The 2015 International Conference on Security and Management
Las Vegas, USA, July 27-30
WORLDCOMP 2015
Call for Papers
The 2015 International Conference on Security and Management (SAM’15) is the 14th annual comprehensive security
conference dealing with all aspects of security. This annual Security and Management Conference is a leading
international opportunity for computer and network security professionals and users to investigate innovative ideas and
outcomes, and to exchange experiences on various aspects of information security.
You are invited to submit a full paper for consideration. Novel research in all practical areas of computer and network
security is sought. Submissions from academia, government, and industry are encouraged. All accepted papers will be
published in the SAM’15 conference proceedings (in printed book form; later, the proceedings will also be accessible
online). Papers should demonstrate significant contribution to the construction, evaluation, application, or operation of
secure systems.
There are nine tracks in this conference; Cryptographic Technologies, Security Applications, Information Assurance,
Network Security, Hardware Security, Computer Security, Security management, Security Education, and Biometrics and
Forensics. For details of the tracks, please refer to the conference website at http://sam.udmercy.edu/sam15 and click on
“Call for Papers.”
Prospective authors are invited to submit their papers by uploading them to the evaluation website at:
https://www.easychair.org/conferences/?conf=sam15
If you have not used EasyChair before, please create your new account first. To upload your paper, please click on “New
Submission.” The first page of the draft paper should include: title of the paper, name, affiliation, postal address, and
email address for each author. The first page should also identify the name of the Contact Author and a maximum of 5
topical keywords that would best represent the content of the paper. Please ensure that the first page also includes the
TRACK(s) that you regard as the most appropriate one for your paper review.
Important Dates
March 31, 2015 Submission of full papers (about 7 pages)
April 24, 2015 Notification of acceptance (+/- two days)
May 15, 2015 Final papers + Copyright + Registration
July 27-30, 2015 The 2015 International Conference on Security and Management
Contact Information
Dr. Kevin Daimi, Conference Chair
Computer Science and Software Engineering
University of Detroit Mercy,
Detroit, MI, 48221-3038, USA
Email: daimikj@udmercy.edu
This site is for announcements for The International Conference on Security and Management (SAM) at The World Congress in Computer Science, Computer Engineering, and Applied Computing (WORLDCOMP). See http://www.world-academy-of-science.org for the WORLDCOMP Web site. SAM'15 URL: http://sam.udmercy.edu/sam15/
Sunday, March 22, 2015
CALL FOR PAPERS
and
CALL FOR WORKSHOP/SESSION PROPOSALS
Paper Submission Deadline: March 31, 2015
SAM'15
The 2015 International Conference on Security and Management
July 27-30, 2015, Las Vegas, USA
http://sam.udmercy.edu/sam15
You are invited to submit a paper for consideration. All accepted papers
will be published in printed conference books/proceedings (ISBN) and will
also be made available online. The proceedings will be indexed in science
citation databases that track citation frequency/data. In addition, like
prior years, extended versions of selected papers (about 35%) of the
conference will appear in journals and edited research books (publishers
include: Springer, Elsevier, BMC, and others; a list that includes a
small subset of such books and journal special issues appear in this
document); some of these books and journal special issues have already
received the top 25% downloads in their respective fields.
SAM'15 is composed of a number of tracks, including: tutorials, sessions,
workshops, posters, and panel discussions.
SCOPE: Topics of interest include, but are not limited to, the following:
O NETWORK SECURITY:
- Security Algorithms
- Mobile Network Security
- Security in CDN (Contents Distribution Networks)
- Virtual Private Network (VPN)
- Tracing Techniques in Internet
- Active Networks
- Security in Grid
- Web Monitoring
- Control Systems/SCADA Security
- Network Security Engineering
- Transport-Level Security
- Wireless Network Security
- IP Security
- Electronic Mail security
O CRYPTOGRAPHIC TECHNOLOGIES:
- Security Protocols
- Key Management Techniques
- Cryptographic Technologies
- Applications of Block and Stream Ciphers
- Applications of Public Key Cryptology
- Message Authentication and Hash Functions
- Anonymity
- Digital Signature Schemes
- Secret Sharing
- Cryptanalysis
O SECURITY MANAGEMENT:
- Surveillance Technologies
- Security Policies
- Security for Protocol Management
- Location Management
- QoS Management
- Resource Management
- Channel Management
- Mobility Management
- Digital Contents Copyright Protection
- System Security Management
- Network Security Management
- Management in Network Equipment
- Storage Area Networks (SAN) Management
- Information Security Management
- Government Security Policy
- Web Penetration Testing
- Security Operations
- Vulnerabilities Management
O SECURITY EDUCATION:
- Computer Security Education
- Network Security Education
- Cyber Security Education
- Cyber Security Body of Knowledge
- Information Assurance Education
O INFORMATION ASSURANCE:
- Mission Assurance
- Risk Assessment and Risk Management
- Continuity of Operations and Business Impact Analysis
- Cyber Security Compliance
- Security Auditing
- Security-Savvy Software Development
- Disaster Recovery
- Business Continuity Analysis
- Access Control
- Secure Use of Software
- Secure Performance
O BIOMETRICS AND FORENSICS:
- Novel Biometric Methods
- Forensics
- Biological Security Technologies
- Face Recognition Systems
- Signature Recognition Systems
- Cyber Forensics
- Forensic Analysis
- Biometric Technologies for Security
- Feature Extraction and Matching Algorithms
O HARDWARE SECURITY:
- Embedded Systems Security
- Cryptographic Processors and Co-Processors
- Security Architectures
- True and Pseudorandom Number Generators
- Side Channel Attacks
- Fault Attacks
- Hardware Tamper Resistance
- Smart Card Processors
- Secure Storage Devices
O SECURITY APPLICATIONS:
- Security in E-Commerce and M-Commerce
- Secure OS
- Watermarking
- High-Tech Systems at Airports
- Emerging Technologies and Applications
- Cloud Computing Security
- Database Security
- Data Mining Security
- Cyber Security Automation
O COMPUTER SECURITY:
- Firewall Systems
- Hacking Techniques and Related Issues
- Intrusion Detection System (IDS)
- Honeypot
- Virus Issues (Detection, Prevention ...)
- Trusted Computing
- Alert Correlation
- Attack Graphs
- Incident Responding
- Malware Analysis
- Incident Responding
IMPORTANT DATES:
March 31,2015: Submission of full papers (about 7 pages)
April 24, 2015: Notification of acceptance (+/- two days)
May 15, 2015: Final papers + Copyright + Registration
July 27-30, 2015: The 2015 International Conference on Security and
Management (SAM'15)
SUBMISSION OF REGULAR PAPERS:
Prospective authors are invited to submit their papers by uploading
them to the evaluation web site at:
https://www.easychair.org/conferences/?conf=sam15
Submissions must be uploaded by March 31, 2015 and must be in either
pdf format (about 7 pages including all figures, tables, and
references - single space, font size of 10 to 12). All reasonable
typesetting formats are acceptable (later, the authors of accepted
papers will be asked to follow a particular typesetting format to
prepare their final papers for publication.) Papers must not have been
previously published or currently submitted for publication elsewhere.
The first page of the paper should include: title of the paper, name,
affiliation, postal address, and email address for each author. The
first page should also identify the name of the Contact Author and a
maximum of 5 topical keywords that would best represent the content
of the paper. The track title must also be stated on the first page of
the paper as well as a 100 to 150-word abstract. The length of the
final/Camera-Ready papers (if accepted) will be limited to 7 (two-column
IEEE style) pages.
Each paper will be peer-reviewed by two experts in the field for
originality, significance, clarity, impact, and soundness. In cases of
contradictory recommendations, a member of the conference program
committee would be charged to make the final decision (accept/reject);
often, this would involve seeking help from additional referees. Papers
whose authors include a member of the conference program committee will
be evaluated using the double-blinded review process. (Essay/philosophical
papers will not be refereed but may be considered for discussion/panels).
The proceedings will be published in printed conference books (ISBN) and
will also be made available online. The printed proceedings/books will
be available for distribution on site at the conference. The proceedings
will be indexed in science citation databases that track citation
frequency/data. The proceedings/books of SAM annual conferences have
been evaluated and approved for inclusion into major science citation
index databases for indexing, integrating, and inclusion into relevant
systems. The proceedings have also been approved for inclusion into
EBSCO (www.ebsco.com), one of the largest subject index systems. The
titles of proceedings of SAM have been indexed into the ACM Digital
Library ( http://dl.acm.org/ ) which includes bibliographic citations
from major publishers in computing.
In addition to the above, we have arranged two new book series (multiple
books in each series); one with Elsevier publishers (Emerging Trends in
Computer Science and Applied Computing) and another with Springer
publishers (Transactions of Computational Science and Computational
Intelligence). After the conference (the process may take 12 to 18
months), a significant number of authors of accepted papers of our
congress, will be given the opportunity to submit the extended version
of their papers for publication consideration in these books. We
anticipate having between 10 and 20 books a year in each of these
book series projects. Each book in each series will be subject to
Elsevier and Springer science indexing products (which includes:
Scopus, www.info.scopus.com; SCI Compendex, Engineering Village,
www.ei.org; EMBASE, www.info.embase.com; and others). For a recent and
a very small subset of the books (and journal special issues) that have
been published based on the extended versions of our congress papers,
see below:
http://www.worldacademyofscience.org/worldcomp15/ws/books_journals
SUBMISSION OF POSTER PAPERS:
Poster papers can be 2 pages long. Authors are to follow the same
instructions that appear above (see, SUBMISSION OF REGULAR PAPERS) except
for poster submission is limited to 2 pages. On the first page, the author
should state that "This paper is being submitted as a poster". Poster
papers (if accepted) will be published if and only the author of the
accepted paper wishes to do so. Please email your poster papers to the
poster co-chairs:
Hanen Idoudi ( Hanen.Idoudi@ensi.rnu.tn ), or
Esmiralda Moradian ( esmirald@dsv.su.se ).
PROPOSAL FOR ORGANIZING WORKSHOPS/SESSIONS:
Each conference is composed of a number of tracks. A track can be a session,
a workshop, or a symposium. A session will have at least 6 papers; a
workshop at least 12 papers; and a symposium at least 18 papers. Track
chairs will be responsible for all aspects of their tracks, including:
soliciting papers, reviewing, selecting, ... The names of track chairs
will appear as Associate Editors in the conference proceedings and on the
cover of the printed books (and indexed in science databases as such).
Proposals to organize tracks (sessions, workshops, or symposiums) should
include the following information: name and address (+ email) of proposer,
his/her biography, title of track, a 100-word description of the topic of
the track, and a short description on how the track will be advertised
(in most cases, track proposers solicit papers from colleagues and
researchers whose work is known to the track proposer). E-mail your track
proposal to the Workshops/Sessions co-chairs:
Flaminia Luccio ( luccio@unive.it ) or Shadi Banitaan ( banitash@udmercy.edu ).
We would like to receive the track proposals as soon as possible but by no
later than February 15, 2015.
CONTACT:
Inquiries should be sent to: daimikj@udmercy.edu
and
CALL FOR WORKSHOP/SESSION PROPOSALS
Paper Submission Deadline: March 31, 2015
SAM'15
The 2015 International Conference on Security and Management
July 27-30, 2015, Las Vegas, USA
http://sam.udmercy.edu/sam15
You are invited to submit a paper for consideration. All accepted papers
will be published in printed conference books/proceedings (ISBN) and will
also be made available online. The proceedings will be indexed in science
citation databases that track citation frequency/data. In addition, like
prior years, extended versions of selected papers (about 35%) of the
conference will appear in journals and edited research books (publishers
include: Springer, Elsevier, BMC, and others; a list that includes a
small subset of such books and journal special issues appear in this
document); some of these books and journal special issues have already
received the top 25% downloads in their respective fields.
SAM'15 is composed of a number of tracks, including: tutorials, sessions,
workshops, posters, and panel discussions.
SCOPE: Topics of interest include, but are not limited to, the following:
O NETWORK SECURITY:
- Security Algorithms
- Mobile Network Security
- Security in CDN (Contents Distribution Networks)
- Virtual Private Network (VPN)
- Tracing Techniques in Internet
- Active Networks
- Security in Grid
- Web Monitoring
- Control Systems/SCADA Security
- Network Security Engineering
- Transport-Level Security
- Wireless Network Security
- IP Security
- Electronic Mail security
O CRYPTOGRAPHIC TECHNOLOGIES:
- Security Protocols
- Key Management Techniques
- Cryptographic Technologies
- Applications of Block and Stream Ciphers
- Applications of Public Key Cryptology
- Message Authentication and Hash Functions
- Anonymity
- Digital Signature Schemes
- Secret Sharing
- Cryptanalysis
O SECURITY MANAGEMENT:
- Surveillance Technologies
- Security Policies
- Security for Protocol Management
- Location Management
- QoS Management
- Resource Management
- Channel Management
- Mobility Management
- Digital Contents Copyright Protection
- System Security Management
- Network Security Management
- Management in Network Equipment
- Storage Area Networks (SAN) Management
- Information Security Management
- Government Security Policy
- Web Penetration Testing
- Security Operations
- Vulnerabilities Management
O SECURITY EDUCATION:
- Computer Security Education
- Network Security Education
- Cyber Security Education
- Cyber Security Body of Knowledge
- Information Assurance Education
O INFORMATION ASSURANCE:
- Mission Assurance
- Risk Assessment and Risk Management
- Continuity of Operations and Business Impact Analysis
- Cyber Security Compliance
- Security Auditing
- Security-Savvy Software Development
- Disaster Recovery
- Business Continuity Analysis
- Access Control
- Secure Use of Software
- Secure Performance
O BIOMETRICS AND FORENSICS:
- Novel Biometric Methods
- Forensics
- Biological Security Technologies
- Face Recognition Systems
- Signature Recognition Systems
- Cyber Forensics
- Forensic Analysis
- Biometric Technologies for Security
- Feature Extraction and Matching Algorithms
O HARDWARE SECURITY:
- Embedded Systems Security
- Cryptographic Processors and Co-Processors
- Security Architectures
- True and Pseudorandom Number Generators
- Side Channel Attacks
- Fault Attacks
- Hardware Tamper Resistance
- Smart Card Processors
- Secure Storage Devices
O SECURITY APPLICATIONS:
- Security in E-Commerce and M-Commerce
- Secure OS
- Watermarking
- High-Tech Systems at Airports
- Emerging Technologies and Applications
- Cloud Computing Security
- Database Security
- Data Mining Security
- Cyber Security Automation
O COMPUTER SECURITY:
- Firewall Systems
- Hacking Techniques and Related Issues
- Intrusion Detection System (IDS)
- Honeypot
- Virus Issues (Detection, Prevention ...)
- Trusted Computing
- Alert Correlation
- Attack Graphs
- Incident Responding
- Malware Analysis
- Incident Responding
IMPORTANT DATES:
March 31,2015: Submission of full papers (about 7 pages)
April 24, 2015: Notification of acceptance (+/- two days)
May 15, 2015: Final papers + Copyright + Registration
July 27-30, 2015: The 2015 International Conference on Security and
Management (SAM'15)
SUBMISSION OF REGULAR PAPERS:
Prospective authors are invited to submit their papers by uploading
them to the evaluation web site at:
https://www.easychair.org/conferences/?conf=sam15
Submissions must be uploaded by March 31, 2015 and must be in either
pdf format (about 7 pages including all figures, tables, and
references - single space, font size of 10 to 12). All reasonable
typesetting formats are acceptable (later, the authors of accepted
papers will be asked to follow a particular typesetting format to
prepare their final papers for publication.) Papers must not have been
previously published or currently submitted for publication elsewhere.
The first page of the paper should include: title of the paper, name,
affiliation, postal address, and email address for each author. The
first page should also identify the name of the Contact Author and a
maximum of 5 topical keywords that would best represent the content
of the paper. The track title must also be stated on the first page of
the paper as well as a 100 to 150-word abstract. The length of the
final/Camera-Ready papers (if accepted) will be limited to 7 (two-column
IEEE style) pages.
Each paper will be peer-reviewed by two experts in the field for
originality, significance, clarity, impact, and soundness. In cases of
contradictory recommendations, a member of the conference program
committee would be charged to make the final decision (accept/reject);
often, this would involve seeking help from additional referees. Papers
whose authors include a member of the conference program committee will
be evaluated using the double-blinded review process. (Essay/philosophical
papers will not be refereed but may be considered for discussion/panels).
The proceedings will be published in printed conference books (ISBN) and
will also be made available online. The printed proceedings/books will
be available for distribution on site at the conference. The proceedings
will be indexed in science citation databases that track citation
frequency/data. The proceedings/books of SAM annual conferences have
been evaluated and approved for inclusion into major science citation
index databases for indexing, integrating, and inclusion into relevant
systems. The proceedings have also been approved for inclusion into
EBSCO (www.ebsco.com), one of the largest subject index systems. The
titles of proceedings of SAM have been indexed into the ACM Digital
Library ( http://dl.acm.org/ ) which includes bibliographic citations
from major publishers in computing.
In addition to the above, we have arranged two new book series (multiple
books in each series); one with Elsevier publishers (Emerging Trends in
Computer Science and Applied Computing) and another with Springer
publishers (Transactions of Computational Science and Computational
Intelligence). After the conference (the process may take 12 to 18
months), a significant number of authors of accepted papers of our
congress, will be given the opportunity to submit the extended version
of their papers for publication consideration in these books. We
anticipate having between 10 and 20 books a year in each of these
book series projects. Each book in each series will be subject to
Elsevier and Springer science indexing products (which includes:
Scopus, www.info.scopus.com; SCI Compendex, Engineering Village,
www.ei.org; EMBASE, www.info.embase.com; and others). For a recent and
a very small subset of the books (and journal special issues) that have
been published based on the extended versions of our congress papers,
see below:
http://www.worldacademyofscience.org/worldcomp15/ws/books_journals
SUBMISSION OF POSTER PAPERS:
Poster papers can be 2 pages long. Authors are to follow the same
instructions that appear above (see, SUBMISSION OF REGULAR PAPERS) except
for poster submission is limited to 2 pages. On the first page, the author
should state that "This paper is being submitted as a poster". Poster
papers (if accepted) will be published if and only the author of the
accepted paper wishes to do so. Please email your poster papers to the
poster co-chairs:
Hanen Idoudi ( Hanen.Idoudi@ensi.rnu.tn ), or
Esmiralda Moradian ( esmirald@dsv.su.se ).
PROPOSAL FOR ORGANIZING WORKSHOPS/SESSIONS:
Each conference is composed of a number of tracks. A track can be a session,
a workshop, or a symposium. A session will have at least 6 papers; a
workshop at least 12 papers; and a symposium at least 18 papers. Track
chairs will be responsible for all aspects of their tracks, including:
soliciting papers, reviewing, selecting, ... The names of track chairs
will appear as Associate Editors in the conference proceedings and on the
cover of the printed books (and indexed in science databases as such).
Proposals to organize tracks (sessions, workshops, or symposiums) should
include the following information: name and address (+ email) of proposer,
his/her biography, title of track, a 100-word description of the topic of
the track, and a short description on how the track will be advertised
(in most cases, track proposers solicit papers from colleagues and
researchers whose work is known to the track proposer). E-mail your track
proposal to the Workshops/Sessions co-chairs:
Flaminia Luccio ( luccio@unive.it ) or Shadi Banitaan ( banitash@udmercy.edu ).
We would like to receive the track proposals as soon as possible but by no
later than February 15, 2015.
CONTACT:
Inquiries should be sent to: daimikj@udmercy.edu
Subscribe to:
Posts (Atom)