ICIS 2014 - International Congress on Internet Security 2014
Date2014-11-19 - 2014-11-21
Deadline2014-07-31
VenueHoliday Inn Silom Ba, Thailand
KeywordsIntcongress. 2014, ASDF; Internet Security; asdf conference, bangkok
Topics/Call fo Papers
- Accountability
- Anonymity
- Application security
- Attacks and defenses
- Authentication
- Censorship and censorship-resistance
- Distributed systems security
- Embedded systems security
- Intrusion detection
- Language-based security
- Malware
- Metrics
- Network security
- Privacy-preserving
- Resource usage control
- Security for mobile computing
- Security models
- systems Protocol security
- Secure information flow
- Security and privacy policies
- Security architectures
- System security
- Usability and security
- Web security
- Biometrics
- Chaos-based Data Security
- Cryptography
- Collaborative Learning
- Cyber Security Congestion control
- Content Distribution
- Cross Layer Design and Optimization
- Cyber-physical computing/networking
- Distributed Systems Security
- Information flow monitor
- Language-based security
- Network Security Issues and Protocols
- Security Challenges and Content Authoring
- Secure Communications
- Authentication Techniques
- MANET Security
- Wireless Sensor Network Security
- Organization Considerations in Security Policy
- Digital Forensics and Crimes
- Formulation and Implementations
- Geographic information systems
- Privacy Protection
- Regulations
- Quantitative Information Flow
- Ad hoc Mobile Networks Security
- Addressing and Location Management
- Broadband Access Technologies
- Blended Internet Security Methods
- Boundary Issues of Internet Security
- Capacity Planning
- Cellular and Broadband Wireless Nets
- Complex systems and complexity
- Formal verification of privacy for RFID systems
- Optical Networks
- Middleware Support for Networking
- Mobility Models and Systems
- Multicast and Anycast
- Multimedia Protocols and Networking
- Network Applications and Services
- Network Architectures
- Network Simulation and Emulation
- Novel Network Architectures
- Network and Protocol Architectures
- Peer-to-Peer Communications
- Performance Evaluation
- Power Control and Management
- Protocols and Standards
- Resource Allocation and Management
- Wireless Mesh Networks and Protocols
Not limited to the above topics, but ensure that there is no other major areas of Conference which is running parallel to this.
Submission
Authors should submit a paper in English, carefully checked for correct grammar and spelling, addressing one or several of the conference areas or topics. Each paper should clearly indicate the nature of its technical/scientific contribution, and the problems, domains or environments to which it is applicable. Only original papers should be submitted. Authors are advised to follow ethical norms regarding plagiarism and self-plagiarism thoroughly before submitting and must make sure that their submissions do not substantially overlap work which has been published elsewhere or simultaneously submitted to a journal or another conference with proceedings. Papers that contain any form of plagiarism will be rejected without reviews.
Authors can submit their work in the form of a Regular Paper, representing completed and validated research, or as a Position Paper, portraying a short report of work in progress or an arguable opinion about an issue discussing ideas, facts, situations, methods, procedures or results of scientific research focused on one of the conference topic areas. All papers must be submitted through the online submission platform. After the paper submission has been successfully completed, authors will receive an automatic confirmation e-mail.
Submit Papers Now: https://www.easychair.org/conferences/?conf=icis20...
Other CFPs
Last modified: 2014-01-19 15:50:39