-8 May 2015, Beijing, China http://icsd.i2r.a-star.edu.sg/ispec2015/ Conference Outline: ISPEC is an annual conference that brings together researchers and practitioners to provide a confluence of new information security technologies, their applications and their integration with IT systems in various vertical sectors. The previous ISPEC conference series were successfully held in Singapore, Hangzhou, Hong Kong, Sydney, Xi’an, Seoul, Guangzhou, Hangzhou, Lanzhou and Fuzhou. The eleventh ISPEC will be held in Beijing, China, 5-8 May 2015. ISPEC 2015 will be hosted by Beihang University, China. Conference Topics: • Access control • Network security • Applied cryptography • Privacy and anonymity • Availability, resilience, and usability • Risk evaluation and security certification • Big data and Cloud security • Security for cyber-physical systems • Cryptanalysis • Security of smart cards and RFID systems • Embedded system security • Security policy • Database security • Security protocols • Digital Forensics • Security systems • Digital rights management • Smart Grid Security • Information security in vertical applications • Smartphone Security • Intrusion detection • Trust model and management • Multimedia security • Trusted computing Instructions for authors: Authors are invited to submit original papers which are not previously published nor submitted in parallel for publication to any other conference, workshop or journal. All submitted papers must be anonymous, with no author names, affiliations, acknowledgements, or obvious references. Submissions must be in English and in PDF format. The final camera ready version of an accepted paper will be at most 15 pages in the LNCS style. The manuscript submitted should correspond to what the authors expect to be published without modification. We therefore strongly recommend that authors check whether their paper will fit within the above LNCS space constraints. Submitted papers may risk being rejected directly without consideration of their merits if they do not follow the above submission instructions. The proceedings will be published by Springer in their Lecture Notes in Computer Science series, and will be available at the conference. At least one author of each accepted paper should register and give presentation at the conference. The URL for online submission is available @ http://icsd.i2r.a-star.edu.sg/ispec2015/submission Important Dates: Submission Due: 14 December 2014 Notification to Authors: 8 February 2015 Camera-ready Copy Due: 23 February 2015 Conference dates: 5-8 May 2015 Conference Organization: Honorary Chairs • Feng Bao (Huawei, Singapore) • Weifeng LV (Beihang University, China) General Chairs • Qinghua Cao (Beihang University, China) • Robert Deng (Singapore Management Univ., Singapore) Program Chairs • Zhoujun Li (Beihang University, China) • Javier Lopez (University of Malaga, Spain) • Yongdong Wu (Inst. for Infocomm Research, Singapore) Publicity Chairs: • Cristina Alcaraz (University of Malaga, Spain) Program Committee: Joonsang Baek, KUSTAR, UAE Zhenfu Cao, Shanghai Jiao Tong University, China David Chadwick, University of Kent, UK Aldar Chun-fai Chan, Applied Science and Technology Research Institute, HK Binbin Chen, ADSC, Singapore Liqun Chen, HP Labs, UK Cheng-Kang Chu, Huawei, Singapore Xuhua Ding, SMU, Singapore Roberto Di Pietro, Università di Roma Tre, Italy Haixin Duan, Tsinghua University, China Juan Estevez-Tapiador, UC3M, Spain Sara Foresti, University of Milan, Italy Dieter Gollmann, Hamburg University of Technology, Germany Felix Gomez Marmol, NEC Labs, Germany Dimitris Gritzalis, AUEB, Greece Stefanos Gritzalis, University of Aegean, Greece Hua Guo, Beihang University, China Xinyi Huang, Fujian Normal University, China Alejandro Hevia, University of Chile, Chile Lucas Hui, Hong Kong University, HK Sokratis Katsikas, University of Piraeus, Greece Miroslaw Kutylowski, Wroclaw University of Technology, Poland Jiguo Li, Hohai University, China Jinming Li, Huawei, China Tieyan Li, Huawei, Singapore Yingjiu Li, SMU, Singapore Joseph Kai Sui Liu, I2R, Singapore Di Ma, University of Michigan-Dearborn, USA Jianfeng Ma, Xidian University, China Masahiro Mambo, Kanazawa University, Japan Kostas Markantonakis, Royal Holloway, UK Gregorio Martinez, University of Murcia, Spain Sjouke Mauw, University of Luxembourg, Luxembourg Catherine Meadows, NRL, USA David Nacacche, ENS, France Eiji Okamoto, University of Tsukuba, Japan Rene Peralta, NIST, USA Pedro Peris, UC3M, Spain Raphael C.-W. Phan, Multimedia University, Malaysia Mark Ryan, University of Birmingham, UK Rei Safavi-Naini, University of Calgary Kouichi Sakurai, Kyushu University, Japan Pierangela Samarati, University of Milan, Italy Wenchang Shi, Renmin University of China, China Miguel Soriano, UPC, Spain
[Om-announce] CFP: GPC 2015
Apologies if you receive multiple copies of the following message -- 10th International Conference on Green, Pervasive and Cloud Computing (GPC 2015) Plantation Island, Fiji, 4-6 May 2015http://anss.org.au/gpc2015/ -- GPC 2015 Call For Papers GPC 2015 aims to establish a high-standard world forum for researchers and developers to share their excellent ideas and experiences in the areas of green computing and communications in the broad context of pervasive computing and cloud computing. GPC 2015 features a special publication model: in addition to the publication in Springer LNCS proceedings (EI, Scopus indexed), a number of top ranked papers will be directly published in a Special Issue of IEEE Systems Journal (SCI indexed). Important Dates === Extended Paper submission due: 30 November 2014 Notification of decisions: 31 January 2015 Camera ready and registration due: 28 February 2015 Conference/Workshop dates: 4-6 May 2015 Overview Green computing in the context of cloud and pervasive computing is a newly-emerging research field in computer science and engineering. Pervasive computing and cloud computing are two promising paradigms in human's daily life. With the exponential growth in the deployments of techniques in pervasive computing and cloud computing, both of them have to face the critical issues on energy consumption, for example, controlling the energy consumed by the large-scale cloud datacenters, and prolonging the battery life of mobile devices in pervasive computing and Internet of Things (IoT). Therefore, new architectures, systems and related techniques, such as mobile cloud computing (MCC), software-defined networking (SDN) and hybrid cloud services, are being developed to make the computing in cloud datacenters and in pervasive wireless devices more productive and energy efficient, for shaping a Green world in the future. GPC 2015 is the next event in a series of highly successful events focusing on pervasive and environmentally sustainable computing. In the last nine years, the GPC conference has been successfully held and organised all over the world: Taichung, Taiwan (2006), Paris, France (2007), Kunming, China (2008), Geneva, Switzerland (2009), Hualien, Taiwan (2010), Oulu, Finland (2011), Hong Kong (2012), Seoul, Korea (2013), and Wuhan, China (2014). Topics == We invite submissions on a wide range of green, pervasive and cloud computing topics, including, but not limited to: * Energy-efficient computing, communication and virtualisation architectures and protocols * Trade-offs between performance, energy and other resources in cloud datacenters and pervasive computing * Energy-aware mobile cloud systems and large-scale applications * Energy management in multi-core systems, parallel and distributed systems, machine to machine communications, social networks and services * Energy-aware control in the Internet of Things, such as buildings and electric vehicle systems * Monitoring, sensing, control and management of energy-aware systems * Integration, scheduling and management of renewable energy sources * Modeling and control of variability in demand and supply of green energy sources * Instrumentation and measurement studies on energy-efficient systems * Economy and business models in cloud computing and pervasive computing * Incentives and innovative pricing for the management of cloud resources * Service Level Agreements (SLAs) guarantee for customers in cloud computing * Data analytics for energy-efficient systems * Innovative technologies for robustness and reliability of energy-aware systems * Security and privacy in pervasive and cloud computing Submission == Authors are invited to submit original research contributions by following the detailed instructions given in the Author Instructions section at IEEE Systems Journal website. In the cover letter, authors should explicitly state that the paper is submitted to the Special Issue on Green Pervasive and Ubiquitous Systems. Please follow the GPC 2015 submission deadlines. Note: all submissions to GPC 2015 shall go through the review system of IEEE Systems Journal. The review process will take place in the specified time frame. A number of top-ranked papers will be selected to publish in the journal special issue, while other accepted papers will be published in LNCS proceedings (which shall then follow the LNCS paper format with a page limit of 12~14 pages). Questions about the paper submission may be directed to the GPC 2015 TPC Chairs: * Hai Jiang, Arkansas State University, USA, hji...@astate.edu * Ruppa K. Thulasiram, University of Manitoba, Canada, tu...@cs.umanitoba.ca * Yu Wang, Deakin University, Australia, y.w...@deakin.edu.au Quick Links: * Author Instructions -
[Om-announce] Deadline extension - GPC 2015 Conference in Fiji
10th International Conference on Green, Pervasive and Cloud Computing (GPC 2015) Plantation Island, Fiji, 4-6 May 2015 http://anss.org.au/gpc2015/ GPC 2015 Call For Papers GPC 2015 aims to establish a high-standard world forum for researchers and developers to share their excellent ideas and experiences in the areas of green computing and communications in the broad context of pervasive computing and cloud computing. GPC 2015 features a special publication model: in addition to the publication in Springer LNCS proceedings (EI, Scopus indexed), a number of top ranked papers will be directly published in a Special Issue of IEEE Systems Journal (SCI indexed). Important Dates === Extended Paper submission due: 30 November 2014 Notification of decisions: 31 January 2015 Camera ready and registration due: 28 February 2015 Conference/Workshop dates: 4-6 May 2015 Overview Green computing in the context of cloud and pervasive computing is a newly-emerging research field in computer science and engineering. Pervasive computing and cloud computing are two promising paradigms in human's daily life. With the exponential growth in the deployments of techniques in pervasive computing and cloud computing, both of them have to face the critical issues on energy consumption, for example, controlling the energy consumed by the large-scale cloud datacenters, and prolonging the battery life of mobile devices in pervasive computing and Internet of Things (IoT). Therefore, new architectures, systems and related techniques, such as mobile cloud computing (MCC), software-defined networking (SDN) and hybrid cloud services, are being developed to make the computing in cloud datacenters and in pervasive wireless devices more productive and energy efficient, for shaping a Green world in the future. GPC 2015 is the next event in a series of highly successful events focusing on pervasive and environmentally sustainable computing. In the last nine years, the GPC conference has been successfully held and organised all over the world: Taichung, Taiwan (2006), Paris, France (2007), Kunming, China (2008), Geneva, Switzerland (2009), Hualien, Taiwan (2010), Oulu, Finland (2011), Hong Kong (2012), Seoul, Korea (2013), and Wuhan, China (2014). Topics == We invite submissions on a wide range of green, pervasive and cloud computing topics, including, but not limited to: * Energy-efficient computing, communication and virtualisation architectures and protocols * Trade-offs between performance, energy and other resources in cloud datacenters and pervasive computing * Energy-aware mobile cloud systems and large-scale applications * Energy management in multi-core systems, parallel and distributed systems, machine to machine communications, social networks and services * Energy-aware control in the Internet of Things, such as buildings and electric vehicle systems * Monitoring, sensing, control and management of energy-aware systems * Integration, scheduling and management of renewable energy sources * Modeling and control of variability in demand and supply of green energy sources * Instrumentation and measurement studies on energy-efficient systems * Economy and business models in cloud computing and pervasive computing * Incentives and innovative pricing for the management of cloud resources * Service Level Agreements (SLAs) guarantee for customers in cloud computing * Data analytics for energy-efficient systems * Innovative technologies for robustness and reliability of energy-aware systems * Security and privacy in pervasive and cloud computing Submission == Authors are invited to submit original research contributions by following the detailed instructions given in the Author Instructions section at IEEE Systems Journal website. In the cover letter, authors should explicitly state that the paper is submitted to the Special Issue on Green Pervasive and Ubiquitous Systems. Please follow the GPC 2015 submission deadlines. Note: all submissions to GPC 2015 shall go through the review system of IEEE Systems Journal. The review process will take place in the specified time frame. A number of top-ranked papers will be selected to publish in the journal special issue, while other accepted papers will be published in LNCS proceedings (which shall then follow the LNCS paper format with a page limit of 12~14 pages). Questions about the paper submission may be directed to the GPC 2015 TPC Chairs: * Hai Jiang, Arkansas State University, USA, hji...@astate.edu * Ruppa K. Thulasiram, University of Manitoba, Canada, tu...@cs.umanitoba.ca * Yu Wang, Deakin University, Australia, y.w...@deakin.edu.au Quick Links: * Author Instructions - http://www.ieeesystemsjournal.org/author-instructions/ * Submission System - http://mc.manuscriptcentral.com/ieee-sj Organisation Committee == General Chairs -- A B M Shawkat Ali, The University of Fiji, Fiji Yang Xiang,