ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

SAM 2014 - The 2014 International Conference on Security and Management

Date2014-07-21 - 2014-07-24

Deadline2014-03-15

Venue Las Vegas, USA - United States USA - United States

Keywords

Websitehttps://sam.udmercy.edu/sam14

Topics/Call fo Papers

SAM'14
The 2014 International Conference on
Security and Management
July 21-24, 2014, Las Vegas, USA
http://sam.udmercy.edu/sam14
Submissions should be uploaded to the following site:
https://www.easychair.org/conferences/?conf=sam14
INDEXING:
The proceedings/books of this conference will be indexed and integrated into
relevant Elsevier indexing products (Elsevier products include, among others:
Scopus, www.info.scopus.com; Engineering Village, www.ei.org; EMBASE,
www.info.embase.com; and others.) The above is already approved. In addition,
the proceedings will also be indexed by a number of other science citation
databases that track citation frequency/data for each paper.
You are invited to submit a full paper for consideration. All accepted
papers will be published in printed conference books/proceedings (ISBN) and
will also be made available online. In addition, like prior years, extended
versions of selected papers (about 35%) will appear in journals and edited
research books (publishers include: Springer, Elsevier, BMC, and others).
SAM'14 is composed of a number of tracks, including: tutorials, sessions,
workshops, posters, and panel discussions. The conference will be held July
21-24, 2014, Las Vegas, USA.
SCOPE: Topics of interest include, but are not limited to, the following:
O Network Security
-Security Algorithms
-Mobile Network Security
-Security in CDN (Contents Distribution Networks)
-Virtual Private Network (VPN)
-Tracing Techniques in Internet
-Active Networks
-Security in Grid
-Web Monitoring
-Network Security Engineering
-Transport-Level Security
-Wireless Network Security
-IP Security
-Electronic Mail security
O Cryptographic Technologies
-Security Protocols
-Key Management Techniques
-Cryptographic Technologies
-Applications of Block and Stream Ciphers
-Applications of Public Key Cryptology
-Message Authentication and Hash Functions
-Anonymity
-Digital Signature Schemes
-Secret Sharing
-Cryptanalysis
O Security Management
-Surveillance Technologies
-Security Policies
-Security for Protocol Management
-Location Management
-QoS Management
-Resource Management
-Channel Management
-Mobility Management
-Digital Contents Copyright Protection
-System Security Management
-Network Security Management
-Management in Network Equipment
-Storage Area Networks (SAN) Management
-Information Security Management
-Government Security Policy
-Web Penetration Testing
-Security Operations
-Vulnerabilities Management
O Security Education
-Computer Security Education
-Network Security Education
-Cyber Security Education
-Cyber Security Body of Knowledge
-Information Assurance Education
O Information Assurance
-Mission Assurance
-Risk Assessment and Risk Management
-Continuity of Operations and Business Impact Analysis
-Cyber Security Compliance
-Security Auditing
-Security-Savvy Software Development
-Disaster Recovery
-Business Continuity Analysis
-Access Control
-Secure Use of Software
-Secure Performance
O Biometrics and Forensics
-Novel Biometric Methods
-Forensics
-Biological Security Technologies
-Face Recognition Systems
-Signature Recognition Systems
-Cyber Forensics
-Forensic Analysis
-Biometric Technologies for Security
-Feature Extraction and Matching Algorithms
O Hardware Security
-Embedded Systems Security
-Cryptographic Processors and Co-Processors
-Security Architectures
-True and Pseudorandom Number Generators
-Side Channel Attacks
-Fault Attacks
-Hardware Tamper Resistance
-Smart Card Processors
-Secure Storage Devices
O Security Applications
-Security in E-Commerce and M-Commerce
-Secure OS
-Watermarking
-High-Tech Systems at Airports
-Emerging Technologies and Applications
-Cloud Computing Security
-Database Security
-Data Mining Security
-Cyber Security Automation
O Computer Security
-Firewall Systems
-Hacking Techniques and Related Issues
-Intrusion Detection System (IDS)
-Honeypot
-Virus Issues (Detection, Prevention ...)
-Trusted Computing
-Alert Correlation
-Attack Graphs
-Incident Responding
-Malware Analysis
-Incident Responding
IMPORTANT DATES:
ASP: Sessions/Workshops Proposals (As soon as possible)
March 15, 2014: Submission of full papers (about 7 pages)
April 15, 2014: Notification of acceptance (+/- two days)
May 3, 2014: Final papers + Copyright + Registration
July 21-24, 2014: The 2014 International Conference on Security and
Management (SAM'14)
SUBMISSION OF REGULAR PAPERS:
Prospective authors are invited to submit their papers by uploading them
to the evaluation web site at:
https://www.easychair.org/conferences/?conf=sam14
Submissions must be uploaded by March 15, 2014 and must be in pdf formats
(about 7 pages including all figures, tables, and references - single
space, font size of 10 to 12). All reasonable typesetting formats are
acceptable (later, the authors of accepted papers will be asked to follow
a particular typesetting format to prepare their final papers for
publication.) Papers must not have been previously published or currently
submitted for publication elsewhere. The first page of the paper should
include: title of the paper, name, affiliation, postal address, and email
address for each author. The first page should also identify the name of
the Contact Author and a maximum of 5 topical keywords that would best
represent the content of the paper. The track title must also be stated
on the first page of the paper as well as a 100 to 150-word abstract. The
length of the final/Camera-Ready papers (if accepted) will be limited to
7 (two-column IEEE style) pages.
Each paper will be peer-reviewed by two experts in the field for
originality, significance, clarity, impact, and soundness. In cases of
contradictory recommendations, a member of the conference program
committee would be charged to make the final decision (accept/reject);
often, this would involve seeking help from additional referees.
Papers whose authors include a member of the conference program
committee will be evaluated using the double-blinded review process.
(Essay/philosophical papers will not be refereed but may be considered
for discussion/panels). 109849
The proceedings will be published in printed conference books (ISBN) and
will also be made available online. The proceedings will be indexed in
science citation databases that track citation frequency/data for each
published paper. Science citation databases include: Elsevier indexing
products (SCI Elsevier products include, among others: Scopus,
www.info.scopus.com; Engineering Village, www.ei.org; EMBASE,
www.info.embase.com; and others); Inspec / IET / The Institute for
Engineering & Technology; The French National Center for Scientific
Research, CNRS, INIST databases, PASCAL (accessible from INIST, Datastar,
Dialog, EBSCO, OVID, Questel.Orbit, Qwam, and STN International); and
others.
SUBMISSION OF POSTER PAPERS:
Poster papers can be 2 pages long. Authors are to follow the same
instructions that appear above (see, SUBMISSION OF REGULAR PAPERS) except
for the submission is limited to 2 pages. On the first page, the author
should state that "This paper is being submitted as a poster". Poster papers
(if accepted) will be published if and only the author of the accepted paper
wishes to do so. Please email your poster papers to the poster co-chairs:
Hanen Idoudi, Hanen.Idoudi-AT-ensi.rnu.tn or
Esmiralda Moradian, esmirald-AT-dsv.su.se
PROPOSAL FOR ORGANIZING WORKSHOPS/SESSIONS:
Each conference is composed of a number of tracks. A track can be a session,
a workshop, or a symposium. A session will have at least 6 papers; a
workshop at least 12 papers; and a symposium at least 18 papers. Track
chairs will be responsible for all aspects of their tracks, including:
soliciting papers, reviewing, selecting, ... The names of track chairs will
appear as Associate Editors in the conference proceedings and on the cover
of the printed books (and indexed in science databases as such).
Proposals to organize tracks (sessions, workshops, or symposiums) should
include the following information: name and address (+ email) of proposer,
his/her biography, title of track, a 100-word description of the topic of
the track, the name of the conference the track is submitted for
consideration (ie, SAM), and a short description on how the track
will be advertised (in most cases, track proposers solicit papers from
colleagues and researchers whose work is known to the track proposer).
E-mail your track proposal to the Workshops/Sessions co-chairs:
Flaminia Luccio ( luccio-AT-unive.it ) or Shadi Banitaan ( banitash-AT-udmercy.edu ).
We would like to receive the track proposals as soon as possible but by no
later than mid February 2014.
MEMBERS OF STEERING COMMITTEE:
Currently being finalized. The members of the Steering Committee of The
federated joint Congress that SAM was (and will be) part of in recen
years, included: Dr. Selim Aissi, (formerly: Chief Strategist - Security,
Intel Corporation, USA) Senior Business Leader & Chief Architect, Visa
Corporation, USA; Prof. Babak Akhgar, PhD, FBCS, CITP, Professor of
Informatics, Sheffield Hallam University, Sheffield, UK; Prof. Hamid R.
Arabnia, Professor of Computer Science, Elected Fellow of ISIBM,
Editor-in-Chief of Journal of Supercomputing (Springer), University of
Georgia, USA; Prof. Kevin Daimi, Professor of Computer Science, Director
of Computer Science and Software Engineering Programs, Department of
Mathematics, Computer Science and Software Engineering, University of
Detroit Mercy, Detroit, Michigan, USA; Dr. Michael R. Grimaila, Associate
Professor, Air Force Institute of Technology, Systems Engineering, Fellow
of ISSA, CISM, CISSP, IAM/IEM, Editorial Board of ISSA Journal, Air Force
Center of Cyberspace Research, Advisor to the Prince of Wales Fellows &
Prince Edward Fellows at MIT and Harvard Universities and PC member of
NATO Cooperative Cyber Defense Centre of Excellence (CCD COE); Prof. Kun
Chang Lee, Professor of MIS and WCU Professor of Creativity Science,
Business School and Department of Interaction Science, Sungkyunkwan
University, Seoul, South Korea; Prof., Dr., Dr.h. Victor Malyshkin, Head
of Supercomputer Software Department (SSD), Institute of Computational
Mathematics and Mathematical Geophysics, Russian Academy of Sciences,
Russia; Prof. George Markowsky, Professor and Chair of Computer Science,
Associate Director of School of Computing and Information Science, Chair
of International Advisory Board of IEEE IDAACS and Director 2013
Northeast Collegiate Cyber Defense Competition, Chair Bangor Foreign
Policy Forum, Cooperating Professor of Mathematics & Statistics
Department UMaine, Cooperating Professor of School of Policy &
International Affairs UMaine, University of Maine, Orono, Maine, USA;
Prof. Andy Marsh, Director of HoIP, Director of HoIP Telecom, UK,
Secretary-General of WABT, Vice-president of ICET, Visiting Professor,
University of Westminster, UK; Prof. James J. (Jong Hyuk) Park,
Professor of Computer Science and Engineering, Seoul National University
of Science and Technology (SeoulTech), Korea, President of KITCS,
President of FTRA, Editor-in-Chiefs of HCIS, JoC and IJITCC Journals; Ashu
M. G. Solo (Publicity Chair), Fellow of British Computer Society,
Principal R&D Engineer, Maverick Technologies America; Prof. Sang C. Suh,
Head and Professor of Computer Science, Vice President, of Society for
Design and Process Science (SDPS), Director of Intelligent Cyberspace
Engineering Lab (ICEL), Texas A&M University, Com., Texas, USA;
Prof. Layne T. Watson, IEEE Fellow, NIA Fellow, ISIBM Fellow, Fellow of
The National Institute of Aerospace, Virginia Polytechnic Institute &
State University, Virginia, USA. The 2013 Program Committee for SAM
conference is currently being compiled. Many who have already joined the
committees are renowned leaders, scholars, researchers, scientists and
practitioners of the highest ranks; many are directors of research labs.,
fellows of various societies, heads/chairs of departments, program
directors of research funding agencies, as well as deans and provosts.
Program Committee members are expected to have established a strong and
documented research track record. Those interested in joining the Program
Committee should email Professor Daimi ( daimikj-AT-udmercy.edu ) the
following information for consideration/evaluation: Name, affiliation and
position, complete mailing address, email address, a one-page biography
that includes research expertise, and details of two recent papers on
security.
GENERAL INFORMATION:
SAM is an international conference that serves researchers, scholars,
professionals, students, and academicians who are looking to both foster
working relationships and gain access to the latest research results.
It is being held jointly (same location and dates) with a number of
other research conferences; namely, The 2014 World Congress in Computer
Science, Computer Engineering, and Applied Computing (WORLDCOMP). The
Congress is one of the largest annual gathering of researchers in
computer science, computer engineering and applied computing. We
anticipate to have 2,100 or more attendees from over 85 countries.
The 2014 Congress will be composed of research presentations, keynote
lectures, invited presentations, tutorials, panel discussions, and
poster presentations. In recent past, keynote/tutorial/panel speakers
have included: Prof. David A. Patterson (pioneer, architecture, U. of
California, Berkeley), Dr. K. Eric Drexler (known as Father of
Nanotechnology), Prof. John H. Holland (known as Father of Genetic
Algorithms; U. of Michigan), Prof. Ian Foster (known as Father of Grid
Computing; U. of Chicago & ANL), Prof. Ruzena Bajcsy (pioneer, VR, U. of
California, Berkeley), Prof. Barry Vercoe (Founding member of MIT Media Lab,
MIT), Dr. Jim Gettys (known as X-man, developer of X Window System, xhost;
OLPC), Prof. John Koza (known as Father of Genetic Programming, Stanford
U.), Prof. Brian D. Athey (NIH Program Director, U. of Michigan), Prof.
Viktor K. Prasanna (pioneer, U. of Southern California), Dr. Jose L. Munoz
(NSF Program Director and Consultant), Prof. Jun Liu (pioneer, Broad
Institute of MIT & Harvard U.), Prof. Lotfi A. Zadeh (Father of Fuzzy
Logic), Dr. Firouz Naderi (Head, NASA Mars Exploration Program/2000-2005 and
Associate Director, Project Formulation & Strategy, Jet Propulsion Lab,
CalTech/NASA; Director, NASA's JPL Solar System Exploration), Prof. David
Lorge Parnas (Fellow of IEEE, ACM, RSC, CAE, GI; Dr.h.c.: ETH Zurich, Prof.
Emeritus, McMaster U. and U. of Limerick), Prof. Eugene H. Spafford
(Executive Director, CERIAS and Professor, Purdue University), Dr. Sandeep
Chatterjee (Vice President & Chief Technology Officer, SourceTrace Systems,
Inc.), Prof. Haym Hirsh (Rutgers University, New Jersey, USA and former
director of Division of Information and Intelligent Systems, National
Science Foundation, USA), Dr. Flavio Villanustre (Vice- President, HPCC
Systems), and many other distinguished speakers. To get a feeling about
the conferences' atmosphere, see some delegates photos available at:
http://infinitydempsey.smugmug.com/WorldComp
www.pixagogo.com/1676934789
An important mission of the Congress is "Providing a unique platform for a
diverse community of constituents composed of scholars, researchers,
developers, educators, and practitioners. The Congress makes concerted
effort to reach out to participants affiliated with diverse entities (such
as: universities, institutions, corporations, government agencies, and
research centers/labs) from all over the world. The Congress also attempts
to connect participants from institutions that have teaching as their main
mission with those who are affiliated with institutions that have research
as their main mission. The Congress uses a quota system to achieve its
institution and geography diversity objectives."
One main goal of the Congress is to assemble a spectrum of affiliated
research conferences, workshops, and symposiums into a coordinated
research meeting held in a common place at a common time. This model
facilitates communication among researchers in different fields of
computer science, computer engineering, and applied computing. The
Congress also encourages multi-disciplinary and inter-disciplinary
research initiatives; i.e., facilitating increased opportunities for
cross-fertilization across sub-disciplines. Below, you will find a
small subset of the books published based on extended versions of
accepted papers in the congress:
http://store.elsevier.com/Emerging-Trends-in-ICT-S...
http://www.biomedcentral.com/bmcmedgenomics/supple...
http://www.springer.com/life+sciences/bioinformati...
http://www.springer.com/life+sciences/bioinformati...
http://www.biomedcentral.com/1471-2164/9/S1/I1
http://www.springer.com/series/11769
http://www.biomedcentral.com/1752-0509/5?issue=S3
http://pubmedcentralcanada.ca/pmcc/articles/PMC328...
http://pubmedcentralcanada.ca/pmcc/articles/PMC270...
http://pubmedcentralcanada.ca/pmcc/articles/PMC299...
MEASURABLE SCIENTIFIC IMPACT OF CONGRESS:
As of December 14, 2013, papers published in the conference proceedings
that have been held as part of this congress, have received over 27,500
citations (includes about 3,300 self-citations). Citation data obtained
from http://academic.research.microsoft.com/ . The citation data does not
even include more than 15,000 other citations to papers in conferences
whose first offerings were initiated by the congress.
MISCELLANEOUS:
The information that appears in this announcement is correct as of
January 29, 2014
CONTACT:
Inquiries should be sent to: daimikj-AT-udmercy.edu

Last modified: 2014-01-31 00:34:49