+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
CALL FOR PAPERS
and
CALL
FOR WORKSHOPS/SESSIONS
Paper
Submission Deadline: March 18, 2013
SAM'13
The
2013 International Conference on
Security and
Management
July
22-25, 2013, Las Vegas, USA
http://sam.udmercy.edu/sam13/
INDEXING:
The
proceedings/books of this conference WILL BE indexed and integrated into
Elsevier
indexing products (Elsevier products include, among others: Scopus,
www.info.embase.com; and others.) The
above is already approved.
In
addition, the proceedings will also be indexed by a number of other
science
citation databases that track citation frequency/data for each paper.
You are
invited to submit a full paper for consideration. All accepted
papers
will be published in printed conference books/proceedings (ISBN)
and will
also be made available online. In addition, like prior years,
extended
versions of selected papers (about 35%) will appear in journals and
edited
research books (publishers include: Springer, Elsevier, BMC, and others).
SAM'13 is
composed of a number of tracks, including: tutorials, sessions,
workshops,
posters, and panel discussions. The conference will be held
July
22-25, 2013, Las Vegas, USA.
SCOPE:
Topics of interest include, but are not limited to, the following:
O Network
Security
-Security Algorithms
-Mobile Network Security
-Security in CDN (Contents
Distribution Networks)
-Virtual Private Network (VPN)
-Tracing Techniques in Internet
-Active Networks
-Security in Grid
-Web Monitoring
-Network Security Engineering
-Transport-Level Security
-Wireless Network Security
-IP Security
-Electronic Mail security
O Cryptographic
Technologies
-Security Protocols
-Key Management Techniques
-Cryptographic Technologies
-Applications of Block and Stream Ciphers
-Applications of Public Key Cryptology
-Message Authentication and Hash Functions
-Anonymity
-Digital Signature Schemes
-Secret Sharing
-Cryptanalysis
O Security
Management
-Surveillance Technologies
-Security Policies
-Security for Protocol
Management
-Location Management
-QoS Management
-Resource Management
-Channel Management
-Mobility Management
-Digital Contents Copyright Protection
-System Security Management
-Network Security Management
-Management in Network Equipment
-Storage Area Networks (SAN) Management
-Information Security Management
-Government Security Policy
-Web Penetration Testing
-Security Operations
-Vulnerabilities Management
O Security
Education
-Computer Security Education
-Network Security Education
-Cyber Security
Education
-Cyber Security Body of
Knowledge
-Information Assurance Education
O Information
Assurance
-Mission Assurance
-Risk Assessment and Risk Management
-Continuity of Operations and
Business Impact Analysis
-Cyber Security Compliance
-Security Auditing
-Security-Savvy Software Development
-Disaster Recovery
-Business Continuity Analysis
-Access Control
-Secure Use of Software
-Secure Performance
O Biometrics
and Forensics
-Novel Biometric Methods
-Forensics
-Biological Security Technologies
-Face Recognition Systems
-Signature Recognition Systems
-Cyber Forensics
-Forensic Analysis
-Biometric Technologies for Security
-Feature Extraction and Matching
Algorithms
O Hardware
Security
-Embedded Systems Security
-Cryptographic Processors and Co-Processors
-Security Architectures
-True and Pseudorandom Number Generators
-Side Channel Attacks
-Fault Attacks
-Hardware Tamper Resistance
-Smart Card Processors
-Secure Storage Devices
O Security
Applications
-Security in E-Commerce and
M-Commerce
-Secure OS
-Watermarking
-High-Tech Systems at Airports
-Emerging Technologies and
Applications
-Cloud Computing Security
-Database Security
-Data Mining Security
-Cyber Security Automation
O Computer
Security
-Firewall Systems
-Hacking Techniques and Related Issues
-Intrusion Detection System (IDS)
-Honeypot
-Virus Issues (Detection, Prevention ...)
-Trusted Computing
-Alert Correlation
-Attack Graphs
-Incident Responding
-Malware Analysis
-Incident Responding
IMPORTANT
DATES:
January
31, 2013: Workshop / Session Proposals
March 18,
2013: Submission of full papers (about 7 pages)
April 18,
2013: Notification of acceptance (+/- two days)
May 5,
2013: Final papers + Copyright +
Registration
July
22-25, 2013: The 2013 International Conference on Security
and Management (SAM'13)
CO-SPONSORS:
Currently
being prepared - The Academic Sponsors of the last offering of
SAM
(2012) included research labs and centers affiliated with:
Minnesota
Supercomputing Institute, USA; Argonne National Laboratory,
Illinois,
USA; George Mason University, Virginia, USA; Harvard University,
Cambridge,
Massachusetts, USA; Center for Cyber Defense, NCAT, North
Carolina,
USA; Center for Advanced Studies in Identity Sciences (CASIS:
NC
A&T, Carnegie Mellon, Clemson, UNC Wilmington), USA; Knowledge
Management
& Intelligent System Center (KMIS) of University of Siegen,
Germany;
Massachusetts Institute of Technology (MIT), Cambridge,
Massachusetts,
USA; Texas A&M University, USA; UMIT, Institute of
Bioinformatics
and Translational Research, Austria; University of Iowa,
USA;
Russian Academy of Sciences, Moscow, Russia; NDSU-CIIT Green
Computing
and Communications Laboratory, USA; Medical Image HPC and
Informatics
Lab, Iowa, USA; and others. Sponsors At-Large included
(corporate,
associations, organizations): Intel Corporation; Super
Micro
Computer, Inc., California, USA; Altera Corporation; The
International
Council on Medical and Care Compunetics; International
Society
of Intelligent Biological Medicine; US Chapter of World Academy
of
Science; High Performance Computing for Nanotechnology; Luna
Innovations;
World Academy of Biomedical Sciences and Technologies;
Manx
Telecom; Computer Science Research, Education, and Applications
Press;
HoIP Telecom; Hodges Health; Leading Knowledge; OMG; Science
Publications
and others.
SUBMISSION
OF REGULAR PAPERS:
Prospective
authors are invited to submit their papers by uploading them
to the
evaluation web site at:
Submissions
must be uploaded by March 18, 2013 and must be in either
MS doc or
pdf formats (about 7 pages including all figures, tables,
and
references - single space, font size of 10 to 12). All reasonable
typesetting
formats are acceptable (later, the authors of accepted
papers
will be asked to follow a particular typesetting format to
prepare
their final papers for publication.) Papers must not have been
previously
published or currently submitted for publication elsewhere.
The first
page of the paper should include: title of the paper, name,
affiliation,
postal address, and email address for each author. The
first
page should also identify the name of the Contact Author and a
maximum
of 5 topical keywords that would best represent the content
of the
paper. The track title must also be stated on the first page of the
paper as
well as a 100 to 150-word abstract. The length of the final/
Camera-Ready
papers (if accepted) will be limited to 7
(two-column
IEEE style) pages.
Each
paper will be peer-reviewed by two experts in the field for
originality,
significance, clarity, impact, and soundness. In cases of
contradictory
recommendations, a member of the conference program
committee
would be charged to make the final decision (accept/reject);
often,
this would involve seeking help from additional referees.
Papers
whose authors include a member of the conference program
committee
will be evaluated using the double-blinded review process.
(Essay/philosophical
papers will not be refereed but may be considered
for
discussion/panels).
The
proceedings will be published in printed conference books (ISBN) and
will also
be made available online. The proceedings will be indexed in
science citation
databases that track citation frequency/data for each
published
paper. Science citation databases include: Elsevier indexing
products
(SCI Elsevier products include, among others: Scopus,
www.info.embase.com; and others); Inspec
/ IET / The Institute for
Engineering
& Technology; The French National Center for Scientific Research,
CNRS,
INIST databases, PASCAL (accessable from INIST, Datastar, Dialog,
EBSCO,
OVID, Questel.Orbit, Qwam, and STN International); and others.
SUBMISSION
OF POSTER PAPERS:
Poster
papers can be 2 pages long. Authors are to follow the same
instructions
that appear above (see, SUBMISSION OF REGULAR PAPERS) except
for the
submission is limited to 2 pages. On the first page, the author
should
state that "This paper is being submitted as a poster". Poster
papers
(if accepted) will be published if and only the author of the
accepted
paper wishes to do so. please email your poster papers to the
poster
co-chairs:
Hanen Idoudi (Hanen.Idoudi@ensi.rnu.tn), or
PROPOSAL
FOR ORGANIZING WORKSHOPS/SESSIONS:
Each
conference is composed of a number of tracks. A track can be a session,
a
workshop, or a symposium. A session will have at least 6 papers; a
workshop
at least 12 papers; and a symposium at least 18 papers. Track
chairs
will be responsible for all aspects of their tracks, including:
soliciting
papers, reviewing, selecting, ... The names of track chairs
will
appear as Associate Editors in the conference proceedings and on
the cover
of the printed books (and indexed in science databases as such).
Proposals
to organize tracks (sessions, workshops, or symposiums) should
include
the following information: name and address (+ email) of proposer,
his/her
biography, title of track, a 100-word description of the topic of
the
track, the name of the conference the track is submitted for
consideration
(ie, SAM), and a short description on how the track
will be
advertised (in most cases, track proposers solicit papers from
colleagues
and researchers whose work is known to the track proposer).
E-mail
your track proposal to the Workshops/Sessions co-chairs:
Flaminia
Luccio (luccio@unive.it) or Sergey Morozov (morozose@udmercy.edu).
We would like to receive the track proposals as soon as possible but by no
later than January 31, 2013.
MEMBERS
OF STEERING COMMITTEE:
Currently
being finalized. The members of the Steering Committee of The
2012
Congress that SAM was (and will be) part of included: Dr. Selim
Aissi,
(formerly: Chief Strategist - Security, Intel Corporation, USA)
Senior
Business Leader & Chief Architect, Visa Corporation, USA; Prof.
Babak
Akhgar, PhD, FBCS, CITP, Professor of Informatics, Sheffield
Hallam
University, Sheffield, UK; Prof. Hamid R. Arabnia, Professor of
Computer
Science, Elected Fellow of ISIBM, Editor-in-Chief of Journal
of
Supercomputing (Springer), University of Georgia, USA; Prof. Kevin
Daimi,
Professor of Computer Science, Director of Computer Science and
Software
Engineering Programs, Department of Mathematics, Computer
Science
and Software Engineering, University of Detroit Mercy, Detroit,
Michigan,
USA; Prof. Gerry Vernon Dozier, Professor of Computer Science,
Chair of
Department of Computer Science and Director of Center for
Advanced
Studies in Identity Sciences, Center for Cyber Defense, North
Carolina
A&T State University, North Carolina, USA; Prof. Madjid Fathi,
Professor
and Chair, Department of Electrical Engineering & Computer
Science,
Director of Knowledge Management and Intelligent Systems Center,
University
of Siegen, Germany; Dr. Michael R. Grimaila, Associate
Professor,
Air Force Institute of Technology, Systems Engineering,
Fellow of
ISSA, CISM, CISSP, IAM/IEM, Editorial Board of ISSA Journal,
Air Force
Center of Cyberspace Research, Advisor to the Prince of Wales
Fellows
& Prince Edward Fellows at MIT and Harvard Universities and PC
member of
NATO Cooperative Cyber Defence Centre of Excellence (CCD COE);
Prof. Kun
Chang Lee, Professor of MIS and WCU Professor of Creativity
Science,
Business School and Department of Interaction Science,
Sungkyunkwan
University, Seoul, South Korea; Prof., Dr., Dr.h. Victor
Malyshkin,
Head of Supercomputer Software Department (SSD), Institute
of
Computational Mathematics and Mathematical Geophysics, Russian
Academy
of Sciences, Russia; Prof. George Markowsky, Professor and
Chair of
Computer Science, Associate Director of School of Computing
and
Information Science, Chair of International Advisory Board of
IEEE
IDAACS and Director 2013 Northeast Collegiate Cyber Defense
Competition,
Chair Bangor Foreign Policy Forum, Cooperating Professor
of
Mathematics & Statistics Department UMaine, Cooperating Professor
of School
of Policy & International Affairs UMaine, University of
Maine,
Orono, Maine, USA; Prof. Andy Marsh, Director of HoIP,
Director
of HoIP Telecom, UK, Secretary-General of WABT, Vice-
president
of ICET, Visiting Professor, University of Westminster, UK;
Prof.
James J. (Jong Hyuk) Park, Professor of Computer Science and
Engineering,
Seoul National University of Science and Technology
(SeoulTech),
Korea, President of KITCS, Presidentof FTRA, Editor-in-
Chiefs of
HCIS, JoC and IJITCC Journals; Dr. Hassan Reza, Associate
Professor
of Computer Science, UND Aerospace, University of North
Dakota,
USA; Ashu M. G. Solo (Publicity Chair), Fellow of British
Computer
Society, Principal/Interdisciplinary R&D Engineer and
Mathematician, Maverick Technologies America; Prof. Sang C. Suh,
Head and Professor of Computer Science, Vice President, of Society for
Design and Process Science (SDPS), Director of Intelligent Cyberspace
Engineering Lab (ICEL), Texas A&M University, Com., Texas, USA;
Prof. Layne T. Watson, IEEE Fellow, NIA Fellow, ISIBM Fellow,
Fellow of The National Institute of Aerospace, Virginia Polytechnic Institute
State University,Virginia, USA
Mathematician, Maverick Technologies America; Prof. Sang C. Suh,
Head and Professor of Computer Science, Vice President, of Society for
Design and Process Science (SDPS), Director of Intelligent Cyberspace
Engineering Lab (ICEL), Texas A&M University, Com., Texas, USA;
Prof. Layne T. Watson, IEEE Fellow, NIA Fellow, ISIBM Fellow,
Fellow of The National Institute of Aerospace, Virginia Polytechnic Institute
State University,Virginia, USA
The 2013
Program Committee for SAM conference is currently being
compiled.
Many who have already joined the committees are renowned
leaders,
scholars, researchers, scientists and practitioners of the
highest
ranks; many are directors of research labs., fellows of
various
societies, heads/chairs of departments, program directors of
research
funding agencies, as well as deans and provosts.
Program
Committee members are expected to have established a strong and
documented
research track record. Those interested in joining the
Program
Committee should email daimikj@udmercy.edu the following
information
for consideration/evaluation: Name, affiliation and
position,
complete mailing address, email address, a one-page biography
that
includes research expertise, and details of two recent papers on security.
GENERAL
INFORMATION:
SAM is an
international conference that serves researchers, scholars,
professionals,
students, and academicians who are looking to both foster
working
relationships and gain access to the latest research results.
It is
being held jointly (same location and dates) with a number of
other
research conferences; namely, The 2013 World Congress in Computer
Science,
Computer Engineering, and Applied Computing (WORLDCOMP). The
Congress
is the largest annual gathering of researchers in computer
science,
computer engineering and applied computing. We anticipate to
have
2,100 or more attendees from over 85 countries.
The 2013
Congress will be composed of research presentations, keynote
lectures,
invited presentations, tutorials, panel discussions, and
poster
presentations. In recent past, keynote/tutorial/panel speakers
have
included: Prof. David A. Patterson (pioneer, architecture, U. of
California,
Berkeley), Dr. K. Eric Drexler (known as Father of
Nanotechnology),
Prof. John H. Holland (known as Father of Genetic
Algorithms;
U. of Michigan), Prof. Ian Foster (known as Father of Grid
Computing;
U. of Chicago & ANL), Prof. Ruzena Bajcsy (pioneer, VR, U.
of
California, Berkeley), Prof. Barry Vercoe (Founding member of MIT
Media
Lab, MIT), Dr. Jim Gettys (known as X-man, developer of X Window
System,
xhost; OLPC), Prof. John Koza (known as Father of Genetic
Programming,
Stanford U.), Prof. Brian D. Athey (NIH Program Director,
U. of
Michigan), Prof. Viktor K. Prasanna (pioneer, U. of Southern
California),
Dr. Jose L. Munoz (NSF Program Director and Consultant),
Prof. Jun
Liu (pioneer, Broad Institute of MIT & Harvard U.),
Prof.
Lotfi A. Zadeh (Father of Fuzzy Logic), Dr. Firouz Naderi (Head,
NASA Mars
Exploration Program/2000-2005 and Associate Director, Project
Formulation
& Strategy, Jet Propulsion Lab, CalTech/NASA; Director,
NASA's
JPL Solar System Exploration), Prof. David Lorge Parnas (Fellow
of IEEE,
ACM, RSC, CAE, GI; Dr.h.c.: ETH Zurich, Prof. Emeritus,
McMaster
U. and U. of Limerick), Prof. Eugene H. Spafford (Executive
Director,
CERIAS and Professor, Purdue University), Dr. Sandeep
Chatterjee
(Vice President & Chief Technology Officer, SourceTrace
Systems,
Inc.), Prof. Haym Hirsh (Rutgers University, New Jersey, USA
and
former director of Division of Information and Intelligent Systems,
National
Science Foundation, USA), Dr. Flavio Villanustre (Vice-
President,
HPCC Systems), and many other distinguished speakers. To
get a
feeling about the Congress's atmosphere, see the 2012 delegates
photos
available at: http://infinitydempsey.smugmug.com/WorldComp
An
important mission of the Congress is "Providing a unique platform for
a diverse
community of constituents composed of scholars, researchers,
developers,
educators, and practitioners. The Congress makes concerted
effort to
reach out to participants affiliated with diverse entities
(such as:
universities, institutions, corporations, government agencies,
and
research centers/labs) from all over the world. The Congress also
attempts
to connect participants from institutions that have teaching as
their
main mission with those who are affiliated with institutions that
have
research as their main mission. The Congress uses a quota system to
achieve
its institution and geography diversity objectives."
One main
goal of the Congress is to assemble a spectrum of affiliated
research
conferences, workshops, and symposiums into a coordinated
research
meeting held in a common place at a common time. This model
facilitates
communication among researchers in different fields of
computer
science, computer engineering, and applied computing. The
Congress
also encourages multi-disciplinary and inter-disciplinary
research
initiatives; ie, facilitating increased opportunities for
cross-fertilization
across sub-disciplines.
MEASURABLE
SCIENTIFIC IMPACT OF CONGRESS:
As of
December 2012, papers published in the Congress proceedings have
received
over 27,000 citations (includes about 2,000 self-citations).
Citation
data obtained from http://academic.research.microsoft.com/
.
CONTACT:
Inquiries
should be sent to: daimikj@udmercy.edu