| 查看: 1671 | 回复: 56 | |||||||||
| 当前只显示满足指定条件的回帖,点击这里查看本话题的所有回帖 | |||||||||
[交流]
【2014-08-24】ATIS2014: Call for Papers (EI/SCI Indexed)
|
|||||||||
会议城市: Melbourne, Australia 是否Ei/ISTP收录: Ei/ISTP双收录 截稿日期: 24/08/2014 *** ATIS2014: Call for Papers *** ========================================================================================== International Conference on Applications and Techniques in Information Security (ATIS2014) 26-28/11/2014, Melbourne, Australia URL: http://atis2014.tulip.org.au/ Mirror Site in China: http://atis.niuteam.cc Submission System: https://cmt.research.microsoft.com/ATIS2014 Accepted papers will appear in the proceedings to be published by Springer CCIS Series. Selected top quality papers accepted and presented in the ATIS2014 will be invited for extension for the special issues of some international journals, including Concurrency and Computation: Practise and Experience (SCI-indexed, ERA2010 rank A). http://www.cc-pe.net/journalinfo ... #SecuringCyberspace ========================================================================================== ========================== Important Dates ========================== Paper Submission Due: 24/08/2014 Author Notification Due: 14/09/2014 Camera Ready Due: 20/09/2014 ========================== Conference Scope ========================== The 2014 International Conference on Applications and Technologies in Information Security (ATIS), will be the fifth event in the ATIS series, which started in 2010. As academic research in information security has developed over the last twenty or so years, applications and techniques are being developed to be of specific use in this area. These include wavelets and their applications in digital forensics, classification algorithms for use in malicious software detection, and genetic algorithms custom-made for the cryptographic community, etc. ATIS 2014 focuses on all aspects on techniques and applications in information security. The purpose of ATIS is to provide a forum for presentation and discussion of innovative ideas, research results, applications and experience from around the world. The annual ATIS conference highlights new results in the design and analysis of digital security hardware and software implementations. ATIS provides a valuable connection between the theoretical and implementation communities and attracts participants from industry, academia, and government organizations. As well as a single track of high-quality presentations, ATIS 2014 will offer invited talks, hands-on training in a computer lab, digital competitions and a special school for PhD and Master students. Accepted papers will appear in the proceedings to be published by Springer CCIS Series. Selected top quality papers accepted and presented in the ATIS2014 will be invited for extension for the special issues of some international journals, including Concurrency and Computation: Practise and Experience (SCI-indexed, ERA2010 rank A). ========================== Topics of Interest ========================== Papers are invited in the areas below, but do not exclude research in the general areas of the topic headings. (1) Attacks against Implementations - Digital Forensics - Key Recovery (2) Data Privacy - Applied Data Analysis - Privacy Protection - Privacy Preservation in Data Release - Smart device information leaks - Trusted and Trustworthy Computing (3) Evaluation, standards and protocols - Domain name server security - Transport Layer Security - Risk Evaluation and Security Certification - Security Management (4) Security Implementations - Access Control - Authentication and Authorization - Cryptography - Data and System Integrity - Database Security - Distributed Systems Security - Information Hiding and Watermarking - Intellectual Property Protection - Intellectual Property Protection - Key Management - Operating System Security - Sequential/Parallel/Distributed behavior modeling (5) Tools and Methodologies - Evaluation of Security - Evaluation of Security Tools (6) Vulnerabilities - Digital Forensics - Intrusion Detection - Malicious software (7) Curbing Cyber-Crime - Blog spam detection - Botnets prevention - Click spam detection - Cloud Security - Cyber-Gossip Spread Models - Collusive crime/piracy detection - Collusive crime/piracy detection - Collaborative social recommendation - Datasets for cyber-gossips detection - Dynamic/hidden group presentation - Group and group behavior detection, tracking and recognition - Group interaction, collaboration, representation and profiling - Graph-based behavior/social modeling - Identity authentication - Poster spam detection ========================== Paper Submissions ========================== Submission is only electronic using the ATIS2014 paper submission page linked here: https://cmt.research.microsoft.com/ATIS2014 The submitted paper should adhere to the double-blind review policy. All papers will be double-blind reviewed by the Program Committee on the basis of technical quality, relevance to ATIS, originality, significance, and clarity. All paper submissions will be handled electronically. Papers that do not comply with the Submission Guidelines will be rejected without review. Please note: (1) Authors are strongly encouraged to use Springer LNCS/LNAI manuscript submission guidelines for their initial submissions. (2) All papers must be submitted electronically through the paper submission system in PDF format only, with up to 12 pages in length. (3) Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. (4) Papers must be clearly presented in English and will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation. (5) As papers will be blind refereed, submitted papers must be fully anonymous, with no author names, affiliations, acknowledgments, or obvious references. The paper must start with a title, an abstract, and keywords. (6) Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the conference to present the work. ========================== Publication ========================== Accepted papers will appear in the proceedings to be published by Springer CCIS Series. Selected top quality papers accepted and presented in the ATIS2014 will be invited for extension for the special issues of some international journals, including Concurrency and Computation: Practise and Experience (SCI-indexed, ERA2010 rank A). http://www.cc-pe.net/journalinfo ... #SecuringCyberspace |
» 猜你喜欢
论文终于录用啦!满足毕业条件了
已经有10人回复
2025年遐想
已经有4人回复
投稿Elsevier的杂志(返修),总是在选择OA和subscription界面被踢皮球
已经有8人回复
求个博导看看
已经有18人回复
» 抢金币啦!回帖就可以得到:
武汉纺织大学电子与电气工程学院------院长团队招聘光电、材料类博士,博士后
+1/497
澳门大学智慧城市物联网国重“结构智能感知、健康监测与无损检测”研究方向博士后招聘
+1/82
成都理工大学全国重点实验室公开诚聘绿色有机合成方向联培生及科研助理
+1/78
江苏科技大学能源材料化学课题组张俊豪教授招收博士研究生1-2名
+1/71
山东征女友,坐标济南
+1/65
87 年东北小哥定居苏州(沪杭亦可),诚寻携手余生的你
+1/58
南科大薛亚辉课题组诚聘离子输运、低维器件、原子力显微镜等方向“快响行动”博士生
+1/38
中国科学院大连化学物理研究所DNL0902研究组招聘博士后和职工
+1/36
中科院深圳理工大学网络课题组招聘博后/RA/实习生
+1/12
【博士后/科研助理招聘-北京理工大学-集成电路与电子学院-国家杰青团队】
+1/11
电子科技大学激光与光子制造团队招硕士博士
+1/8
土木、交通工程专业博士后站有吗?(无博士毕业3年要求+可接受兼职博后)
+1/7
中国石油大学(北京)石油工程学院工程力学系诚聘博士后3-4名
+1/4
211 院校 化学工程与技术 双一流学科 学术型博士研究生 尚有名额
+1/3
西南交通大学李义兵课题组博士及博士后招聘
+1/3
诚邀加盟!青岛大学郑晓钦教授团队诚招博士研究生、博士后及青年英才
+1/3
英国博导招CSC博士生
+1/2
西交利物浦大学——全奖博士名额(基因组学方向)
+1/2
福州大学梁宇航副教授招收2026年申核制博士研究生/硕士研究生(理论计算方向)
+1/1
👉划重点!硼替佐米药物研发质控必备
+1/1
47楼2014-07-21 18:41:04




回复此楼