The Conference focuses on all technical and practical aspects of Communications Security & Information Assurance (CSIA)for wired and wireless networks. The goal of this conference is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Communication Security & Information assurance
Access control, Anonymity, Audit and audit reduction & Authentication and authorization | Language-based security |
Applied cryptography, Cryptanalysis, Digital Signatures | Mobile and wireless security |
Biometric security | Mobile, Ad Hoc and Sensor Network Security |
Boundary control devices | Monitoring and surveillance |
Certification and accreditation | Multimedia security ,Operating system security, Peer-to-peer security |
Cross-layer design for security | Performance Evaluations of Protocols & Security Application |
Data and system integrity, Database security | Privacy and data protection |
Defensive information warfare | Product evaluation criteria and compliance |
Denial of service protection, Intrusion Detection, Anti-malware | Risk evaluation and security certification |
Distributed systems security | Risk/vulnerability assessment |
Electronic commerce | Security & Network Management |
E-mail security, Spam, Phishing, E-mail fraud, Virus, worms, Trojon Protection | Security and Assurance in Operational, Technological, commercial Area |
Grid security | Security Engineering and Its Application |
Information hiding and watermarking & Information survivability | Security Models & protocols |
Insider threat protection, Integrity | Security threats like DDoS, MiM, Session Hijacking, Replay attack etc & countermeasures |
Intellectual property protection | Trusted computing |
Internet/Intranet Security | Ubiquitous Computing Security |
Key management and key recovery | Virtualization security, VoIP security, Web 2.0 security |
Selected papers from CSIA 2014, after further revisions, will be published in the special issue of the following journals