posted by organizer: jrak || 12919 views || tracked by 6 users: [display]

MMM-ACNS 2017 2017 : 7th International Conference on Mathematical Methods, Models and Architectures for Computer Networks Security

FacebookTwitterLinkedInGoogle

Link: http://www.mmm-acns2017.pl/
 
When Aug 28, 2017 - Aug 30, 2017
Where Warsaw, Poland
Submission Deadline Mar 4, 2017
Notification Due Apr 15, 2017
Final Version Due Apr 30, 2017
Categories    computer networks security   computer networks   communications   information security
 

Call For Papers

----------------------------------------------------------------------------
Conference Proceedings will be published by Springer in
Lecture Notes in Computer Science (LNCS)
http://www.springer.com/gp/computer-science/lncs
----------------------------------------------------------------------------


CALL FOR PAPERS

MMM-ACNS 2017

7th International Conference on
Mathematical Methods, Models and Architectures
for Computer Networks Security

August 28-30, 2017, Warsaw, Poland

http://www.mmm-acns2017.pl/


----------------------------------------------------------------------------
Paper submission web page: https://edas.info/N22996
============================================================================

The main goals of MMM-ACNS-2017 are:
- to bring together leading researchers from academia and governmental
organizations as well as practitioners in the area of computer networks and
information security with a focus on novel theoretical aspects of computer
network security,

- to facilitate personal interactions and discussions on various aspects of
information technologies in conjunction with computer network and information
security problems arising in large-scale computer networks.

Former editions of MMM-ACNS were organized by St. Petersburg Institute for
Informatics and Automation and Binghamton University in 2001, 2003, 2005,
2007, 2010, and 2012. They demonstrated the high interest of the scientific
community to the theoretical and practical aspects of the computer network
and information security.


----------------------------------------------------------------------------

The topics cover, but are not necessarily limited to the following:
- Adaptive security,
- Anti-malware techniques: detection, analysis, prevention,
- Anti-phishing, anti-spam, anti-fraud, anti-botnet techniques,
- Applied cryptography,
- Authentication, authorization and access control,
- Cloud Security,
- Computer and network forensics,
- Covert channels,
- Critical infrastructure protection,
- Cyber-physical systems,
- Cyber security of industrial control systems,
- Data and application security,
- Data mining, machine learning, and bio-inspired approaches for security,
- Deception systems and honeypots,
- Denial-of-service attacks and countermeasures,
- Digital Rights Management,
- eCommerce, eBusiness and eGovernment security,
- Embedded system security,
- Formal analysis of security properties,
- Information resilience under malicious attacks,
- Information warfare,
- Internet and web security,
- Intrusion prevention, detection, and response,
- Language-based security,
- Network resilience,
- New ideas and paradigms for security,
- Operating system security,
- Reliability and dependability,
- Risks metrics, risk analysis and risk management,
- Security and privacy in pervasive and ubiquitous computing,
- Security event and information management,
- Security for large-scale systems and critical infrastructures,
- Security in social networks,
- Security of emerging technologies: sensor, wireless/mobile, peer-to-peer
and overlay networks,
- Security of autonomous agents and multi-agent systems,
- Security modeling and simulation,
- Security policies,
- Security protocols,
- Security verification,
- Security visualization,
- Self-protecting and healing,
- Smartphone security,
- Trusted computing,
- Trust and reputation management,
- Vulnerability assessment.



The total length of a paper should not exceed 12 pages formatted according
to the template of Lecture Notes in Computer Science provided by Springer at:
http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0


The Best Paper Award will be given.

----------------------------------------------------------------------------
Important dates:
- Paper submission deadline: March 04, 2017
- Notification deadline: April 15, 2017
- Camera-ready: April 30, 2017
----------------------------------------------------------------------------


MMM-ACNS 2017 Organization:
-----------------------

General Chairs
Jacek Rak, Gdansk University of Technology (PL)
John Bay, Binghamton University (US)


Publication Chair
Krzysztof Szczypiorski, Warsaw University of Technology (PL)


Technical Program Committee Co-Chairs
Igor Kotenko, SPIIRAS (RU)
Victor Skormin, Binghamton University (US)
Leonard Popyack, Utica Colllege (US)


Local Organizing Committee
Andrzej Dulka, SIT (PL)
Wojciech Hałka, SIT (PL)
Mirosław Stando, SIT (PL)
Ewa Woroszyło, SIT (PL)

Related Resources

BIOINFORMATICS 2026   17th International Conference on Bioinformatics Models, Methods and Algorithms
Ei/Scopus-SGGEA 2025   2025 2nd Asia Conference on Smart Grid, Green Energy and Applications (SGGEA 2025)
Ei/Scopus-CCNML 2025   2025 5th International Conference on Communications, Networking and Machine Learning (CCNML 2025)
CVAI 2026   2026 International Symposium on Computer Vision and Artificial Intelligence (CVAI 2026)
Ei/Scopus-IPCML 2025   2025 International Conference on Image Processing, Communications and Machine Learning (IPCML 2025)
IEEE-ACAI 2025   2025 IEEE 8th International Conference on Algorithms, Computing and Artificial Intelligence (ACAI 2025)
IEEE-AIEA 2025   2025 6th International Conference on Artificial Intelligence and Electromechanical Automation-IEEE Xplore/EI/Scopus
EMNLP 2025   Empirical Methods in Natural Language Processing
IEEE-Ei/Scopus-PRDM 2025   2025 6th International Conference on Pattern Recognition and Data Mining (PRDM 2025)
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)