ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

ARES 2017 - 12th International Conference on Availability, Reliability and Security

Date2017-08-29 - 2017-09-01

Deadline2017-05-10

VenueUniversità degli Studi Mediterranea di Reggio Calabria, Italy Italy

Keywords

Websitehttps://www.ares-conference.eu/conference

Topics/Call fo Papers

Authorization, Authentication, and Access Control
Availability, Dependability, and Resilience
Botnets and Botnet Monitoring
Business Continuity & Resilience
Cost/Benefit Analysis
Cryptography
Dependability Aspects for Special Applications
Dependability Aspects of e-Government
Dependability and Resilience in Open Source Software
Designing Security Requirements
Digital Forensics
E-Commerce Dependability
Identity Management
IPR of Security Technology
Incident Response and Prevention
Information Flow Control
Information Hiding and Steganograhpy
Interoperability Aspects
Intrusion Detection and Fraud Detection
Legal Issues related to Security and Privacy
Mobile Security
Network and Organizational Vulnerability Analysis
Network Security
Privacy-Enhancing Technologies
Process based Security Models and Methods
Resilience and Security for Critical Infrastructures
Resilience of Computing Systems
Resilience, Security, and Privacy for Smart Grids
Resilience, Security, and Privacy for the Internet of Things
RFID Security and Privacy
Risk planning, Analysis & Awareness
Safety Critical Systems
Secure Enterprise Architectures
Security and Privacy for Ubiquitous Systems
Security and Privacy in E-Health
Security and Trust Management in P2P and Grid applications
Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications
Security and Usability
Security as Quality of Service
Security in Distributed Systems / Distributed Databases
Security in Electronic Payments
Security in Electronic Voting
Software Engineering of Dependable Systems
Software Security
Threats and Attack Modelling
Trusted Computing
Tools for Dependable System Design and Evaluation
Trust Models and Trust Management
Wireless Security

Last modified: 2017-01-31 18:14:34