CALL FOR
PAPERS
Paper Submission Deadline: March
18, 2013
The 2013 International Conference on
Security and Management
SAM'13
July 22-25, 2013, Las Vegas,
USA
You are invited
to submit a full paper for consideration. All accepted papers will be published
in printed conference books/proceedings (ISBN) and will also be made available
online. The proceedings will be indexed in science citation databases that track
citation frequency/data for each paper. Like prior years, extended versions of
selected papers (about 35%) will appear in journals and edited research books
(publishers
include:
Springer, Elsevier, BMC, and others).
In addition to
the above, we have arranged two new book series; one with Elsevier publishers
(Transactions on Computer Science and Applied Computing) and another with
Springer publishers (Transactions of Computational Science and Computational
Intelligence). After the conference, a significant number of authors of
accepted papers of SAM, will be given the opportunity to submit the extended
version of their papers for publication in these books.
The web sites
for the two book series will be made available after the logistics are
finalized between our committee and the publishers (both book series projects
have been approved.) We anticipate having between 10 to 20 books a year in each
of these book series projects. Each book in each series will be subject to
Elsevier and Springer science indexing products (which includes: Scopus, Ei
village, SCI, ...).
SAM'13 is
composed of a number of tracks, including: tutorials, sessions, workshops,
posters, and panel discussions. The conference will be held July 22-25, 2013,
Las Vegas, USA.
SCOPE: Topics of
interest include, but are not limited to, the following:
O Network Security
-Security Algorithms
-Mobile Network Security
-Security in CDN (Contents Distribution
Networks)
-Virtual Private Network (VPN)
-Tracing Techniques in Internet
-Active Networks
-Security in Grid
-Web Monitoring
-Network Security Engineering
-Transport-Level Security
-Wireless Network Security
-IP Security
-Electronic Mail security
O Cryptographic Technologies
-Security Protocols
-Key Management Techniques
-Cryptographic Technologies
-Applications of Block and Stream Ciphers
-Applications of Public Key Cryptology
-Message Authentication and Hash Functions
-Anonymity
-Digital Signature Schemes
-Secret Sharing
-Cryptanalysis
O Security Management
-Surveillance Technologies
-Security Policies
-Security for Protocol Management
-Location Management
-QoS Management
-Resource Management
-Channel Management
-Mobility Management
-Digital Contents Copyright Protection
-System Security Management
-Network Security Management
-Management in Network Equipment
-Storage Area Networks (SAN) Management
-Information Security Management
-Government Security Policy
-Web Penetration Testing
-Security Operations
-Vulnerabilities Management
O Security Education
-Computer Security Education
-Network Security Education
-Cyber Security Education
-Cyber Security Body of Knowledge
-Information Assurance Education
O Information Assurance
-Mission Assurance
-Risk Assessment and Risk Management
-Continuity of Operations and Business
Impact Analysis
-Cyber Security Compliance
-Security Auditing
-Security-Savvy Software Development
-Disaster Recovery
-Business Continuity Analysis
-Access Control
-Secure Use of Software
-Secure Performance
O Biometrics and Forensics
-Novel Biometric Methods
-Forensics
-Biological Security Technologies
-Face Recognition Systems
-Signature Recognition Systems
-Cyber Forensics
-Forensic Analysis
-Biometric Technologies for Security
-Feature Extraction and Matching Algorithms
O Hardware Security
-Embedded Systems Security
-Cryptographic Processors and Co-Processors
-Security Architectures
-True and Pseudorandom Number Generators
-Side Channel Attacks
-Fault Attacks
-Hardware Tamper Resistance
-Smart Card Processors
-Secure Storage Devices
O Security Applications
-Security in E-Commerce and M-Commerce
-Secure OS
-Watermarking
-High-Tech Systems at Airports
-Emerging Technologies and Applications
-Cloud Computing Security
-Database Security
-Data Mining Security
-Cyber Security Automation
O Computer Security
-Firewall Systems
-Hacking Techniques and Related Issues
-Intrusion Detection System (IDS)
-Honeypot
-Virus Issues (Detection, Prevention ...)
-Trusted Computing
-Alert Correlation
-Attack Graphs
-Incident Responding
-Malware Analysis
-Incident Responding
IMPORTANT DATES:
March 18,
2013: Submission of full papers (about
7 pages)
April 18,
2013: Notification of acceptance (+/-
two days)
May 5,
2013: Final papers + Copyright +
Registration
July 22-25,
2013: The 2013 International Conference
on Security
and Management (SAM'13)
CO-SPONSORS:
Currently being
prepared - The Academic Sponsors of the last offering of FECS (2012) included
research labs and centers affiliated with:
Minnesota
Supercomputing Institute, USA; Argonne National Laboratory, Illinois, USA;
George Mason University, Virginia, USA; Harvard University, Cambridge,
Massachusetts, USA; Center for Cyber Defense, NCAT, North Carolina, USA; Center
for Advanced Studies in Identity Sciences (CASIS:
NC A&T,
Carnegie Mellon, Clemson, UNC Wilmington), USA; Massachusetts Institute of
Technology (MIT), Cambridge, Massachusetts, USA; Texas A&M University, USA;
UMIT, Institute of Bioinformatics and Translational Research, Austria;
University of Iowa, USA; Russian Academy of Sciences, Moscow, Russia; NDSU-CIIT
Green Computing and Communications Laboratory, USA; Medical Image HPC and
Informatics Lab, Iowa, USA; and others.
Sponsors
At-Large included (corporate, associations, organizations):
Intel
Corporation; Super Micro Computer, Inc., California, USA; Altera Corporation;
The International Council on Medical and Care Compunetics; International
Society of Intelligent Biological Medicine; US Chapter of World Academy of
Science; High Performance Computing for Nanotechnology; Luna Innovations; World
Academy of Biomedical Sciences and Technologies; Manx Telecom; Computer Science
Research, Education, and Applications Press; HoIP Telecom; Hodges Health;
Leading Knowledge; OMG; Science Publications and others.
SUBMISSION OF
REGULAR PAPERS:
Prospective
authors are invited to submit their papers by uploading them to the evaluation
web site at:
Submissions must
be uploaded by March 18, 2013 and must be in either MS doc or pdf formats
(about 7 pages including all figures, tables, and references - single space,
font size of 10 to 12). All reasonable typesetting formats are acceptable
(later, the authors of accepted papers will be asked to follow a particular
typesetting format to prepare their final papers for publication.) Papers must
not have been previously published or currently submitted for publication
elsewhere.
The first page
of the paper should include: title of the paper, name, affiliation, postal
address, and email address for each author. The first page should also identify
the name of the Contact Author and a maximum of 5 topical keywords that would
best represent the content of the paper. The track title must also be stated on
the first page of the paper as well as a 100 to 150-word abstract. The length
of the final/ Camera-Ready papers (if accepted) will be limited to 7
(two-column IEEE style) pages.
Each paper will
be peer-reviewed by two experts in the field for originality, significance,
clarity, impact, and soundness. In cases of contradictory recommendations, a
member of the conference program committee would be charged to make the final
decision (accept/reject); often, this would involve seeking help from
additional referees.
Papers whose
authors include a member of the conference program committee will be evaluated
using the double-blinded review process.
(Essay/philosophical
papers will not be refereed but may be considered for discussion/panels).
The proceedings
will be published in printed conference books (ISBN) and will also be made
available online. The proceedings will be indexed in science citation databases
that track citation frequency/data for each published paper. Science citation
databases include: Inspec / IET / The Institute for Engineering &
Technology; The French National Center for Scientific Research, CNRS, INIST
databases, PASCAL (accessable from INIST, Datastar, Dialog, EBSCO, OVID,
Questel.Orbit, Qwam, and STN International); P3P8PCTD4042 and others. Though,
there is no guarantee that the proceedings will also be included in SCI EI
Compendex/Elsevier indexings; in the past, the proceedings were included in
these databases.
Therefore, we
will also be sending the proceedings for indexing procedures to SCI EI
Compendex/Elsevier. The printed proceedings/books will be available for
distribution on site at the conference.
In addition to
the above, we have arranged two new book series; one with Elsevier publishers
(Transactions on Computer Science and Applied Computing) and another with
Springer publishers (Transactions of Computational Science and Computational
Intelligence). After the conference, a significant number of authors of
accepted papers of SAM, will be given the opportunity to submit the extended
version of their papers for publication in these books.
We anticipate
having between 10 to 20 books a year in each of these book series projects.
Each book in each series will be subject to Elsevier and Springer science
indexing products (which includes: Scopus, Ei village, SCI, ...).
SUBMISSION OF
POSTER PAPERS:
Poster papers
can be 2 pages long. Authors are to follow the same instructions that appear
above (see, SUBMISSION OF REGULAR PAPERS) except for the submission is limited
to 2 pages. On the first page, the author should state that "This paper is
being submitted as a poster". Poster papers (if accepted) will be
published if and only the author of the accepted paper wishes to do so. please email your poster papers to the poster
co-chairs: Hanen Idoudi ( Hanen.Idoudi@ensi.rnu.tn ), or Esmiralda Moradian ( moradian@kth.se ).
MEMBERS OF
STEERING COMMITTEE:
Currently being
finalized. The members of the Steering Committee of The
2012 Congress
that SAM was (and will be) part of included: Dr. Selim Aissi, (formerly: Chief
Strategist - Security, Intel Corporation, USA) Senior Business Leader &
Chief Architect, Visa Corporation, USA; Prof.
Babak Akhgar,
PhD, FBCS, CITP, Professor of Informatics, Sheffield Hallam University,
Sheffield, UK; Prof. Hamid R. Arabnia, Professor of Computer Science, Elected
Fellow of ISIBM, Editor-in-Chief of Journal of Supercomputing (Springer),
University of Georgia, USA; Prof. Kevin Daimi, Professor of Computer Science,
Director of Computer Science and Software Engineering Programs, Department of
Mathematics, Computer Science and Software Engineering, University of Detroit
Mercy, Detroit, Michigan, USA; Prof. Gerry Vernon Dozier, Professor of Computer
Science, Chair of Department of Computer Science and Director of Center for
Advanced Studies in Identity Sciences, Center for Cyber Defense, North Carolina
A&T State University, North Carolina, USA; Dr. Michael R.
Grimaila,
Associate Professor, Air Force Institute of Technology, Systems Engineering,
Fellow of ISSA, CISM, CISSP, IAM/IEM, Editorial Board of ISSA Journal, Air
Force Center of Cyberspace Research, Advisor to the Prince of Wales Fellows
& Prince Edward Fellows at MIT and Harvard Universities and PC member of
NATO Cooperative Cyber Defence Centre of Excellence (CCD COE); Prof. Kun Chang
Lee, Professor of MIS and WCU Professor of Creativity Science, Business School
and Department of Interaction Science, Sungkyunkwan University, Seoul, South
Korea; Prof., Dr., Dr.h. Victor Malyshkin, Head of Supercomputer Software
Department (SSD), Institute of Computational Mathematics and Mathematical
Geophysics, Russian Academy of Sciences, Russia; Prof. George Markowsky,
Professor and Chair of Computer Science, Associate Director of School of Computing
and Information Science, Chair of International Advisory Board of IEEE IDAACS
and Director 2013 Northeast Collegiate Cyber Defense Competition, Chair Bangor
Foreign Policy Forum, Cooperating Professor of Mathematics & Statistics
Department UMaine, Cooperating Professor of School of Policy &
International Affairs UMaine, University of Maine, Orono, Maine, USA; Prof.
Andy Marsh, Director of HoIP, Director of HoIP Telecom, UK, Secretary-General
of WABT, Vice- president of ICET, Visiting Professor, University of
Westminster, UK; Prof. James J. (Jong Hyuk) Park, Professor of Computer Science
and Engineering, Seoul National University of Science and Technology
(SeoulTech), Korea, President of KITCS, Presidentof FTRA, Editor-in-Chiefs of
HCIS, JoC and IJITCC Journals; Ashu M. G. Solo (Publicity Chair), Fellow of
British Computer Society, Principal/Interdisciplinary R&D Engineer and
Mathematician, Maverick Technologies America; Prof. Sang C. Suh, Head and
Professor of Computer Science, Vice President, of Society for Design and
Process Science (SDPS), Director of Intelligent Cyberspace Engineering Lab
(ICEL), Texas A&M University, Com., Texas, USA; Prof. Layne T. Watson, IEEE
Fellow, NIA Fellow, ISIBM Fellow, Fellow of The National Institute of
Aerospace, Virginia Polytechnic Institute & State University, Virginia, USA
The 2013 Program
Committee for SAM conference is currently being compiled. Many who have already
joined the committees are renowned leaders, scholars, researchers, scientists
and practitioners of the highest ranks; many are directors of research labs.,
fellows of various societies, heads/chairs of departments, program directors of
research funding agencies, as well as deans and provosts.
Program
Committee members are expected to have established a strong and documented
research track record. Those interested in joining the Program Committee should
email daimikj@udmercy.edu
the following information for consideration/evaluation: Name, affiliation and
position, complete mailing address, email address, a one-page biography that
includes research expertise, and details of two recent papers on security.
GENERAL
INFORMATION:
SAM is an
international conference that serves researchers, scholars,
professionals,
students, and academicians who are looking to both foster
working
relationships and gain access to the latest research results.
It is being held
jointly (same location and dates) with a number of
other research
conferences; namely, The 2013 World Congress in Computer
Science,
Computer Engineering, and Applied Computing (WORLDCOMP). The
Congress is the
largest annual gathering of researchers in computer
science,
computer engineering and applied computing. We anticipate to
have 2,100 or
more attendees from over 85 countries.
The 2013
Congress will be composed of research presentations, keynote
lectures,
invited presentations, tutorials, panel discussions, and
poster
presentations. In recent past, keynote/tutorial/panel speakers
have included: Prof.
David A. Patterson (pioneer, architecture, U. of
California,
Berkeley), Dr. K. Eric Drexler (known as Father of
Nanotechnology),
Prof. John H. Holland (known as Father of Genetic
Algorithms; U.
of Michigan), Prof. Ian Foster (known as Father of Grid
Computing; U. of
Chicago & ANL), Prof. Ruzena Bajcsy (pioneer, VR, U.
of California,
Berkeley), Prof. Barry Vercoe (Founding member of MIT
Media Lab, MIT),
Dr. Jim Gettys (known as X-man, developer of X Window
System, xhost;
OLPC), Prof. John Koza (known as Father of Genetic
Programming,
Stanford U.), Prof. Brian D. Athey (NIH Program Director,
U. of Michigan),
Prof. Viktor K. Prasanna (pioneer, U. of Southern
California), Dr.
Jose L. Munoz (NSF Program Director and Consultant),
Prof. Jun Liu
(pioneer, Broad Institute of MIT & Harvard U.),
Prof. Lotfi A.
Zadeh (Father of Fuzzy Logic), Dr. Firouz Naderi (Head,
NASA Mars
Exploration Program/2000-2005 and Associate Director, Project
Formulation
& Strategy, Jet Propulsion Lab, CalTech/NASA; Director,
NASA's JPL Solar
System Exploration), Prof. David Lorge Parnas (Fellow
of IEEE, ACM,
RSC, CAE, GI; Dr.h.c.: ETH Zurich, Prof. Emeritus,
McMaster U. and
U. of Limerick), Prof. Eugene H. Spafford (Executive
Director, CERIAS
and Professor, Purdue University), Dr. Sandeep
Chatterjee (Vice
President & Chief Technology Officer, SourceTrace
Systems, Inc.),
Prof. Haym Hirsh (Rutgers University, New Jersey, USA
and former
director of Division of Information and Intelligent Systems,
National Science
Foundation, USA), Dr. Flavio Villanustre (Vice-
President, HPCC
Systems), and many other distinguished speakers. To
get a feeling
about the Congress's atmosphere, see the 2012 delegates
An important
mission of the Congress is "Providing a unique platform for
a diverse
community of constituents composed of scholars, researchers,
developers,
educators, and practitioners. The Congress makes concerted
effort to reach
out to participants affiliated with diverse entities
(such as:
universities, institutions, corporations, government agencies,
and research
centers/labs) from all over the world. The Congress also
attempts to
connect participants from institutions that have teaching as
their main mission
with those who are affiliated with institutions that
have research as
their main mission. The Congress uses a quota system to
achieve its
institution and geography diversity objectives."
One main goal of
the Congress is to assemble a spectrum of affiliated
research
conferences, workshops, and symposiums into a coordinated
research meeting
held in a common place at a common time. This model
facilitates
communication among researchers in different fields of
computer
science, computer engineering, and applied computing. The
Congress also
encourages multi-disciplinary and inter-disciplinary
research
initiatives; ie, facilitating increased opportunities for
cross-fertilization
across sub-disciplines.
MEASURABLE
SCIENTIFIC IMPACT OF CONGRESS:
As of December
2012, papers published in the Congress proceedings have
received over
27,000 citations (includes about 2,000 self-citations).
CONTACT: