| 查看: 1649 | 回复: 56 | |||||||||
| 当前只显示满足指定条件的回帖,点击这里查看本话题的所有回帖 | |||||||||
[交流]
【2014-08-24】ATIS2014: Call for Papers (EI/SCI Indexed)
|
|||||||||
会议城市: Melbourne, Australia 是否Ei/ISTP收录: Ei/ISTP双收录 截稿日期: 24/08/2014 *** ATIS2014: Call for Papers *** ========================================================================================== International Conference on Applications and Techniques in Information Security (ATIS2014) 26-28/11/2014, Melbourne, Australia URL: http://atis2014.tulip.org.au/ Mirror Site in China: http://atis.niuteam.cc Submission System: https://cmt.research.microsoft.com/ATIS2014 Accepted papers will appear in the proceedings to be published by Springer CCIS Series. Selected top quality papers accepted and presented in the ATIS2014 will be invited for extension for the special issues of some international journals, including Concurrency and Computation: Practise and Experience (SCI-indexed, ERA2010 rank A). http://www.cc-pe.net/journalinfo ... #SecuringCyberspace ========================================================================================== ========================== Important Dates ========================== Paper Submission Due: 24/08/2014 Author Notification Due: 14/09/2014 Camera Ready Due: 20/09/2014 ========================== Conference Scope ========================== The 2014 International Conference on Applications and Technologies in Information Security (ATIS), will be the fifth event in the ATIS series, which started in 2010. As academic research in information security has developed over the last twenty or so years, applications and techniques are being developed to be of specific use in this area. These include wavelets and their applications in digital forensics, classification algorithms for use in malicious software detection, and genetic algorithms custom-made for the cryptographic community, etc. ATIS 2014 focuses on all aspects on techniques and applications in information security. The purpose of ATIS is to provide a forum for presentation and discussion of innovative ideas, research results, applications and experience from around the world. The annual ATIS conference highlights new results in the design and analysis of digital security hardware and software implementations. ATIS provides a valuable connection between the theoretical and implementation communities and attracts participants from industry, academia, and government organizations. As well as a single track of high-quality presentations, ATIS 2014 will offer invited talks, hands-on training in a computer lab, digital competitions and a special school for PhD and Master students. Accepted papers will appear in the proceedings to be published by Springer CCIS Series. Selected top quality papers accepted and presented in the ATIS2014 will be invited for extension for the special issues of some international journals, including Concurrency and Computation: Practise and Experience (SCI-indexed, ERA2010 rank A). ========================== Topics of Interest ========================== Papers are invited in the areas below, but do not exclude research in the general areas of the topic headings. (1) Attacks against Implementations - Digital Forensics - Key Recovery (2) Data Privacy - Applied Data Analysis - Privacy Protection - Privacy Preservation in Data Release - Smart device information leaks - Trusted and Trustworthy Computing (3) Evaluation, standards and protocols - Domain name server security - Transport Layer Security - Risk Evaluation and Security Certification - Security Management (4) Security Implementations - Access Control - Authentication and Authorization - Cryptography - Data and System Integrity - Database Security - Distributed Systems Security - Information Hiding and Watermarking - Intellectual Property Protection - Intellectual Property Protection - Key Management - Operating System Security - Sequential/Parallel/Distributed behavior modeling (5) Tools and Methodologies - Evaluation of Security - Evaluation of Security Tools (6) Vulnerabilities - Digital Forensics - Intrusion Detection - Malicious software (7) Curbing Cyber-Crime - Blog spam detection - Botnets prevention - Click spam detection - Cloud Security - Cyber-Gossip Spread Models - Collusive crime/piracy detection - Collusive crime/piracy detection - Collaborative social recommendation - Datasets for cyber-gossips detection - Dynamic/hidden group presentation - Group and group behavior detection, tracking and recognition - Group interaction, collaboration, representation and profiling - Graph-based behavior/social modeling - Identity authentication - Poster spam detection ========================== Paper Submissions ========================== Submission is only electronic using the ATIS2014 paper submission page linked here: https://cmt.research.microsoft.com/ATIS2014 The submitted paper should adhere to the double-blind review policy. All papers will be double-blind reviewed by the Program Committee on the basis of technical quality, relevance to ATIS, originality, significance, and clarity. All paper submissions will be handled electronically. Papers that do not comply with the Submission Guidelines will be rejected without review. Please note: (1) Authors are strongly encouraged to use Springer LNCS/LNAI manuscript submission guidelines for their initial submissions. (2) All papers must be submitted electronically through the paper submission system in PDF format only, with up to 12 pages in length. (3) Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. (4) Papers must be clearly presented in English and will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation. (5) As papers will be blind refereed, submitted papers must be fully anonymous, with no author names, affiliations, acknowledgments, or obvious references. The paper must start with a title, an abstract, and keywords. (6) Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the conference to present the work. ========================== Publication ========================== Accepted papers will appear in the proceedings to be published by Springer CCIS Series. Selected top quality papers accepted and presented in the ATIS2014 will be invited for extension for the special issues of some international journals, including Concurrency and Computation: Practise and Experience (SCI-indexed, ERA2010 rank A). http://www.cc-pe.net/journalinfo ... #SecuringCyberspace |
» 猜你喜欢
请问哪里可以有青B申请的本子可以借鉴一下。
已经有4人回复
真诚求助:手里的省社科项目结项要求主持人一篇中文核心,有什么渠道能发核心吗
已经有6人回复
孩子确诊有中度注意力缺陷
已经有14人回复
三甲基碘化亚砜的氧化反应
已经有4人回复
请问下大家为什么这个铃木偶联几乎不反应呢
已经有5人回复
请问有评职称,把科研教学业绩算分排序的高校吗
已经有5人回复
2025冷门绝学什么时候出结果
已经有3人回复
天津工业大学郑柳春团队欢迎化学化工、高分子化学或有机合成方向的博士生和硕士生加入
已经有4人回复
康复大学泰山学者周祺惠团队招收博士研究生
已经有6人回复
AI论文写作工具:是科研加速器还是学术作弊器?
已经有3人回复
» 抢金币啦!回帖就可以得到:
双面压敏硅胶胶带
+2/92
湘潭大学化学学院陈华杰教授课题组招收有机/高分子方向的博士研究生
+1/81
华东师范大学 程义云 课题组招2026年博士研究生 - 有机化学、材料化学、高分子合成等
+1/79
湘潭大学化学学院理论与计算化学课题组裴勇教授招生博士生2名
+2/78
双一流大学湘潭大学“化工过程模拟与强化”国家地方联合工程研究中心招收各类博士生
+1/49
澳门科技大学2026年数学博士招生—杨钧翔助理教授计算物理与数学课题组
+1/47
捷克布拉格查理大学(QS260)招收第一性原理计算方向博士生
+1/34
中国矿业大学博士招生
+1/34
北京理工大学国家杰青梁军教授课题组招聘2026级博士研究生
+1/30
宁波大学张天宇教授课题组招聘副教授/讲师
+1/29
【陕西师范大学】催化化学课题组2026年招收博士后/讲师/副高
+1/9
2025君科院博士研究生招生欢迎报考
+2/8
长江大学武汉校区诚招新能源博士(工程热物理、电气、油气)-2025
+1/7
海南大学生物医学工程学院光免疫诊疗团队诚招神经生物学、光学、分子生物学博士
+1/5
欢迎报考中山大学课题组,确保2025-2026级硕士研究生名额
+1/5
想替换掉环状DNA中心通道中的金属离子 如何替换才是正确操作
+1/4
有没有一款可以听文献的APP
+1/4
氨基酸的技术难度有哪些? 色氨酸为何单独做,有何不同?
+1/2
三峡集团科研院海上风电研究项目实习生招聘公告
+1/2
兰州大学物理学院韩卫华教授课题组招收 2026年博士研究生 (物理、电子以及核能源方向)
+1/1
52楼2014-07-21 18:44:04
12楼2014-07-21 17:50:39
简单回复
pzx10042楼
2014-07-21 17:33
maiziwhu(金币+1): 谢谢参与
祝福 [ 发自小木虫客户端 ]




回复此楼