CRiSIS 2014 - CRiSIS 2014 : Conference on Risks and Security of Internet and Systems
Topics/Call fo Papers
The topics addressed by CRiSIS range from the analysis of risks, attacks to networks and system survivability, as well as security models, security mechanisms and privacy enhancing technologies. Prospective authors are invited to submit research results as well as practical experiment or deployment reports. Industrial papers about applications and case studies, such as tele medicine, banking, e-government and critical infrastructure, are also welcome. The list of topics includes but is not limited to:
? Analysis and management of risk
? Attacks and defenses
? Attack data acquisition and network monitoring
? Cryptography, Biometrics, Watermarking
? Dependability and fault tolerance of Internet applications
? Distributed systems security
? Embedded system security
? Empirical methods for security and risk evaluation
? Hardware-based security and Physical security
? Intrusion detection and Prevention systems
? Organizational, ethical and legal issues
? Privacy protection and anonymization
? Risk-aware access and usage control
? Security and risk assessment
? Security and risks metrics
? Security and dependability of operating systems
? Security and safety of critical infrastructures
? Security and privacy of peer-to-peer system
? Security and privacy of wireless networks
? Security models and security policies
? Security of new generation networks, security of VoIP and multimedia
? Security of e-commerce, electronic voting and database systems
? Security of social networks
? Smartphone security and privacy
? Traceability, metrology and forensics
? Trust management
? Use of smart cards and personal devices for Internet applications
? Web and cloud security
Previous Editions
8th La Rochelle 2012 France
7th Cork 2012 Ireland
6th Timi?oara, 2011 Romania
5th Montréal, 2010 Canada
4th Toulouse, 2009 France
3rd Tozeur, 2008 Tunisia
2nd Marrakech, 2007, Morocco
1st Bourges, 2005 France
? Analysis and management of risk
? Attacks and defenses
? Attack data acquisition and network monitoring
? Cryptography, Biometrics, Watermarking
? Dependability and fault tolerance of Internet applications
? Distributed systems security
? Embedded system security
? Empirical methods for security and risk evaluation
? Hardware-based security and Physical security
? Intrusion detection and Prevention systems
? Organizational, ethical and legal issues
? Privacy protection and anonymization
? Risk-aware access and usage control
? Security and risk assessment
? Security and risks metrics
? Security and dependability of operating systems
? Security and safety of critical infrastructures
? Security and privacy of peer-to-peer system
? Security and privacy of wireless networks
? Security models and security policies
? Security of new generation networks, security of VoIP and multimedia
? Security of e-commerce, electronic voting and database systems
? Security of social networks
? Smartphone security and privacy
? Traceability, metrology and forensics
? Trust management
? Use of smart cards and personal devices for Internet applications
? Web and cloud security
Previous Editions
8th La Rochelle 2012 France
7th Cork 2012 Ireland
6th Timi?oara, 2011 Romania
5th Montréal, 2010 Canada
4th Toulouse, 2009 France
3rd Tozeur, 2008 Tunisia
2nd Marrakech, 2007, Morocco
1st Bourges, 2005 France
Other CFPs
- The Fourth International Conference on Geotechnique, Construction Materials and Environment, GEOMATE 2014
- IEEE 2014 Second International Workshop on Engineering Mobile Service Oriented Systems (EMSOS 2014)
- ISTTE's Annual Conference
- International Conference on Experiential Learning in Hospitality and Tourism
- The 4th Workshop on Social Network Analysis in Applications
Last modified: 2014-02-21 06:58:18