| |||||||||||||||
ATIS 2017 : The 2017 International Conference on Applications and Technologies in Information Security | |||||||||||||||
Link: http://atis.massey.ac.nz | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
The 2017 International Conference on Applications and Technologies in Information Security (ATIS), will be the eighth event in the ATIS series, which started in 2010.
As academic research in information security has developed over the last twenty or so years, applications and techniques are being developed to be of specific use in this area. These include wavelets and their applications in digital forensics, classification algorithms for use in malicious software detection, and genetic algorithms custom-made for the cryptographic community, etc. ATIS 2017 focuses on all aspects on techniques and applications in information security. Papers are invited in the areas below, but do not exclude research in the general areas of the topic headings. Topics of interest include (but not limited to): ? Attacks against Implementations - Digital Forensics - Key Recovery - Hacking - Reverse Engineering ? Data Privacy - Privacy Protection - Smart device information leaks - Trusted and Trustworthy Computing - Privacy Preservation in Data Release ? Evaluation, standards and protocols - Domain name server security - Transport Layer Security - Risk Evaluation and Security Certification - Security Management ? Security Implementations - Access Control - Authentication and Authorization - Data and System Integrity - Database Security - Distributed Systems Security - Information Hiding and Watermarking Intellectual Property Protection - Operating System Security - Intellectual Property Protection - Key Management ? Tools and Methodologies - Evaluation of Security - Evaluation of Security Tools - Development of Security Tools ? Various Applications - Electronic Commerce Security - Cloud Security - Software Defined Networking - Digital Forensics - Internet of Things - Smartphone Security - Language-based Security - Sustainable Practice - Numerical Modelling ? Vulnerabilities - Digital Forensics - Intrusion Detection - Malicious software Paper Submissions and Important Dates The submitted paper should adhere to the double-blind review policy. All papers will be double-blind reviewed by the Program Committee on the basis of technical quality, relevance to ATIS, originality, significance, and clarity. All paper submissions will be handled electronically. Papers that do not comply with the Submission Guidelines will be rejected without review. Submission is via Easychair at: https://easychair.org/conferences/?conf=atis2017 Accepted papers will appear in the proceedings to be published by Springer CCIS Series (pending.) Important dates ? Paper submission: April 2, 2017 ? Acceptance/rejection: April 24, 2017 ? Camera ready due: May 1, 2017 ? Author registration due: May 1, 2017 General Chair Gang Li, Deakin U., Australia Organising committee Lynn Batten, Deakin U., Australia Judy Chow, Deakin U., Australia Local Organising committee chair Julian Jang-Jaccard, Massey U. New Zealand Program co-chairs DongSeong Kim, U. of Canterbury, New Zealand Xuyun Zhang, U. of Auckland, New Zealand Web chair Mehmood Baryalai, Massey University Steering committee Chair: Lynn Batten, Deakin University, Australia Heejo Lee, Korea University, Seoul, Korea Jiqiang Liu, Beijing Jiaotong University, China Tsutomu Matsumoto, Yokohama National University, Japan Wenjia Niu, Institute of Information Engineering, Chinese Academy of Sciences, China Yuliang Zheng, University of Alabama at Birmingham, USA Jiqiang Liu, Beijing Jiaotong University, China Secretary: Gang Li, Deakin University, Melbourne, Australia |
|