WWSMC 2013 - The 8th World Wide Security and Mobility Conference
Date2013-06-24 - 2013-06-27
Deadline2013-05-31
VenueNew Jersey, USA - United States
Keywords
Websitehttps://gws2013.org/wwsmc
Topics/Call fo Papers
World Wide Security and Mobility Conference (WWSMC) brings together thought leaders and experts from different aspects of the security and mobile ecosystem. WWSMC discusses and examines new approaches to address today's ever-growing cybersecurity threats. The conference includes global industry leaders, security and mobility experts, government officials, and academics. Speakers provide a "big picture" view of the cybersecurity and mobility challenges that lie ahead, while laying the groundwork for some serious problem solving ? crossing boundaries, eliminating silos, and "connecting the dots" across the cybersecurity spectrum.
We invite you to submit your original technical papers, workshop, and tutorial proposals to this event. Accepted and presented papers will be published in the WWSMC 2013 Conference Proceedings. Full details of submission procedures are available at http://www.gws2013.org/wwsmc/.
Topics of Interest
Topics of interest include, but are not limited to:
Security: Security, privacy and trust, authentication, authorization and accounting (AAA), encryption techniques and data integrity
Detection and Prevention: Monitoring and data mining, QoS, QoR, QoE, reliability and availability, self-healing and attack definition
Mobility: Mobile IP networks, mobility patterns, location and handoff management, inter-working of 2G, 3G and 4G wireless networks and ubiquitous computing
We invite you to submit your original technical papers, workshop, and tutorial proposals to this event. Accepted and presented papers will be published in the WWSMC 2013 Conference Proceedings. Full details of submission procedures are available at http://www.gws2013.org/wwsmc/.
Topics of Interest
Topics of interest include, but are not limited to:
Security: Security, privacy and trust, authentication, authorization and accounting (AAA), encryption techniques and data integrity
Detection and Prevention: Monitoring and data mining, QoS, QoR, QoE, reliability and availability, self-healing and attack definition
Mobility: Mobile IP networks, mobility patterns, location and handoff management, inter-working of 2G, 3G and 4G wireless networks and ubiquitous computing
Other CFPs
Last modified: 2013-06-01 10:05:02