posted by user: AYCEMT || 438 views || tracked by 1 users: [display]

EMTTSS 2018 : Emergent Methods, Techniques and Tools for Systems’ Security

FacebookTwitterLinkedInGoogle

Link: http://codit2018.com/index.php/special-sessions
 
When Apr 10, 2018 - Apr 13, 2018
Where Thessaloniki, Greece
Submission Deadline Jan 7, 2018
Notification Due Feb 4, 2018
Final Version Due Feb 22, 2018
Categories    computer security   software security   network security   web applications security
 

Call For Papers

Registered and Presented papers will be submitted for inclusion into IEEE Xplore as well as other Abstracting and Indexing (A&I) databases.

Proceedings of Past Editions

Proceedings of all past editions of CoDIT are published through IEEE Xplore and indexed in:

DBLP, Conference Proceedings Citation Index | Thomson Reuters, SCOPUS, Ei Compendex and IEEE.


Session Co-Chairs :
-Dr. Jaouhar Fattahi, Université Laval, Québec, Canada.
-Prof. Mohamed Mejri, Université Laval, Québec, Canada.
-Ass. Prof. Manolo DulvaHina, ECE Paris École d'Ingénieurs, France.
-Ass. Prof. Hatem Ben Sta, University of Tunis El Manar, Tunisia.

Session description:
This special session deals with the problems related to systems' security.With the increasing complexity of computer systems and communication networks, the requirements for security have become more and more demanding. Hence, there is a grand challenge that traditional security technologies and measures may not satisfy user requirements in such open, heterogeneous, dynamic, mobile, distributed and wireless computing environments. Thus, we need to design and create systems and networks in which various applications while preserving security.
The main aimof this special session is to bring together researchers and practitioners in the world, working on systems’ security,to discuss methods and techniques for designing and building secure systems. We particularly welcome papers on formal methods for security.
The topics of interest include, but are not limited to:
• Network security
• Computer security
• Software security
• Formal Methods for security
• Cryptographic protocols
• Biometrics
• Cryptography and Cryptanalysis
• Privacy, trust, security and anonymity
• Web applications security
• Security policy, model and architecture
• Security in parallel and distributed systems
• Security in mobile and wireless communications
• Security in grid/cloud/pervasive computing
• Authentication, authorization and accounting
• Security of 5G
• Miscellaneous security issues


Related Resources

ICCSP - Ei & Scopus 2018   2018 the 2nd International Conference on Cryptography, Security and Privacy (ICCSP 2018)--Ei Compendex and Scopus
ASYNC 2018   24st IEEE International Symposium on Asynchronous Circuits and Systems
IJOE 2018   International Journal on Organic Electronics
SECRYPT 2018   15th International Conference on Security and Cryptography
TTSDP 2018   10th International Workshop on Tools and Techniques in Software Development Process
ICTMD 2018   Special Issue Call for Papers Multimedia Tools and Applications----Special Issue on “Intelligent Computational Techniques for Multimodal Data”
IJAIT 2018   International Journal of Advanced Information Technology
Cluster-BigData 2018   Call for Springer book Chapters: Clustering methods for Big Data Analytics: techniques, toolboxes and applications, Springer (USA)
PDP 2018   The 26th Euromicro International Conference on Parallel, Distributed and Network-Based Processing
ICCNP--EI, Scopus 2018   2018 International Conference on Communication and Network Protocol (ICCNP 2018)-EI Compendex, Scopus