Fwd: IEEE ICC CIS-TC Netzwerksicherheits-Symposium, Aufruf zur Einreichung von Beiträgen
-------- Original-Nachricht -------- Betreff: IEEE ICC CIS-TC Netzwerksicherheits-Symposium, Aufruf zur Einreichung von Beiträgen Datum: Tue, 10 Sep 2013 11:43:32 +0200 Von: Thorsten Strufe strufe@CS.TU-DARMSTADT.DE Antwort an: Mailing List der GI FG 3.3.1 "Kommunikation und Verteilte Systeme" KUVS-L@LISTSERV.UNI-HEIDELBERG.DE An: KUVS-L@LISTSERV.UNI-HEIDELBERG.DE
Liebe Kollegen, liebe Interessierte,
für die Vielfachverteilung bitte ich um Entschuldigung, wir hoffen alle potentiell Interessierten zu erwischen!
Auch dieses Jahr hat die IEEE ICC ein Netzwerksicherheits-Symposium, die Frist läuft dieses Wochenende aus!
Mit der Bitte diese Benachrichtigung gerne in Ihren Gruppen und Kreisen potentiell Interessierter weiter zu zirkulieren verbleibe ich
mit herzlichen Grüßen,
Thorsten Strufe
- ----------------------------------------------------------------------------
IEEE International Conference on Communications IEEE ICC 2014 Communications: The Centrepoint of Digital Economy 16 - 20 June 2014, Sydney, Australia
Communications and Information Systems Security Symposium (CISS)
The 2014 IEEE International Conference on Communications (ICC) will be held in the beautiful city of Sydney, Australia between 16 and 20 June 2014. The theme of this flagship conference of IEEE Communications Society for 2014 is “Communications: The Centrepoint of Digital Economy.” The conference will feature a comprehensive technical program including twelve Symposia and a number of Tutorials and Workshops. IEEE ICC 2014 will also include an attractive expo program including keynote speakers, and Industry Forum & Exhibitions (IF&E). We invite you to submit your original technical papers, industry forum, workshop, and tutorial proposals to this event. Accepted and presented papers will be published in the IEEE ICC 2014 Conference Proceedings and in IEEE Xplore®. Full details of submission procedures are available at http://www.ieee-icc.org/2014.
Scope and Topics of Interest: The Communications and Information Systems Security Symposium (CISS) will focus on all aspects of security, privacy, trust, and risk management, which pose a serious challenge to today's globally connected society. The symposium welcomes novel contributions on evaluation, modeling, analysis, and design of communication and information systems security solutions, from the physical layer to the application layer. In addition, this year’s CISS puts a stronger emphasis on network oriented security and privacy, such as security related topics of cloud computing, networking related security in Big Data, IoT, and so on.
To ensure complete coverage of the advances in communication and information systems security, the topics of interest of the CISS include, but are not limited to, the following areas: - Anonymity, anonymous communication - Anonymity metrics and their performance analysis - Authentication protocols and message authentication - Authorization and access control - Availability and survivability of secure services and systems - Big Data security and privacy - Biometric security - Botnet detection, prevention, and defense - Cloud and distributed application security - Computer and network forensics - Cryptography and evaluation - Data center security - Firewall technologies; intrusion detection, localization, avoidance - Formal trust models, security modeling and protocol design - Key distribution and management - Lightweight security - Location-based services and their security and privacy aspects - Mobile and Wireless network security - Mobile App security and privacy - Multi-mode surveillance and homeland security - Network public opinion analysis and monitoring - Network security metrics and their performance evaluation - Operating systems and application security and analysis tools - Online Social Networks and their security aspects - Physical security and hardware/software security - Privacy and privacy enhancing technologies - Quantum cryptography and communication applications - Resource allocation, incentives, and game-theoretic approaches - Security in virtual machine environments - Security in wired systems and optical networks - Security of Cyber-physical systems - Security risk management - Trust models, management and certificate handling - Virtual private networks and group security - Vulnerability, exploitation tools and virus analysis - Web, e-commerce, and m-commerce security
Submission Guidelines: Prospective authors are invited to submit original technical papers by the deadline 15 September 2013 for publication in the IEEE ICC 2014 Conference Proceedings and for oral or poster presentation(s). All submissions should be written in English with a maximum paper length of six (6) printed pages (10-point font) including figures without incurring additional page charges (a maximum of one additional page will be accepted, subject to over-length charge).
Standard IEEE Transactions templates for Microsoft Word or LaTeX formats found at http://www.ieee.org/portal/pages/pubs/transactions/stylesheets.html Alternatively you can follow the sample instructions in template.pdf at http://www.comsoc.org/confs/globecom/2008/downloads/template.pdf Only PDF files will be accepted for the review process and all submissions must be done through EDAS at https://edas.info/newPaper.php?c=15399
Important dates: Paper Submission: 15 September 2013 Acceptance Notification: 12 January 2014 Camera-Ready: 13 February 2014
Symposium Co-Chairs: Peter Mueller, IBM Zurich Research, Switzerland, pmu [at] zurich.ibm.com Shui Yu, Deakin University, Australia, syu [at] deakin.edu.au Thorsten Strufe, TU Darmstadt, Germany, strufe [at] cs.tu-darmstadt.de. - ----------------------------------------------------------------------------
participants (1)
-
Lars Wolf