| 查看: 1708 | 回复: 56 | |||||||||
| 当前只显示满足指定条件的回帖,点击这里查看本话题的所有回帖 | |||||||||
[交流]
【2014-08-24】ATIS2014: Call for Papers (EI/SCI Indexed)
|
|||||||||
会议城市: Melbourne, Australia 是否Ei/ISTP收录: Ei/ISTP双收录 截稿日期: 24/08/2014 *** ATIS2014: Call for Papers *** ========================================================================================== International Conference on Applications and Techniques in Information Security (ATIS2014) 26-28/11/2014, Melbourne, Australia URL: http://atis2014.tulip.org.au/ Mirror Site in China: http://atis.niuteam.cc Submission System: https://cmt.research.microsoft.com/ATIS2014 Accepted papers will appear in the proceedings to be published by Springer CCIS Series. Selected top quality papers accepted and presented in the ATIS2014 will be invited for extension for the special issues of some international journals, including Concurrency and Computation: Practise and Experience (SCI-indexed, ERA2010 rank A). http://www.cc-pe.net/journalinfo ... #SecuringCyberspace ========================================================================================== ========================== Important Dates ========================== Paper Submission Due: 24/08/2014 Author Notification Due: 14/09/2014 Camera Ready Due: 20/09/2014 ========================== Conference Scope ========================== The 2014 International Conference on Applications and Technologies in Information Security (ATIS), will be the fifth event in the ATIS series, which started in 2010. As academic research in information security has developed over the last twenty or so years, applications and techniques are being developed to be of specific use in this area. These include wavelets and their applications in digital forensics, classification algorithms for use in malicious software detection, and genetic algorithms custom-made for the cryptographic community, etc. ATIS 2014 focuses on all aspects on techniques and applications in information security. The purpose of ATIS is to provide a forum for presentation and discussion of innovative ideas, research results, applications and experience from around the world. The annual ATIS conference highlights new results in the design and analysis of digital security hardware and software implementations. ATIS provides a valuable connection between the theoretical and implementation communities and attracts participants from industry, academia, and government organizations. As well as a single track of high-quality presentations, ATIS 2014 will offer invited talks, hands-on training in a computer lab, digital competitions and a special school for PhD and Master students. Accepted papers will appear in the proceedings to be published by Springer CCIS Series. Selected top quality papers accepted and presented in the ATIS2014 will be invited for extension for the special issues of some international journals, including Concurrency and Computation: Practise and Experience (SCI-indexed, ERA2010 rank A). ========================== Topics of Interest ========================== Papers are invited in the areas below, but do not exclude research in the general areas of the topic headings. (1) Attacks against Implementations - Digital Forensics - Key Recovery (2) Data Privacy - Applied Data Analysis - Privacy Protection - Privacy Preservation in Data Release - Smart device information leaks - Trusted and Trustworthy Computing (3) Evaluation, standards and protocols - Domain name server security - Transport Layer Security - Risk Evaluation and Security Certification - Security Management (4) Security Implementations - Access Control - Authentication and Authorization - Cryptography - Data and System Integrity - Database Security - Distributed Systems Security - Information Hiding and Watermarking - Intellectual Property Protection - Intellectual Property Protection - Key Management - Operating System Security - Sequential/Parallel/Distributed behavior modeling (5) Tools and Methodologies - Evaluation of Security - Evaluation of Security Tools (6) Vulnerabilities - Digital Forensics - Intrusion Detection - Malicious software (7) Curbing Cyber-Crime - Blog spam detection - Botnets prevention - Click spam detection - Cloud Security - Cyber-Gossip Spread Models - Collusive crime/piracy detection - Collusive crime/piracy detection - Collaborative social recommendation - Datasets for cyber-gossips detection - Dynamic/hidden group presentation - Group and group behavior detection, tracking and recognition - Group interaction, collaboration, representation and profiling - Graph-based behavior/social modeling - Identity authentication - Poster spam detection ========================== Paper Submissions ========================== Submission is only electronic using the ATIS2014 paper submission page linked here: https://cmt.research.microsoft.com/ATIS2014 The submitted paper should adhere to the double-blind review policy. All papers will be double-blind reviewed by the Program Committee on the basis of technical quality, relevance to ATIS, originality, significance, and clarity. All paper submissions will be handled electronically. Papers that do not comply with the Submission Guidelines will be rejected without review. Please note: (1) Authors are strongly encouraged to use Springer LNCS/LNAI manuscript submission guidelines for their initial submissions. (2) All papers must be submitted electronically through the paper submission system in PDF format only, with up to 12 pages in length. (3) Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. (4) Papers must be clearly presented in English and will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation. (5) As papers will be blind refereed, submitted papers must be fully anonymous, with no author names, affiliations, acknowledgments, or obvious references. The paper must start with a title, an abstract, and keywords. (6) Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the conference to present the work. ========================== Publication ========================== Accepted papers will appear in the proceedings to be published by Springer CCIS Series. Selected top quality papers accepted and presented in the ATIS2014 will be invited for extension for the special issues of some international journals, including Concurrency and Computation: Practise and Experience (SCI-indexed, ERA2010 rank A). http://www.cc-pe.net/journalinfo ... #SecuringCyberspace |
» 猜你喜欢
依托企业入选了国家启明计划青年人才。有无高校可以引进的。
已经有14人回复
表哥与省会女结婚,父母去帮带孩子被省会女气回家生重病了
已经有11人回复
江汉大学解明教授课题组招博士研究生/博士后
已经有3人回复
AI 太可怕了,写基金时,提出想法,直接生成的文字比自己想得深远,还有科学性
已经有11人回复
同年申请2项不同项目,第1个项目里不写第2个项目的信息,可以吗
已经有10人回复
依托企业入选了国家启明计划青年人才。有无高校可以引进的。
已经有11人回复
» 抢金币啦!回帖就可以得到:
医学超声影像负责人招聘-中国科学院赣江创新研究院
+1/978
西湖大学拓扑光学、非厄米光学、太赫兹方向博士后招聘
+2/250
-大龄未婚男找女朋友结婚
+1/240
澳洲西澳大学Dr Yiran Liu招全额奖学金和CSC奖学金博士生(3.8万澳币/年)
+1/105
广州大学“长江学者”教授团队2026年海内外高层次人才招聘(环境/化学/生物)
+1/77
人间烟火,实则就是追求最简单的快乐
+1/77
上海交通大学大气环境科学课题组招收2026年入学博士生
+1/67
好玩的不敢搞,能搞的不挣钱,能挣钱的我不会做
+1/66
同济大学脑机智能团队脑机接口方向招生招聘
+1/27
湖南大学袁达飞课题组招收第二批2026年9月入学的博士研究生一名
+1/26
南京医科大学国家级高层次青年人才团队招收博士后
+1/22
华南师范大学(211)- 光电科学与工程学院 - 申请审核制(2026年4-5月份面试考核)
+2/16
香港中文大学(深圳)陈筱萌 课题组招生公告(博士 / 博后 / 硕士 / RA)
+1/15
中科院深圳先进技术研究院招聘免疫及计算生物学方向博士后、科研助理或联培学生
+1/9
中科院深圳先进技术研究院招联培学生 -- 多中心大队列数据已就绪,助你快车道产出成果
+1/9
全奖博士 英国利物浦大学 × 台湾清华大学 联合培养
+1/7
广东省环境科学研究院招聘高分辨质谱方向博士一名
+1/6
哈工大(深圳)国家级青年人才 钟颖教授课题组 新增26级博士名额!欢迎报名!
+1/5
队友
+1/3
斯德哥尔摩 DigitalFuture 博士后奖学金机会!
+1/1
52楼2014-07-21 18:44:04
12楼2014-07-21 17:50:39
简单回复
pzx10042楼
2014-07-21 17:33
maiziwhu(金币+1): 谢谢参与
祝福 [ 发自小木虫客户端 ]




回复此楼