| 查看: 1663 | 回复: 56 | |||||||||
| 当前只显示满足指定条件的回帖,点击这里查看本话题的所有回帖 | |||||||||
[交流]
【2014-08-24】ATIS2014: Call for Papers (EI/SCI Indexed)
|
|||||||||
会议城市: Melbourne, Australia 是否Ei/ISTP收录: Ei/ISTP双收录 截稿日期: 24/08/2014 *** ATIS2014: Call for Papers *** ========================================================================================== International Conference on Applications and Techniques in Information Security (ATIS2014) 26-28/11/2014, Melbourne, Australia URL: http://atis2014.tulip.org.au/ Mirror Site in China: http://atis.niuteam.cc Submission System: https://cmt.research.microsoft.com/ATIS2014 Accepted papers will appear in the proceedings to be published by Springer CCIS Series. Selected top quality papers accepted and presented in the ATIS2014 will be invited for extension for the special issues of some international journals, including Concurrency and Computation: Practise and Experience (SCI-indexed, ERA2010 rank A). http://www.cc-pe.net/journalinfo ... #SecuringCyberspace ========================================================================================== ========================== Important Dates ========================== Paper Submission Due: 24/08/2014 Author Notification Due: 14/09/2014 Camera Ready Due: 20/09/2014 ========================== Conference Scope ========================== The 2014 International Conference on Applications and Technologies in Information Security (ATIS), will be the fifth event in the ATIS series, which started in 2010. As academic research in information security has developed over the last twenty or so years, applications and techniques are being developed to be of specific use in this area. These include wavelets and their applications in digital forensics, classification algorithms for use in malicious software detection, and genetic algorithms custom-made for the cryptographic community, etc. ATIS 2014 focuses on all aspects on techniques and applications in information security. The purpose of ATIS is to provide a forum for presentation and discussion of innovative ideas, research results, applications and experience from around the world. The annual ATIS conference highlights new results in the design and analysis of digital security hardware and software implementations. ATIS provides a valuable connection between the theoretical and implementation communities and attracts participants from industry, academia, and government organizations. As well as a single track of high-quality presentations, ATIS 2014 will offer invited talks, hands-on training in a computer lab, digital competitions and a special school for PhD and Master students. Accepted papers will appear in the proceedings to be published by Springer CCIS Series. Selected top quality papers accepted and presented in the ATIS2014 will be invited for extension for the special issues of some international journals, including Concurrency and Computation: Practise and Experience (SCI-indexed, ERA2010 rank A). ========================== Topics of Interest ========================== Papers are invited in the areas below, but do not exclude research in the general areas of the topic headings. (1) Attacks against Implementations - Digital Forensics - Key Recovery (2) Data Privacy - Applied Data Analysis - Privacy Protection - Privacy Preservation in Data Release - Smart device information leaks - Trusted and Trustworthy Computing (3) Evaluation, standards and protocols - Domain name server security - Transport Layer Security - Risk Evaluation and Security Certification - Security Management (4) Security Implementations - Access Control - Authentication and Authorization - Cryptography - Data and System Integrity - Database Security - Distributed Systems Security - Information Hiding and Watermarking - Intellectual Property Protection - Intellectual Property Protection - Key Management - Operating System Security - Sequential/Parallel/Distributed behavior modeling (5) Tools and Methodologies - Evaluation of Security - Evaluation of Security Tools (6) Vulnerabilities - Digital Forensics - Intrusion Detection - Malicious software (7) Curbing Cyber-Crime - Blog spam detection - Botnets prevention - Click spam detection - Cloud Security - Cyber-Gossip Spread Models - Collusive crime/piracy detection - Collusive crime/piracy detection - Collaborative social recommendation - Datasets for cyber-gossips detection - Dynamic/hidden group presentation - Group and group behavior detection, tracking and recognition - Group interaction, collaboration, representation and profiling - Graph-based behavior/social modeling - Identity authentication - Poster spam detection ========================== Paper Submissions ========================== Submission is only electronic using the ATIS2014 paper submission page linked here: https://cmt.research.microsoft.com/ATIS2014 The submitted paper should adhere to the double-blind review policy. All papers will be double-blind reviewed by the Program Committee on the basis of technical quality, relevance to ATIS, originality, significance, and clarity. All paper submissions will be handled electronically. Papers that do not comply with the Submission Guidelines will be rejected without review. Please note: (1) Authors are strongly encouraged to use Springer LNCS/LNAI manuscript submission guidelines for their initial submissions. (2) All papers must be submitted electronically through the paper submission system in PDF format only, with up to 12 pages in length. (3) Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. (4) Papers must be clearly presented in English and will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation. (5) As papers will be blind refereed, submitted papers must be fully anonymous, with no author names, affiliations, acknowledgments, or obvious references. The paper must start with a title, an abstract, and keywords. (6) Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the conference to present the work. ========================== Publication ========================== Accepted papers will appear in the proceedings to be published by Springer CCIS Series. Selected top quality papers accepted and presented in the ATIS2014 will be invited for extension for the special issues of some international journals, including Concurrency and Computation: Practise and Experience (SCI-indexed, ERA2010 rank A). http://www.cc-pe.net/journalinfo ... #SecuringCyberspace |
» 猜你喜欢
青基代表作,AAAI之类的A会的special track在国内认可度高吗?还是归为workshop之流?
已经有3人回复
上海工程技术大学【激光智能制造】课题组招收硕士
已经有6人回复
带资进组求博导收留
已经有11人回复
自荐读博
已经有5人回复
求个博导看看
已经有16人回复
上海工程技术大学张培磊教授团队招收博士生
已经有4人回复
求助院士们,这个如何合成呀
已经有4人回复
临港实验室与上科大联培博士招生1名
已经有9人回复
写了一篇“相变储能技术在冷库中应用”的论文,论文内容以实验为主,投什么期刊合适?
已经有6人回复
最近几年招的学生写论文不引自己组发的文章
已经有11人回复
» 抢金币啦!回帖就可以得到:
武汉纺织大学电子与电气工程学院------院长团队招聘光电、材料类博士,博士后
+1/516
香港理工大学-应用生物与化学科技学系 招收2025年博士研究生
+2/90
华中科技大学龚江研究员课题组诚招博士研究生、科研助理和博士后
+2/88
坐标北京不异地
+1/74
上海大学昝鹏教授、军事医学研究院伯晓晨研究员/倪铭副研究员 课题组招聘博士生
+2/74
上海大学昝鹏教授、军事医学研究院伯晓晨研究员/倪铭副研究员 课题组招聘博士生
+2/64
坐标上海,93年诚征女友
+1/58
深圳理工大学梁国进课题组招聘研究助理教授、博后多名(电化学储能方向)
+1/42
王志博教授课题组招收硕士研究生(本招收信息长期有效)
+2/38
【AI、水文方向】香港科技大学(广州)研究助理招聘
+1/28
上海大学 力工学院 锂电池方向 博士研究生招生
+1/27
南科大夏海平院士-深大张平玉课题组联合招聘博士后
+1/26
复旦大学聂志鸿团队招聘聚电解质方向博士后和科研助理
+1/14
哈尔滨工业大学招收硕士研究生(欢迎环境、市政、生物、化学、农业等专业,长期有效)
+1/11
深容SCI智能体四大模块:Method, Introduction, Discussion, Abstract
+1/7
Introduction要这么写,又快又好!深容Introduction智能体实测
+1/6
武汉大学郭宇铮教授课题组招收博士后等研究人员【先进封装/芯片/人工智能等方向】
+1/5
有多余纯化系统,20-200mm高压制备分离系统,配套齐全可对外代工、委托加工、项目合作
+1/3
经济学博士(金融方向)招生,211重点大学,2026年9月入学,申请-考核制。
+1/1
合肥工业大学 多智能体方向 2026 级博士招生
+1/1
12楼2014-07-21 17:50:39
简单回复
pzx10042楼
2014-07-21 17:33
maiziwhu(金币+1): 谢谢参与
祝福 [ 发自小木虫客户端 ]




回复此楼