posted by user: ilhan || 998 views || tracked by 1 users: [display]

ACNNS 2015 : 2nd Advances in Computer Networks and Network Security

FacebookTwitterLinkedInGoogle

Link: http://csen-scoop.org/acnns/index.php
 
When Nov 7, 2015 - Nov 8, 2015
Where Istanbul, Turkey
Submission Deadline TBD
Categories    networks   engineering   network security   computer engineering
 

Call For Papers

ACNNS-2015 is one of the area focused international workshops for presenting novel ideas and advances in the area of Computer Networks and Network Security organized by Scientific Cooperations. ACNNS-2015 aims to increase the collaboration among researchers and practitioners with a common interest in Computer Networks and Network Security through scientific and technological publications. ACNNS-2015 will take place in Istanbul-TURKEY during November 7-8, 2015. The Scientific Cooperations society intends to accelerate the relations among researchers.

Important Dates
Full Paper Submission Due August 24, 2015
Acceptance Notification Due September 20, 2015
Registration Due October 5, 2015

All the accepted full papers are going to be published in the Proceedings booklet with an ISBN number along with proceeding CD. Papers will also be published online on our web site. Proceeding papers will be included in Google Scholar and sent to be reviewed for their inclusion in the ISI Citation Index database.

Topics of Interest
• 3G/4G Networks Evolution
• A Formal Immune Network And Its Implementation For Online Intrusion Detection
• A Generic Model For Analyzing Security Protocols
• A Modal Logic For RoleBased Access Control
• A New Scheme For The Location Information Protection In Mobile Communication Environments
• A Passive External Web Surveillance Technique For Private Networks
• A Probabilistic PropertySpecific Approach To Information Flow
• A Secure Way To Combine IPsec, NAT & DHCP
• A Temporal LogicBased Model For Forensic Investigation In Networked System Security
• A Theoretical Model For The Average Impact Of Attacks On Billing Infrastructures
• An Efficient Access Control Model Utilized The Attribute Certificate Structuring
• An OntologyBased Approach To Information Systems Security Management
• An XMLSeamless Policy Based Management Framework
• Analyzing Vulnerabilities And Measuring Security Level At Design And Exploitation Stages Of Computer Network Life Cycle
• Asynchronous Alert Correlation In Multiagent Intrusion Detection Systems
• Authentication, Authorization And Access Control
• BehaviorBased Model Of Detection And Prevention Of Intrusions In Computer Networks
• Calibrating Entropy Functions Applied To Computer Networks
• Cognitive Networks
• Computer Network And Wireless Network Security
• Convergence/Integration In Networks
• Critical Information Assurance Challenges For Modern LargeScale Infrastructures
• Cryptographic Protocols
• Detection Of Illegal Information Flow
• Developing An Insider Threat Model Using Functional Decomposition
• Digital Rights Management
• Distributed Systems
• Encoding Private Key In Fingerprint
• Generalized Abstract Noninterference: Abstract Secure InformationFlow Analysis For Automata
• Identity Theft And Phishing In Mobile Networks
• Information Flow Analysis, Covert Channels And Trust Management
• Intrusion Detection And Prevention
• Intrusion Detection Hybrid Intrusion Detection Model Based On Ordered Sequences
• Key Escrow With TreeBased Access Structure
• Key Management In Wireless Networks
• MANETs & Sensor Networks
• Massive Data Mining For Polymorphic Code Detection
• Mathematical Models, Architectures And Protocols For Computer Network Security
• Mobile, Ad Hoc And Sensor Network Security
• Models And Analysis Of Active Worm Defense
• Multimedia Communication
• Naming And Addressing Vulnerabilities
• Network Management And Performance
• Network Security
• Network Security Applications
• Network Testbeds
• Network Traffic Engineering
• Networks, Markov Lie Monoids, And Generalized Entropy
• Next Generation Networks
• Optical Networks
• Prevention Of Information Attacks By RunTime Detection Of Selfreplication In Computer Codes
• Region Protection/Restoration Scheme In Survivable Networks
• RuleBased Topological Vulnerability Analysis
• Safety Problems In Access Control With Temporal Constraints
• Satellite Networks
• Secure Protected Password Change Scheme
• Secure System Architectures, Security Policy, Security Protocols Digital Rights Management
• Security Checker Architecture For PolicyBased Security Management
• Security Policy And Operating System Security PolicyDriven Routing Management Using CIM
• Security Threats: DDoS, MiM, Session Hijacking
• Short Papers Foundation For A Time Interval Access Control Model
• Software Defined Radio
• Statistical Covert Channels Through PROXY Server
• Threat Modeling, Vulnerability Assessment And Network Forensics
• Towards More Controllable And Practical Delegation
• Trust By Workflow In Autonomic Communication
• Trust Establishment
• Unique UserGenerated Digital Pseudonyms
• User Privacy, Location Privacy
• Vulnerabilities Detection In The Configurations Of MS Windows Operating System
• Wireless And Mobile Networks
• Wireless And Wireline Network Integration

Website: http://csen-scoop.org/acnns/index.php
Enquiries: secretary@eng-scoop.org

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IEEE-Ei/Scopus-ACEPE 2024   2024 IEEE Asia Conference on Advances in Electrical and Power Engineering (ACEPE 2024) -Ei Compendex
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
IEEE-Ei/Scopus-SGGEA 2024   2024 Asia Conference on Smart Grid, Green Energy and Applications (SGGEA 2024) -EI Compendex
IJCNN 2025   International Joint Conference on Neural Networks
SVC 2025   6th International Conference on Signal Processing, VLSI Design & Communication Systems
25th EANN/EAAAI 2025   25th (EANN/EAAAI) Engineering Applications and Advances of of Artificial Intelligence
BIBC 2024   5th International Conference on Big Data, IOT and Blockchain
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
EEI 2024   10th International Conference on Emerging Trends in Electrical, Electronics & Instrumentation Engineering