+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
CALL FOR
PAPERS
and
CALL FOR WORKSHOPS/SESSIONS
Paper Submission Deadline: March
15, 2014
SA'M14
The 2014 International
Conference on
Security and Management
July 21-24, 2014, Las Vegas,
USA
Submissions
should be uploaded to the following site:
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
INDEXING:
The
proceedings/books of this conference will be indexed and integrated into
relevant
Elsevier indexing products (Elsevier products include, among others:
www.info.embase.com; and others.) The above is already
approved. In addition,
the proceedings
will also be indexed by a number of other science citation
databases that
track citation frequency/data for each paper.
You are invited
to submit a full paper for consideration. All accepted
papers will be
published in printed conference books/proceedings (ISBN) and
will also be
made available online. In addition, like prior years, extended
versions of
selected papers (about 35%) will appear in journals and edited
research books
(publishers include: Springer, Elsevier, BMC, and others).
See the
following links for a small subset of the publications based on
accepted papers
in the federated congress that SAM is part of: (some of
these books and
journal special issues have already received the top 25%
downloads in
their respective fields - we also have a number of Elsevier
and Springer
books in the pipeline based on the accepted papers):
SAM'14 is
composed of a number of tracks, including: tutorials, sessions,
workshops,
posters, and panel discussions. The conference will be held July
21-24, 2014, Las
Vegas, USA.
SCOPE: Topics of
interest include, but are not limited to, the following:
O Network Security
-Security Algorithms
-Mobile Network Security
-Security in CDN (Contents Distribution
Networks)
-Virtual Private Network (VPN)
-Tracing Techniques in Internet
-Active Networks
-Security in Grid
-Web Monitoring
-Network Security Engineering
-Transport-Level Security
-Wireless Network Security
-IP Security
-Electronic Mail security
O Cryptographic Technologies
-Security Protocols
-Key Management Techniques
-Cryptographic Technologies
-Applications of Block and Stream Ciphers
-Applications of Public Key Cryptology
-Message Authentication and Hash Functions
-Anonymity
-Digital Signature Schemes
-Secret Sharing
-Cryptanalysis
O Security Management
-Surveillance Technologies
-Security Policies
-Security for Protocol Management
-Location Management
-QoS Management
-Resource Management
-Channel Management
-Mobility Management
-Digital Contents Copyright Protection
-System Security Management
-Network Security Management
-Management in Network Equipment
-Storage Area Networks (SAN) Management
-Information Security Management
-Government Security Policy
-Web Penetration Testing
-Security Operations
-Vulnerabilities Management
O Security Education
-Computer Security Education
-Network Security Education
-Cyber Security Education
-Cyber Security Body of Knowledge
-Information Assurance Education
O Information Assurance
-Mission Assurance
-Risk Assessment and Risk Management
-Continuity of Operations and Business
Impact Analysis
-Cyber Security Compliance
-Security Auditing
-Security-Savvy Software Development
-Disaster Recovery
-Business Continuity Analysis
-Access Control
-Secure Use of Software
-Secure Performance
O Biometrics and Forensics
-Novel Biometric Methods
-Forensics
-Biological Security Technologies
-Face Recognition Systems
-Signature Recognition Systems
-Cyber Forensics
-Forensic Analysis
-Biometric Technologies for Security
-Feature Extraction and Matching Algorithms
O Hardware Security
-Embedded Systems Security
-Cryptographic Processors and Co-Processors
-Security Architectures
-True
and Pseudorandom Number Generators
-Side Channel Attacks
-Fault Attacks
-Hardware Tamper Resistance
-Smart Card Processors
-Secure Storage Devices
O Security Applications
-Security in E-Commerce and M-Commerce
-Secure OS
-Watermarking
-High-Tech Systems at Airports
-Emerging Technologies and Applications
-Cloud Computing Security
-Database Security
-Data Mining Security
-Cyber Security Automation
O Computer Security
-Firewall Systems
-Hacking Techniques and Related Issues
-Intrusion Detection System (IDS)
-Honeypot
-Virus Issues (Detection, Prevention ...)
-Trusted Computing
-Alert Correlation
-Attack Graphs
-Incident Responding
-Malware Analysis
-Incident Responding
IMPORTANT DATES:
ASP: Sessions/Workshops Proposals (As
soon as possible)
March 15,
2014: Submission of full papers (about
7 pages)
April 15,
2014: Notification of acceptance (+/-
two days)
May 3,
2014: Final papers + Copyright +
Registration
July 21-24,
2014: The 2014 International Conference
on Security and
Management (SAM'14)
SUBMISSION OF
REGULAR PAPERS:
Prospective
authors are invited to submit their papers by uploading them
to the evaluation
web site at:
Submissions must
be uploaded by March 15, 2014 and must be in pdf formats
(about 7 pages
including all figures, tables, and references - single
space, font size
of 10 to 12). All reasonable typesetting formats are
acceptable
(later, the authors of accepted papers will be asked to follow
a particular
typesetting format to prepare their final papers for
publication.)
Papers must not have been previously published or currently
submitted for
publication elsewhere. The first page of the paper should
include: title
of the paper, name, affiliation, postal address, and email
address for each
author. The first page should also identify the name of
the Contact
Author and a maximum of 5 topical keywords that would best
represent the
content of the paper. The track title must also be stated
on the first
page of the paper as well as a 100 to 150-word abstract. The
length of the
final/Camera-Ready papers (if accepted) will be limited to
7 (two-column
IEEE style) pages.
Each paper will
be peer-reviewed by two experts in the field for
originality,
significance, clarity, impact, and soundness. In cases of
contradictory
recommendations, a member of the conference program
committee would
be charged to make the final decision (accept/reject);
often, this
would involve seeking help from additional referees.
Papers whose
authors include a member of the conference program
committee will
be evaluated using the double-blinded review process.
(Essay/philosophical
papers will not be refereed but may be considered
for
discussion/panels).
The proceedings
will be published in printed conference books (ISBN) and
will also be
made available online. The proceedings will be indexed in
science citation
databases that track citation frequency/data for each
published paper.
Science citation databases include: Elsevier indexing
products (SCI
Elsevier products include, among others: Scopus,
www.info.embase.com; and others); Inspec / IET / The Institute
for
Engineering
& Technology; The French National Center for Scientific
Research, CNRS,
INIST databases, PASCAL (accessible from INIST, Datastar,
Dialog, EBSCO,
OVID, Questel.Orbit, Qwam, and STN International); and
others.
SUBMISSION OF
POSTER PAPERS:
Poster papers
can be 2 pages long. Authors are to follow the same
instructions
that appear above (see, SUBMISSION OF REGULAR PAPERS) except
for the
submission is limited to 2 pages. On the first page, the author
should state
that "This paper is being submitted as a poster". Poster papers
(if accepted)
will be published if and only the author of the accepted paper
wishes to do so.
Please email your poster papers to the poster co-chairs:
Hanen
Idoudi, Hanen.Idoudi@ensi.rnu.tn or
Esmiralda
Moradian, esmirald@dsv.su.se
PROPOSAL FOR
ORGANIZING WORKSHOPS/SESSIONS:
Each conference
is composed of a number of tracks. A track can be a session,
a workshop, or a
symposium. A session will have at least 6 papers; a
workshop at
least 12 papers; and a symposium at least 18 papers. Track
chairs will be
responsible for all aspects of their tracks, including:
soliciting
papers, reviewing, selecting, ... The names of track chairs will
appear as
Associate Editors in the conference proceedings and on the cover
of the printed
books (and indexed in science databases as such).
Proposals to
organize tracks (sessions, workshops, or symposiums) should
include the
following information: name and address (+ email) of proposer,
his/her
biography, title of track, a 100-word description of the topic of
the track, the
name of the conference the track is submitted for
consideration
(ie, SAM), and a short description on how the track
will be
advertised (in most cases, track proposers solicit papers from
colleagues and
researchers whose work is known to the track proposer).
E-mail your
track proposal to the Workshops/Sessions co-chairs:
We would like to
receive the track proposals as soon as possible but by no
later than
February 25, 2014.
MEMBERS OF
STEERING COMMITTEE:
Currently being
finalized. The members of the Steering Committee of The
federated joint
Congress that SAM was (and will be) part of in recen
years, included:
Dr. Selim Aissi, (formerly: Chief Strategist - Security,
Intel
Corporation, USA) Senior Business Leader & Chief Architect, Visa
Corporation,
USA; Prof. Babak Akhgar, PhD, FBCS, CITP, Professor of
Informatics,
Sheffield Hallam University, Sheffield, UK; Prof. Hamid R.
Arabnia,
Professor of Computer Science, Elected Fellow of ISIBM,
Editor-in-Chief
of Journal of Supercomputing (Springer), University of
Georgia, USA;
Prof. Kevin Daimi, Professor of Computer Science, Director
of Computer
Science and Software Engineering Programs, Department of
Mathematics,
Computer Science and Software Engineering, University of
Detroit Mercy,
Detroit, Michigan, USA; Dr. Michael R. Grimaila, Associate
Professor, Air
Force Institute of Technology, Systems Engineering, Fellow
of ISSA, CISM,
CISSP, IAM/IEM, Editorial Board of ISSA Journal, Air Force
Center of
Cyberspace Research, Advisor to the Prince of Wales Fellows &
Prince Edward
Fellows at MIT and Harvard Universities and PC member of
NATO Cooperative
Cyber Defense Centre of Excellence (CCD COE); Prof. Kun
Chang Lee,
Professor of MIS and WCU Professor of Creativity Science,
Business School
and Department of Interaction Science, Sungkyunkwan
University,
Seoul, South Korea; Prof., Dr., Dr.h. Victor Malyshkin, Head
of Supercomputer
Software Department (SSD), Institute of Computational
Mathematics and
Mathematical Geophysics, Russian Academy of Sciences,
Russia; Prof.
George Markowsky, Professor and Chair of Computer Science,
Associate
Director of School of Computing and Information Science, Chair
of International
Advisory Board of IEEE IDAACS and Director 2013
Northeast
Collegiate Cyber Defense Competition, Chair Bangor Foreign
Policy Forum,
Cooperating Professor of Mathematics & Statistics
Department
UMaine, Cooperating Professor of School of Policy &
International
Affairs UMaine, University of Maine, Orono, Maine, USA;
Prof. Andy Marsh,
Director of HoIP, Director of HoIP Telecom, UK,
Secretary-General
of WABT, Vice-president of ICET, Visiting Professor,
University of
Westminster, UK; Prof. James J. (Jong Hyuk) Park,
Professor of
Computer Science and Engineering, Seoul National University
of Science and
Technology (SeoulTech), Korea, President of KITCS,
President of
FTRA, Editor-in-Chiefs of HCIS, JoC and IJITCC Journals;
Ashu M. G. Solo
(Publicity Chair), Fellow of British Computer Society,
Principal/Interdisciplinary
R&D Engineer and Mathematician,
Maverick
Technologies America; Prof. Sang C. Suh, Head and Professor of
Computer
Science, Vice President, of Society for Design and Process Science
(SDPS), Director
of Intelligent Cyberspace Engineering Lab (ICEL), Texas A&M
University,
Com., Texas, USA; Prof. Layne T. Watson, IEEE Fellow, NIA Fellow,
ISIBM Fellow,
Fellow of The National Institute of Aerospace, Virginia Polytechnic
Institute & State
University, Virginia, USA. The 2013 Program Committee for SAM
conference is
currently being compiled. Many who have already joined the
committees are
renowned leaders, scholars, researchers, scientists and
practitioners of
the highest ranks; many are directors of research labs.,
fellows of
various societies, heads/chairs of departments, program
directors of
research funding agencies, as well as deans and provosts.
Program
Committee members are expected to have established a strong and
documented
research track record. Those interested in joining the Program
Committee should
email Professor Daimi ( daimikj@udmercy.edu ) the
following
information for consideration/evaluation: Name, affiliation and
position,
complete mailing address, email address, a one-page biography
that includes
research expertise, and details of two recent papers on
security.
GENERAL
INFORMATION:
SAM is an
international conference that serves researchers, scholars,
professionals,
students, and academicians who are looking to both foster
working
relationships and gain access to the latest research results.
It is being held
jointly (same location and dates) with a number of
other research
conferences; namely, The 2014 World Congress in Computer
Science,
Computer Engineering, and Applied Computing (WORLDCOMP). The
Congress is one
of the largest annual gathering of researchers in
computer
science, computer engineering and applied computing. We
anticipate to
have 2,100 or more attendees from over 85 countries.
The 2014
Congress will be composed of research presentations, keynote
lectures,
invited presentations, tutorials, panel discussions, and
poster
presentations. In recent past, keynote/tutorial/panel speakers
have included:
Prof. David A. Patterson (pioneer, architecture, U. of
California,
Berkeley), Dr. K. Eric Drexler (known as Father of
Nanotechnology),
Prof. John H. Holland (known as Father of Genetic
Algorithms; U.
of Michigan), Prof. Ian Foster (known as Father of Grid
Computing; U. of
Chicago & ANL), Prof. Ruzena Bajcsy (pioneer, VR, U. of
California,
Berkeley), Prof. Barry Vercoe (Founding member of MIT Media Lab,
MIT), Dr. Jim
Gettys (known as X-man, developer of X Window System, xhost;
OLPC), Prof.
John Koza (known as Father of Genetic Programming, Stanford
U.), Prof. Brian
D. Athey (NIH Program Director, U. of Michigan), Prof.
Viktor K.
Prasanna (pioneer, U. of Southern California), Dr. Jose L. Munoz
(NSF Program
Director and Consultant), Prof. Jun Liu (pioneer, Broad
Institute of MIT
& Harvard U.), Prof. Lotfi A. Zadeh (Father of Fuzzy
Logic), Dr.
Firouz Naderi (Head, NASA Mars Exploration Program/2000-2005 and
Associate
Director, Project Formulation & Strategy, Jet Propulsion Lab,
CalTech/NASA;
Director, NASA's JPL Solar System Exploration), Prof. David
Lorge Parnas
(Fellow of IEEE, ACM, RSC, CAE, GI; Dr.h.c.: ETH Zurich, Prof.
Emeritus,
McMaster U. and U. of Limerick), Prof. Eugene H. Spafford
(Executive
Director, CERIAS and Professor, Purdue University), Dr. Sandeep
Chatterjee (Vice
President & Chief Technology Officer, SourceTrace Systems,
Inc.), Prof.
Haym Hirsh (Rutgers University, New Jersey, USA and former
director of
Division of Information and Intelligent Systems, National
Science
Foundation, USA), Dr. Flavio Villanustre (Vice- President, HPCC
Systems), and
many other distinguished speakers. To get a feeling about
the conferences'
atmosphere, see some delegates photos available at:
An important
mission of the Congress is "Providing a unique platform for a
diverse
community of constituents composed of scholars, researchers,
developers,
educators, and practitioners. The Congress makes concerted
effort to reach
out to participants affiliated with diverse entities (such
as:
universities, institutions, corporations, government agencies, and
research
centers/labs) from all over the world. The Congress also attempts
to connect
participants from institutions that have teaching as their main
mission with
those who are affiliated with institutions that have research
as their main
mission. The Congress uses a quota system to achieve its
institution and
geography diversity objectives."
One main goal of
the Congress is to assemble a spectrum of affiliated
research
conferences, workshops, and symposiums into a coordinated
research meeting
held in a common place at a common time. This model
facilitates
communication among researchers in different fields of
computer
science, computer engineering, and applied computing. The
Congress also
encourages multi-disciplinary and inter-disciplinary
research
initiatives; i.e., facilitating increased opportunities for
cross-fertilization
across sub-disciplines. Below, you will find a
small subset of
the books and journal special issues published based
on extended
versions of accepted papers in the congress that SAM
is part of:
MEASURABLE
SCIENTIFIC IMPACT OF CONGRESS:
As of December
14, 2013, papers published in the conference proceedings
that have been
held as part of this congress, have received over 27,500
citations
(includes about 3,300 self-citations). Citation data obtained
from http://academic.research.microsoft.com/ . The citation data does not
even include
more than 15,000 other citations to papers in conferences
whose first
offerings were initiated by the congress.
MISCELLANEOUS:
The information
that appears in this announcement is correct as of
January 29, 2014
CONTACT:
Inquiries should
be sent to: daimikj@udmercy.edu