posted by user: wasielewska || 3817 views || tracked by 8 users: [display]

EAIS 2014 : Emerging Aspects in Information Security

FacebookTwitterLinkedInGoogle

Link: http://fedcsis.org/eais
 
When Sep 7, 2014 - Sep 10, 2014
Where Warsaw, Poland
Submission Deadline Apr 23, 2014
Notification Due May 19, 2014
Final Version Due Jun 17, 2014
Categories    computer science   information security
 

Call For Papers

FINAL CALL FOR PAPERS
=======================================

Emerging Aspects in Information Security (EAIS'14)

Warsaw, Poland, September 7-10, 2014

WWW: http://fedcsis.org/eais
E-mail: eais2014@fedcsis.org

We would like to cordially invite you to consider contributing a paper to EAIS 2014 - held as a part of the Federated Conference on Computer Science and Information Systems (FedCSIS 2014).

FedCSIS is an annual international multi-conference organized by the Polish Information Processing Society (PTI) in technical cooperation with the IEEE Region 8, IEEE Computer Society, IEEE Poland Section Computer Society Chapter, IEEE Poland (Gdansk) Section Computer Society Chapter, ACM Special Interest Group on Applied Computing, ACM Lodz Chapter, International Federation for Information Processing, European Alliance for Innovation, Informatics Europe, IEEE-CIS Poland Section Chapter, Asociación de Técnicos de Informática, Committee of Computer Science of the Polish Academy of Sciences, Polish Society for Business Informatics, Polish Chamber of Information Technology and Telecommunications, Polish Chamber of Commerce for High Technology and Eastern Cluster ICT Poland, Mazovia Cluster ICT.

The Emerging Aspects in Information Security (EAIS 2014) workshop focuses on the diversity of the information security developments and deployments in order to highlight the most recent challenges and report the most recent researches. The workshop is an umbrella for all information security technical aspects. In addition, it goes beyond the technicalities and covers some emerging topics like social and organizational security research directions. EAIS 2014 is intended to attract researchers and practitioners from academia and industry, and provides an international discussion forum in order to share their experiences and their ideas concerning emerging aspects in information security met in different application domains. This opens doors for highlighting unknown research directions and tackling modern research challenges. The objectives of the EAIS 2014 workshop can be summarized as follows:
- To review and conclude researches in information security and other security domains, focused on the protection of different kinds of assets and processes, and to identify approaches that may be useful in the application domains of information security
- To find synergy between different approaches, allowing to elaborate integrated security solutions, e.g. integrate different risk-based management systems
- To exchange security-related knowledge and experience between experts to improve existing methods and tools and adopt them to new application areas
- To present latest security challenges, especially with respect to EC Horizon 2020

TOPICS
=======================================

Topics of interest include but are not limited to:
- Biometric technologies
- Human factor in security
- Cryptography and cryptanalysis
- Critical infrastructure protection
- Hardware-oriented information security
- Social theories in information security
- Organization-related information security
- Pedagogical approaches for information security
- Individual identification and privacy protection
- Information security and business continuity management
- Decision support systems for information security
- Digital right management and data protection
- Cyber and physical security infrastructures
- Risk assessment and risk management in different application domains
- Tools supporting security management and development
- Emerging technologies and applications
- Digital forensics and crime science
- Misuse and intrusion detection
- Security knowledge management
- Data hide and watermarking
- Cloud and big data security
- Computer network security
- Security and safety
- Assurance methods
- Security statistics

PAPER SUBMISSION AND PUBLICATION
=======================================

Papers should be submitted by April 23, 2014 (strict deadline). Preprints will be published on a USB memory stick provided to the FedCSIS participants. Only papers presented during the conference will be submitted to the IEEE for inclusion in the Xplore Digital Library. Furthermore, proceedings, published in a volume with ISBN and ISSN numbers will posted at the conference WWW site. Moreover, most Events' organizers arrange quality journals, edited volumes, etc. and may invite selected extended and revised papers for post-conference publications (information can be found at the websites of individual events).

IMPORTANT DATES
=======================================

- Paper submission: April 23, 2014 (strict deadline)
- Position paper submission: May 12, 2014
- Acceptance decision: May 19, 2014
- Final version of paper submission: June 17, 2014
- Final deadline for discounted fee: July 31, 2014
- Conference dates: September 7-10, 2014

EVENT CHAIRS
=======================================

- Awad, Ali Ismail, Luleå University of Technology, Sweden
- Bialas, Andrzej, Institute of Innovative Technologies EMAG, Poland

PROGRAM COMMITTEE (confirmed so far)
=======================================

- Banerjee, Soumya, Birla Institute of Technology
- Bun, Rostyslav, Lviv Polytechnic National University
- Clarke, Nathan, Plymouth University
- Cyra, ?ukasz, European Commission - Joint Research Centre Institute for the Protection & Security of the Citizen
- Fernandez, Eduardo B., Florida Atlantic University, United States
- Furnell, Steven, Plymouth University, United Kingdom
- Furtak, Janusz, Military University of Technology, Poland
- Geiger, Gebhard, Technical University of Munich, Faculty of Economics
- Hämmerli, Bernhard M., Hochschule für Technik+Architektur (HTA)
- Harnesk, Dan, Luleå University of Technology
- Hasssaballah, M., South Valley University, Egypt
- Kalbarczyk, Zbigniew, University of Illinois at Urbana-Champaign
- Kapczynski, Adrian, Silesian University of Technology, Poland
- Klamka, Jerzy, Polish Academy of Sciences
- Kosmowski, Kazimierz, Gdansk University of Technology
- Mahmoud Mohamed, Ehab, Osaka University, Japan
- Päivärinta, Tero, Luleå University of Technology
- Pa?kowska, Ma?gorzata, University of Economics in Katowice, Poland
- Rot, Artur, Wroclaw University of Economics, Poland
- Soria-Rodriguez, Pedro, Atos Research & Innovation
- Stok?osa, Janusz, Pozna? University of Technology
- Suski, Zbigniew, Military University of Technology
- Szmit, Maciej, Orange Labs Poland, Poland
- Thapa, Devinder, Luleå University of Technology
- Yen, Neil, The University of Aizu
- Zamojski, Wojciech, Wroc?aw University of Technology
- Zieli?ski, Zbigniew, Military University of Technology

Related Resources

InCIT 2024   The 8th International Conference on Information Technology
ACM-Ei/Scopus-CCISS 2024   2024 International Conference on Computing, Information Science and System (CCISS 2024)
LAJC 2024   Latin-American Journal of Computing
GreeNet Symposium - SGNC 2024   15th Symposium on Green Networking and Computing (SGNC 2024)
ACM ICCNS 2024   ACM--2024 14th International Conference on Communication and Network Security (ICCNS 2024)
IEEE ICA 2022   The 6th IEEE International Conference on Agents
ACM ICNCC 2024   ACM--2024 The 13th International Conference on Networks, Communication and Computing (ICNCC 2024)
SPIE-Ei/Scopus-CVCM 2024   2024 5th International Conference on Computer Vision, Communications and Multimedia (CVCM 2024) -EI Compendex
BDPC 2025   2025 3rd International Conference on Big Data and Privacy Computing (BDPC 2025)
SPIE-Ei/Scopus-ITNLP 2024   2024 4th International Conference on Information Technology and Natural Language Processing (ITNLP 2024) -EI Compendex