posted by user: wasielewska || 4186 views || tracked by 8 users: [display]

EAIS 2014 : Emerging Aspects in Information Security

FacebookTwitterLinkedInGoogle

Link: http://fedcsis.org/eais
 
When Sep 7, 2014 - Sep 10, 2014
Where Warsaw, Poland
Submission Deadline Apr 23, 2014
Notification Due May 19, 2014
Final Version Due Jun 17, 2014
Categories    computer science   information security
 

Call For Papers

FINAL CALL FOR PAPERS
=======================================

Emerging Aspects in Information Security (EAIS'14)

Warsaw, Poland, September 7-10, 2014

WWW: http://fedcsis.org/eais
E-mail: eais2014@fedcsis.org

We would like to cordially invite you to consider contributing a paper to EAIS 2014 - held as a part of the Federated Conference on Computer Science and Information Systems (FedCSIS 2014).

FedCSIS is an annual international multi-conference organized by the Polish Information Processing Society (PTI) in technical cooperation with the IEEE Region 8, IEEE Computer Society, IEEE Poland Section Computer Society Chapter, IEEE Poland (Gdansk) Section Computer Society Chapter, ACM Special Interest Group on Applied Computing, ACM Lodz Chapter, International Federation for Information Processing, European Alliance for Innovation, Informatics Europe, IEEE-CIS Poland Section Chapter, Asociación de Técnicos de Informática, Committee of Computer Science of the Polish Academy of Sciences, Polish Society for Business Informatics, Polish Chamber of Information Technology and Telecommunications, Polish Chamber of Commerce for High Technology and Eastern Cluster ICT Poland, Mazovia Cluster ICT.

The Emerging Aspects in Information Security (EAIS 2014) workshop focuses on the diversity of the information security developments and deployments in order to highlight the most recent challenges and report the most recent researches. The workshop is an umbrella for all information security technical aspects. In addition, it goes beyond the technicalities and covers some emerging topics like social and organizational security research directions. EAIS 2014 is intended to attract researchers and practitioners from academia and industry, and provides an international discussion forum in order to share their experiences and their ideas concerning emerging aspects in information security met in different application domains. This opens doors for highlighting unknown research directions and tackling modern research challenges. The objectives of the EAIS 2014 workshop can be summarized as follows:
- To review and conclude researches in information security and other security domains, focused on the protection of different kinds of assets and processes, and to identify approaches that may be useful in the application domains of information security
- To find synergy between different approaches, allowing to elaborate integrated security solutions, e.g. integrate different risk-based management systems
- To exchange security-related knowledge and experience between experts to improve existing methods and tools and adopt them to new application areas
- To present latest security challenges, especially with respect to EC Horizon 2020

TOPICS
=======================================

Topics of interest include but are not limited to:
- Biometric technologies
- Human factor in security
- Cryptography and cryptanalysis
- Critical infrastructure protection
- Hardware-oriented information security
- Social theories in information security
- Organization-related information security
- Pedagogical approaches for information security
- Individual identification and privacy protection
- Information security and business continuity management
- Decision support systems for information security
- Digital right management and data protection
- Cyber and physical security infrastructures
- Risk assessment and risk management in different application domains
- Tools supporting security management and development
- Emerging technologies and applications
- Digital forensics and crime science
- Misuse and intrusion detection
- Security knowledge management
- Data hide and watermarking
- Cloud and big data security
- Computer network security
- Security and safety
- Assurance methods
- Security statistics

PAPER SUBMISSION AND PUBLICATION
=======================================

Papers should be submitted by April 23, 2014 (strict deadline). Preprints will be published on a USB memory stick provided to the FedCSIS participants. Only papers presented during the conference will be submitted to the IEEE for inclusion in the Xplore Digital Library. Furthermore, proceedings, published in a volume with ISBN and ISSN numbers will posted at the conference WWW site. Moreover, most Events' organizers arrange quality journals, edited volumes, etc. and may invite selected extended and revised papers for post-conference publications (information can be found at the websites of individual events).

IMPORTANT DATES
=======================================

- Paper submission: April 23, 2014 (strict deadline)
- Position paper submission: May 12, 2014
- Acceptance decision: May 19, 2014
- Final version of paper submission: June 17, 2014
- Final deadline for discounted fee: July 31, 2014
- Conference dates: September 7-10, 2014

EVENT CHAIRS
=======================================

- Awad, Ali Ismail, Luleå University of Technology, Sweden
- Bialas, Andrzej, Institute of Innovative Technologies EMAG, Poland

PROGRAM COMMITTEE (confirmed so far)
=======================================

- Banerjee, Soumya, Birla Institute of Technology
- Bun, Rostyslav, Lviv Polytechnic National University
- Clarke, Nathan, Plymouth University
- Cyra, ?ukasz, European Commission - Joint Research Centre Institute for the Protection & Security of the Citizen
- Fernandez, Eduardo B., Florida Atlantic University, United States
- Furnell, Steven, Plymouth University, United Kingdom
- Furtak, Janusz, Military University of Technology, Poland
- Geiger, Gebhard, Technical University of Munich, Faculty of Economics
- Hämmerli, Bernhard M., Hochschule für Technik+Architektur (HTA)
- Harnesk, Dan, Luleå University of Technology
- Hasssaballah, M., South Valley University, Egypt
- Kalbarczyk, Zbigniew, University of Illinois at Urbana-Champaign
- Kapczynski, Adrian, Silesian University of Technology, Poland
- Klamka, Jerzy, Polish Academy of Sciences
- Kosmowski, Kazimierz, Gdansk University of Technology
- Mahmoud Mohamed, Ehab, Osaka University, Japan
- Päivärinta, Tero, Luleå University of Technology
- Pa?kowska, Ma?gorzata, University of Economics in Katowice, Poland
- Rot, Artur, Wroclaw University of Economics, Poland
- Soria-Rodriguez, Pedro, Atos Research & Innovation
- Stok?osa, Janusz, Pozna? University of Technology
- Suski, Zbigniew, Military University of Technology
- Szmit, Maciej, Orange Labs Poland, Poland
- Thapa, Devinder, Luleå University of Technology
- Yen, Neil, The University of Aizu
- Zamojski, Wojciech, Wroc?aw University of Technology
- Zieli?ski, Zbigniew, Military University of Technology

Related Resources

SEAS 2025   14th International Conference on Software Engineering and Applications
IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
ISKE 2025   The 20th International Conference on Intelligent Systems and Knowledge Engineering (ISKE 2025)
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
IEEE-Ei/Scopus-CNIOT 2025   2025 IEEE 6th International Conference on Computing, Networks and Internet of Things (CNIOT 2025) -EI Compendex
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
ICICSP 2025   2025 8th International Conference on Information Communication and Signal Processing (ICICSP 2025)
IEEE CACML 2025   2025 4th Asia Conference on Algorithms, Computing and Machine Learning (CACML 2025)
EMERGING 2025   The Seventeenth International Conference on Emerging Networks and Systems Intelligence
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing