posted by organizer: esc2016 || 7926 views || tracked by 14 users: [display]

AnnualSec 2016 : 15th Annual Security Conference

FacebookTwitterLinkedInGoogle

Link: http://www.security-conference.org/conferences/event/annual-security-conference/
 
When Mar 29, 2016 - Mar 31, 2016
Where Las Vegas
Submission Deadline Jan 15, 2016
Notification Due Feb 15, 2016
Final Version Due Mar 1, 2016
Categories    information security   security   cyber security   computer security
 

Call For Papers

Call for Papers

Security, assurance and privacy challenges are abound. Advances in information and communication technologies have brought many security problems to the fore. Such problems may be technical in nature or organizationally grounded. Whatever be the nature and scope of the security problems, there is a need to engage in discourses pertaining to security, assurance and privacy. To that effect we welcome participation in the Annual Security Conference.

Topic areas covered in the conference include, but are not limited to the following:

Cyber security in specific sectors (healthcare, baking, government etc)
Cyber terrorism
Digital forensics
Electronic espionage
Ethical and legal aspects of security
Intrusion detection and prevention
IT audit and control
Risky habits risky behaviors
Security and BYOD
Security breaches and data analytics
Security governance
Security in social media and online communities
Security policies
Socio-technical aspects of security
System vulnerabilities and risk exposure
Technology enabled crime
Papers submission deadline: January 15, 2016. We allocate papers for review as these are submitted. Early submission is recommended.

Notification of acceptance: All decisions are emailed by February 15, 2016

Final version of papers: March 1, 2016 (please use this Template)

Participation can be in the following categories (but not limited to):

Industry Participants: If you have an interesting story to share we welcome your participation. We can guarantee an engaging participation from the floor, where you can discuss and talk freely about what you have been thinking. We just require a title of your presentation, a few lines describing your topic area and a brief biographical note (about a 100 words). If you agree, we will video record your presentation and make it available for a wider audience. If you rather not be recorded, we understand. Requirement: Please submit via our submission system. On acceptance, you will be required to register for the conference.

Academic Participants: We encourage you to submit an abstract, a full paper, a research note, or a case study. There are two modes of submission. You can decide which one works best for you. Please format the paper as per APA: http://www.apastyle.org

a) Traditional Peer Review Submissions. In this submission mode you are simply uploading you paper into our conference submission system. The length of the paper can be anywhere between 5-10,000 words. A double blind peer review will be performed. Publishing opportunity: All submissions are considered for possible fast tracking to the European Journal of Management Studies, Journal of Information System Security, Information and Computer Security. If your paper is not fast tracked, you can still publish in an edited book.

b) Abstract/Extended Abstract Submissions. If you are simply presenting an idea to generate some discussion and enter into a discourse, you can submit an abstract (100 words) or an extended abstract (unto 1000 words).

c) Case Studies. We particularly welcome cyber security case studies that document a breach. The length of the paper can be anywhere between 5-10,000 words.

- See more at: http://www.security-conference.org/conferences/event/annual-security-conference/

Related Resources

ICISSP 2022   8th International Conference on Information Systems Security and Privacy
Spec.Issue on Social Informatics: Scopus 2021   Journal of Social and Business Informatics - Acta Informatica Pragensia
S&P 2022   IEEE Symposium on Security and Privacy (Third deadline)
IJCIS 2021   International Journal on Cryptography and Information Security
ACNS 2022   Applied Cryptography and Network Security
IJASA 2021   The International Journal of Ambient Systems and applications
USENIX 2022   USENIX Security 2022 : 31st USENIX Security Symposium (Winter Deadline)
CST 2021   8th International Conference on Foundations of Computer Science & Technology
blockchain_ml_iot 2021   Network and Electronics (MDPI) Joint Special Issue - Blockchain and Machine Learning for IoT: Security and Privacy Challenges
CyberHunt 2021   IEEE Workshop on Cyber Threat Intelligence and Hunting with AI