WorldCIS 2014 - World Congress on Internet Security (WorldCIS-2014)
Date2014-12-08 - 2014-12-10
Deadline2014-09-15
VenueLondon, UK - United Kingdom
Keywords
Websitehttps://www.worldcis.org
Topics/Call fo Papers
The World Congress on Internet Security (WorldCIS-2014) is an international forum dedicated to the advancement of the theory and practical implementation of Internet security and Computer Networks. The inability to properly secure the Internet, computer networks, protecting the Internet against emerging threats and vulnerabilities, and sustaining privacy and trust has been a key focus of research. The WorldCIS aims to provide a highly professional and comparative academic research forum that promotes collaborative excellence between academia and industry.
The objectives of the WorldCIS are to bridge the knowledge gap between academia and industry, promote research esteem and to fostering discussions on information technologies, information systems and global security applications. The WorldCIS-2014 invites speakers and researchers to submit papers that encompass conceptual analysis, design implementation and performance evaluation. All submitted papers are peer-reviewed (blind reviewed).
Topics of Interest
Original papers are invited on recent advances in Internet, Computer Communications and Networking Security. The topics in WorldCIS-2014 include but are not confined to the following areas:
Access Control
Accountability
Anonymity
Application security
Attacks and defenses
Authentication
Censorship and censorship-resistance
Distributed systems security
Embedded systems security
Intrusion detection
Language-based security
Malware
Metrics
Network security
Privacy-preserving
Resource usage control
Security for mobile computing
Security models
systems Protocol security
Secure information flow
Security and privacy policies
Security architectures
System security
Usability and security
Web security
Internet Application and Technology
Internet Architecture and Technologies
Anonymity and Privacy
Artificial Intelligence and Expert Systems
Network security
Broadband Access Technologies
Application Agents
Boundary Issues of Internet Security
Database Management
Data Models for Production Systems and Services
Data Provenance
Defence Systems Internet Security
Electronic voting
Embedded Systems
IPSec Quality of Service
Knowledge Management
Modeling and verifying
Security, Trust and Privacy
Self-Organizing Networks
Sensor nets and embedded systems
Service overlays
Switches and switching
Topology characterization and Inference
Traffic Measurement and Analysis
Traffic Engineering and Control
Data Security
Virtual and Overlay Networks
Quantification of Integrity
Cyber warfare and Cyber Security
Surveillance Systems
Cyber Warfare Trends and Approaches
Social engineering
Template Protection and Liveliness detection
New theories and algorithms in biometrics
Formal Methods Application in Security
Operating Systems and Database Security
nterprise Systems Security
SCADA and Embedded systems security
Distributed and Pervasive Systems Security
Secure Software Development
Information Security
Biometrics
Chaos-based Data Security
Cryptography
Collaborative Learning
Cyber Security Congestion control
Content Distribution
Cross Layer Design and Optimization
Cyber-physical computing/networking
Distributed Systems Security
Information flow monitor
Language-based security
Network Security Issues and Protocols
Security Challenges and Content Authoring
Secure Communications
Authentication Techniques
MANET Security
Wireless Sensor Network Security
Organization Considerations in Security Policy
Digital Forensics and Crimes
Formulation and Implementations
Geographic information systems
Privacy Protection
Regulations
Quantitative Information Flow
Multimedia and Web Services
Intelligent Multimedia and its Data Management
Multimedia Information Systems
Multimedia Security
Web Databases
Web Metrics and its Applications
Web Mining including Web Intelligence and Web 3.0.
XML and other extensible languages
Semantic Web and Ontology
Web services and performance
Secured Database Systems
Security in Data Mining
Defence Systems
Virtual Reality
Hardware-Based Security
Trust and trust management
Electronic Society
Trust, Privacy and Data Security
Anonymity, Pseudonymity, and Unlinkability
data Correlation and Leakage Attacks
Privacy Enhancing Technologies
Wireless Privacy
User Profiling
Information Dissemination Control
Dynamic vs. Static Flow-Sensitive Security Analysis
Digital Forensic
Data leakage and Database forensics
Forensics of Virtual and Cloud Environments
Network Forensics and Traffic Analysis
Information Hiding
File System and Memory Analysis
Executable Content and Content Filtering
Anti-Forensics Techniques
Malware forensics
Evidentiary Aspects of Digital Forensics
Large-Scale Investigations
New threats and Non-Traditional approaches
Incident Handling and Penetration Testing
Network Security
Ad hoc Mobile Networks Security
Addressing and Location Management
Broadband Access Technologies
Blended Internet Security Methods
Boundary Issues of Internet Security
Capacity Planning
Cellular and Broadband Wireless Nets
Complex systems and complexity
Formal verification of privacy for RFID systems
Optical Networks
Middleware Support for Networking
Mobility Models and Systems
Multicast and Anycast
Multimedia Protocols and Networking
Network Applications and Services
Network Architectures
Network Simulation and Emulation
Novel Network Architectures
Network and Protocol Architectures
Peer-to-Peer Communications
Performance Evaluation
Power Control and Management
Protocols and Standards
Resource Allocation and Management
Wireless Mesh Networks and Protocols
Ubiquitous Computing
Context-Awareness and its Data Mining for UbiCom
Data Grids
Distributed Information Systems
Forensic in Ubi-com
Human-Computer Interface and Interaction for UbiCom
Ubiquitous Systems
USN/RFID Service
UbiCom Service Business Model
Data Management for UbiCom
Peer to Peer Data Management
Ubiquitous Application
Delay/disruption tolerant networks
End Users
Enabling Technologies for the Internet
Implementation and Experimental Testbeds
Quality of Service Issues
Cloud Security
Secure Virtual Infrastructure and Private Cloud
Cryptographic Enforcement of Multi-Tenancy
Cloud Requirements for PaaS and SaaS
Security Policy and Privacy Requirements
CloudAudit Protocol
Corporate Governance
Laws and Regulations
Threats, Vulnerabilities, and Risk Management
Disaster Recovery Planning
Critical Infrastructure Protection
Digital Rights Management
Security Policies and Trust Management
Identity Management
Decidability and Complexity
Economics of Security
Fraud Management
Research in Progress
Ongoing Research from Undergraduates, Graduates/Postgraduates and Professionals
Future Internet Design and Applications
The objectives of the WorldCIS are to bridge the knowledge gap between academia and industry, promote research esteem and to fostering discussions on information technologies, information systems and global security applications. The WorldCIS-2014 invites speakers and researchers to submit papers that encompass conceptual analysis, design implementation and performance evaluation. All submitted papers are peer-reviewed (blind reviewed).
Topics of Interest
Original papers are invited on recent advances in Internet, Computer Communications and Networking Security. The topics in WorldCIS-2014 include but are not confined to the following areas:
Access Control
Accountability
Anonymity
Application security
Attacks and defenses
Authentication
Censorship and censorship-resistance
Distributed systems security
Embedded systems security
Intrusion detection
Language-based security
Malware
Metrics
Network security
Privacy-preserving
Resource usage control
Security for mobile computing
Security models
systems Protocol security
Secure information flow
Security and privacy policies
Security architectures
System security
Usability and security
Web security
Internet Application and Technology
Internet Architecture and Technologies
Anonymity and Privacy
Artificial Intelligence and Expert Systems
Network security
Broadband Access Technologies
Application Agents
Boundary Issues of Internet Security
Database Management
Data Models for Production Systems and Services
Data Provenance
Defence Systems Internet Security
Electronic voting
Embedded Systems
IPSec Quality of Service
Knowledge Management
Modeling and verifying
Security, Trust and Privacy
Self-Organizing Networks
Sensor nets and embedded systems
Service overlays
Switches and switching
Topology characterization and Inference
Traffic Measurement and Analysis
Traffic Engineering and Control
Data Security
Virtual and Overlay Networks
Quantification of Integrity
Cyber warfare and Cyber Security
Surveillance Systems
Cyber Warfare Trends and Approaches
Social engineering
Template Protection and Liveliness detection
New theories and algorithms in biometrics
Formal Methods Application in Security
Operating Systems and Database Security
nterprise Systems Security
SCADA and Embedded systems security
Distributed and Pervasive Systems Security
Secure Software Development
Information Security
Biometrics
Chaos-based Data Security
Cryptography
Collaborative Learning
Cyber Security Congestion control
Content Distribution
Cross Layer Design and Optimization
Cyber-physical computing/networking
Distributed Systems Security
Information flow monitor
Language-based security
Network Security Issues and Protocols
Security Challenges and Content Authoring
Secure Communications
Authentication Techniques
MANET Security
Wireless Sensor Network Security
Organization Considerations in Security Policy
Digital Forensics and Crimes
Formulation and Implementations
Geographic information systems
Privacy Protection
Regulations
Quantitative Information Flow
Multimedia and Web Services
Intelligent Multimedia and its Data Management
Multimedia Information Systems
Multimedia Security
Web Databases
Web Metrics and its Applications
Web Mining including Web Intelligence and Web 3.0.
XML and other extensible languages
Semantic Web and Ontology
Web services and performance
Secured Database Systems
Security in Data Mining
Defence Systems
Virtual Reality
Hardware-Based Security
Trust and trust management
Electronic Society
Trust, Privacy and Data Security
Anonymity, Pseudonymity, and Unlinkability
data Correlation and Leakage Attacks
Privacy Enhancing Technologies
Wireless Privacy
User Profiling
Information Dissemination Control
Dynamic vs. Static Flow-Sensitive Security Analysis
Digital Forensic
Data leakage and Database forensics
Forensics of Virtual and Cloud Environments
Network Forensics and Traffic Analysis
Information Hiding
File System and Memory Analysis
Executable Content and Content Filtering
Anti-Forensics Techniques
Malware forensics
Evidentiary Aspects of Digital Forensics
Large-Scale Investigations
New threats and Non-Traditional approaches
Incident Handling and Penetration Testing
Network Security
Ad hoc Mobile Networks Security
Addressing and Location Management
Broadband Access Technologies
Blended Internet Security Methods
Boundary Issues of Internet Security
Capacity Planning
Cellular and Broadband Wireless Nets
Complex systems and complexity
Formal verification of privacy for RFID systems
Optical Networks
Middleware Support for Networking
Mobility Models and Systems
Multicast and Anycast
Multimedia Protocols and Networking
Network Applications and Services
Network Architectures
Network Simulation and Emulation
Novel Network Architectures
Network and Protocol Architectures
Peer-to-Peer Communications
Performance Evaluation
Power Control and Management
Protocols and Standards
Resource Allocation and Management
Wireless Mesh Networks and Protocols
Ubiquitous Computing
Context-Awareness and its Data Mining for UbiCom
Data Grids
Distributed Information Systems
Forensic in Ubi-com
Human-Computer Interface and Interaction for UbiCom
Ubiquitous Systems
USN/RFID Service
UbiCom Service Business Model
Data Management for UbiCom
Peer to Peer Data Management
Ubiquitous Application
Delay/disruption tolerant networks
End Users
Enabling Technologies for the Internet
Implementation and Experimental Testbeds
Quality of Service Issues
Cloud Security
Secure Virtual Infrastructure and Private Cloud
Cryptographic Enforcement of Multi-Tenancy
Cloud Requirements for PaaS and SaaS
Security Policy and Privacy Requirements
CloudAudit Protocol
Corporate Governance
Laws and Regulations
Threats, Vulnerabilities, and Risk Management
Disaster Recovery Planning
Critical Infrastructure Protection
Digital Rights Management
Security Policies and Trust Management
Identity Management
Decidability and Complexity
Economics of Security
Fraud Management
Research in Progress
Ongoing Research from Undergraduates, Graduates/Postgraduates and Professionals
Future Internet Design and Applications
Other CFPs
Last modified: 2014-08-24 23:49:57