CRiSIS 2017 - 12th International Conference on Risks and Security of Internet and Systems CRiSIS 2017
Topics/Call fo Papers
The International Conference on Risks and Security of Internet and Systems 2017 will be the 12th in a series dedicated to security issues in Internet-related applications, networks and systems. Internet has become essential for the exchange of information between user groups and organizations from different backgrounds and with different needs and objectives. These users are exposed to increasing risks regarding security and privacy, due to the development of more and more sophisticated online attacks, the growth of Cyber Crime, etc. Attackers nowadays do not lack motivation and they are more and more experienced. To make matters worse, for performing attacks have become easily accessible. Moreover, the increasing complexity as well as the immaturity of new technologies such as pervasive, mobile and wireless devices and networks, raise new security challenges.
In this context, new security mechanisms and techniques should be deployed to achieve an assurance level acceptable for critical domains such as energy, transportation, health, defense, banking, critical infrastructures, embedded systems and networks, avionics systems, etc. The CRiSIS conference offers a remarkable forum for computer and network security actors from industry, academia and government to meet, exchange ideas and present recent advances on Internet-related security threats and vulnerabilities, and on the solutions that are needed to counter them.
TOPICS :
The topics addressed by CRiSIS range from the analysis of risks, attacks to networks and system survivability, to security models, security mechanisms and privacy enhancing technologies. The authors are invited to submit research results as well as practical experiment or deployment reports. Industrial papers about applications or case studies are also welcomed in different domains (e.g., telemedicine, banking, e-government, e-learning, e-commerce, critical infrastructures, mobile networks, embedded applications, etc.). The list of topics includes but is not limited to:
* Analysis and management of risk
* Attacks and defenses
* Attack data acquisition and network monitoring
* Cryptography, biometrics, watermarking
* Dependability and fault tolerance of Internet applications
* Distributed systems security
* Embedded system security
* Empirical methods for security and risk evaluation
* Hardware-based security and physical security
* Intrusion detection and prevention systems
* Organizational, ethical and legal issues
* Privacy protection and anonymization
* Risk-aware access and usage control
* Security and risk assessment
* Security and risks metrics
* Security and dependability of operating systems
* Security and safety of critical infrastructures
* Security and privacy of peer-to-peer system
* Security and privacy of wireless networks
* Security models and security policies
* Security of new generation networks, security of VoIP and multimedia
* Security of e-commerce, electronic voting and database systems
* Security of social networks
* Security of industrial control systems
* Smartphone security and privacy
* Traceability, metrology and forensics
* Trust management
* Use of smart cards and personal devices for Internet applications
* Web and cloud security
SUBMISSION GUIDELINES:
Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be written in English and must
be submitted electronically in PDF format.
The papers that will be selected for presentation at the conference will be included in post-proceedings published by Springer in the Lecture Notes in Computer Science (LNCS) series (prior to publication the papers should be revised according to the review comments). Pre-proceedings will appear at the time of the conference.
Maximum paper length will be 16 printed pages for full papers or 6 pages for short papers, in LNCS style ( http://www.springer.de/comp/lncs/authors.html ). Authors of accepted papers must guarantee that their papers will be presented at the conference. All paper submissions will be handled through the Easy Chair conference management system: https://easychair.org/conferences/?conf=crisis2017
PUBLICATION:
Proceedings are planned to be published by Springer in the Lecture Notes in Computer Science (LNCS) series in conjunction with the DPM and QASA workshops. The submitted paper (in PDF format) should follow the template indicated by Springer (see http://www.springer.de/comp/lncs/authors.html ).
CALL for Tutorials:
We solicit tutorials on state-of-the-art technologies relevant to the conference themes. We are particularly interested in tutorials that foster knowledge exchange among the different research communities present at the conference.
The intended length of each tutorial is 2 to 3 hours.
A tutorial proposal should include a brief summary and outline, specific goals and objectives, the intended audience and the expected background
of the audience as well as a biographical sketch of the presenter(s). The length of tutorial proposals should not exceed 5 pages.
Tutorial proposals should be submitted to the tutorial program chair:
Nora Cuppens-Boulahia by email :
Nora(dot)Cuppens-AT-imt-atlantique(dot)fr before June 10, 2017.
IMPORTANT DATES:
* Submission deadline: June 1th, 2017
* Notification to authors: July 10th, 2017
* Camera-ready versions: July 15th, 2017
* Conference dates: September 19th-21nd, 2017
COMMITTEE:
* Organization Chairs:
- Nora Cuppens , IMT Atlantique, France
- Jean-Louis Lanet , LHS Rennes, France
* Program Committee chairs :
- Frédéric Cuppens , IMT Atlantique, France
- Axel Lagay , INRIA, France
* Tutorial and Publication Chair :
- Joaquin Garcia Alfaro , TELECOM SudParis, France
* Publicity Chairs:
- Ronan Lashermes , INRIA, France
- Reda Yaich , IMT Atlantique, France
* Local Organization Chair:
- Ghislaine Le Gall , IMT Atlantique, France
* Program Committee chairs:
* Esma Aimer , University of Montreal
* Luca Allodi ,University of Trento
* Jocelyn Aubert , Luxembourg Institute of Science and Technology
* Christophe Bidan , CentraleSupelec
* Fabrizio Biondi , IRISA/INRIA Rennes
* Anis Bkakria , IMT Atlantique
* Yu Chen , State University of New York Binghamton
* Jorge Cuellar , Siemens AG, CT T
* Nora Cuppens-Boulahia ,
* Frédéric Cuppens , IMT Atlantique, France
* Jose M. Fernandez , Ecole Polytechnique de Montreal
* Simone Fischer-Hübner , Karlstad University
* Simon Foley , University College Cork
* Joaquin Garcia-Alfaro, Telecom SupParis
* Bogdan Groza , Politehnica University of Timisoara
* Ruan He , Orange
* Christos Kalloniatis , University of the Aegean
* Sokratis Katsikas , Center for Cyber and Information Security, NTNU
* Nizar Kheir, Thales Group
* Barbara Kordy , INSA Rennes, IRISA
* Igor Kotenko, St. Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences (SPIIRA)
* Marc Lacoste, Orange
* Kostas Lambrinoudakis , University of Piraeus
* Jean-Louis Lanet , INRIA - RBA
* Javier Lopez , University of Malaga
* Raja Natarajan , TIFR, India
* Stephen Neville , University of Victoria
* Roberto Di Pietro , Bell Labs
* Kei Rannenberg , Goethe University Frankfurt
* Michael Rusinowitch , LORIA INRIA Nancy
* Ketil Stoelen , SINTEF
* Nadia Tawbi , Université de Laval
* Lingyu Wang , Concordia University
CONTACTS:
For any enquiries, please send an email to : crisis2017-AT-easychair.org
In this context, new security mechanisms and techniques should be deployed to achieve an assurance level acceptable for critical domains such as energy, transportation, health, defense, banking, critical infrastructures, embedded systems and networks, avionics systems, etc. The CRiSIS conference offers a remarkable forum for computer and network security actors from industry, academia and government to meet, exchange ideas and present recent advances on Internet-related security threats and vulnerabilities, and on the solutions that are needed to counter them.
TOPICS :
The topics addressed by CRiSIS range from the analysis of risks, attacks to networks and system survivability, to security models, security mechanisms and privacy enhancing technologies. The authors are invited to submit research results as well as practical experiment or deployment reports. Industrial papers about applications or case studies are also welcomed in different domains (e.g., telemedicine, banking, e-government, e-learning, e-commerce, critical infrastructures, mobile networks, embedded applications, etc.). The list of topics includes but is not limited to:
* Analysis and management of risk
* Attacks and defenses
* Attack data acquisition and network monitoring
* Cryptography, biometrics, watermarking
* Dependability and fault tolerance of Internet applications
* Distributed systems security
* Embedded system security
* Empirical methods for security and risk evaluation
* Hardware-based security and physical security
* Intrusion detection and prevention systems
* Organizational, ethical and legal issues
* Privacy protection and anonymization
* Risk-aware access and usage control
* Security and risk assessment
* Security and risks metrics
* Security and dependability of operating systems
* Security and safety of critical infrastructures
* Security and privacy of peer-to-peer system
* Security and privacy of wireless networks
* Security models and security policies
* Security of new generation networks, security of VoIP and multimedia
* Security of e-commerce, electronic voting and database systems
* Security of social networks
* Security of industrial control systems
* Smartphone security and privacy
* Traceability, metrology and forensics
* Trust management
* Use of smart cards and personal devices for Internet applications
* Web and cloud security
SUBMISSION GUIDELINES:
Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be written in English and must
be submitted electronically in PDF format.
The papers that will be selected for presentation at the conference will be included in post-proceedings published by Springer in the Lecture Notes in Computer Science (LNCS) series (prior to publication the papers should be revised according to the review comments). Pre-proceedings will appear at the time of the conference.
Maximum paper length will be 16 printed pages for full papers or 6 pages for short papers, in LNCS style ( http://www.springer.de/comp/lncs/authors.html ). Authors of accepted papers must guarantee that their papers will be presented at the conference. All paper submissions will be handled through the Easy Chair conference management system: https://easychair.org/conferences/?conf=crisis2017
PUBLICATION:
Proceedings are planned to be published by Springer in the Lecture Notes in Computer Science (LNCS) series in conjunction with the DPM and QASA workshops. The submitted paper (in PDF format) should follow the template indicated by Springer (see http://www.springer.de/comp/lncs/authors.html ).
CALL for Tutorials:
We solicit tutorials on state-of-the-art technologies relevant to the conference themes. We are particularly interested in tutorials that foster knowledge exchange among the different research communities present at the conference.
The intended length of each tutorial is 2 to 3 hours.
A tutorial proposal should include a brief summary and outline, specific goals and objectives, the intended audience and the expected background
of the audience as well as a biographical sketch of the presenter(s). The length of tutorial proposals should not exceed 5 pages.
Tutorial proposals should be submitted to the tutorial program chair:
Nora Cuppens-Boulahia by email :
Nora(dot)Cuppens-AT-imt-atlantique(dot)fr before June 10, 2017.
IMPORTANT DATES:
* Submission deadline: June 1th, 2017
* Notification to authors: July 10th, 2017
* Camera-ready versions: July 15th, 2017
* Conference dates: September 19th-21nd, 2017
COMMITTEE:
* Organization Chairs:
- Nora Cuppens , IMT Atlantique, France
- Jean-Louis Lanet , LHS Rennes, France
* Program Committee chairs :
- Frédéric Cuppens , IMT Atlantique, France
- Axel Lagay , INRIA, France
* Tutorial and Publication Chair :
- Joaquin Garcia Alfaro , TELECOM SudParis, France
* Publicity Chairs:
- Ronan Lashermes , INRIA, France
- Reda Yaich , IMT Atlantique, France
* Local Organization Chair:
- Ghislaine Le Gall , IMT Atlantique, France
* Program Committee chairs:
* Esma Aimer , University of Montreal
* Luca Allodi ,University of Trento
* Jocelyn Aubert , Luxembourg Institute of Science and Technology
* Christophe Bidan , CentraleSupelec
* Fabrizio Biondi , IRISA/INRIA Rennes
* Anis Bkakria , IMT Atlantique
* Yu Chen , State University of New York Binghamton
* Jorge Cuellar , Siemens AG, CT T
* Nora Cuppens-Boulahia ,
* Frédéric Cuppens , IMT Atlantique, France
* Jose M. Fernandez , Ecole Polytechnique de Montreal
* Simone Fischer-Hübner , Karlstad University
* Simon Foley , University College Cork
* Joaquin Garcia-Alfaro, Telecom SupParis
* Bogdan Groza , Politehnica University of Timisoara
* Ruan He , Orange
* Christos Kalloniatis , University of the Aegean
* Sokratis Katsikas , Center for Cyber and Information Security, NTNU
* Nizar Kheir, Thales Group
* Barbara Kordy , INSA Rennes, IRISA
* Igor Kotenko, St. Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences (SPIIRA)
* Marc Lacoste, Orange
* Kostas Lambrinoudakis , University of Piraeus
* Jean-Louis Lanet , INRIA - RBA
* Javier Lopez , University of Malaga
* Raja Natarajan , TIFR, India
* Stephen Neville , University of Victoria
* Roberto Di Pietro , Bell Labs
* Kei Rannenberg , Goethe University Frankfurt
* Michael Rusinowitch , LORIA INRIA Nancy
* Ketil Stoelen , SINTEF
* Nadia Tawbi , Université de Laval
* Lingyu Wang , Concordia University
CONTACTS:
For any enquiries, please send an email to : crisis2017-AT-easychair.org
Other CFPs
- First international congress for the advancement of mechanism, machine, robotics and mechatronics sciences
- ISER - 210th International Conference on Science, Technology, Engineering and Management (ICSTEM)
- ISER- 209th International Conference on Science, Health and Medicine (ICSHM)
- ISER- 209th International Conference on Physical Education and Sport Science (ICPESS)
- ISER- 225th International Conference on Education and Social Science (ICESS-2017)
Last modified: 2017-05-04 10:47:45