allconferencecfpalerts
   

Event       Publishers
  • Home
  • Login
  • Categories
  • Archive
  • Post Cfp
  • Academic Resources
  • Contact Us

 

7th International Conference on Mathematical Methods, Models and Architectures for Computer Networks Security

google+
Views: 754                 

When :  2017-08-28

Where :  Warsaw, Poland

Submission Deadline :  2017-03-18

Categories :   Mathematics and statistics ,  Data Mining      

7th International Conference on Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS 2017)
28-30 August 2017, Warsaw, Poland

Call for Papers:

The main goals of MMM-ACNS-2017 are:
- To bring together leading researchers from academia and governmental organizations as well as practitioners in the area of computer networks and
information security with a focus on novel theoretical aspects of computer network security,
- To facilitate personal interactions and discussions on various aspects of information technologies in conjunction with computer network and information security problems arising in large-scale computer networks.

Former editions of MMM-ACNS were organized by St. Petersburg Institute for Informatics and Automation and Binghamton University in 2001, 2003, 2005, 2007, 2010, and 2012. They demonstrated the high interest of the scientific community to the theoretical and practical aspects of the computer network and information security.

Topics of Interest:

- Adaptive security,
- Anti-malware techniques: detection, analysis, prevention,
- Anti-phishing, anti-spam, anti-fraud, anti-botnet techniques,
- Applied cryptography,
- Authentication, authorization and access control,
- Cloud Security,
- Computer and network forensics,
- Covert channels,
- Critical infrastructure protection,
- Cyber-physical systems,
- Cyber security of industrial control systems,
- Data and application security,
- Data mining, machine learning, and bio-inspired approaches for security,
- Deception systems and honeypots,
- Denial-of-service attacks and countermeasures,
- Digital Rights Management,
- eCommerce, eBusiness and eGovernment security,
- Embedded system security,
- Formal analysis of security properties,
- Information resilience under malicious attacks,
- Information warfare,
- Internet and web security,
- Intrusion prevention, detection, and response,
- Language-based security,
- Network resilience,
- New ideas and paradigms for security,
- Operating system security,
- Reliability and dependability,
- Risks metrics, risk analysis and risk management,
- Security and privacy in pervasive and ubiquitous computing,
- Security event and information management,
- Security for large-scale systems and critical infrastructures,
- Security in social networks,
- Security of emerging technologies: sensor, wireless/mobile, peer-to-peer
and overlay networks,
- Security of autonomous agents and multi-agent systems,
- Security modeling and simulation,
- Security policies,
- Security protocols,
- Security verification,
- Security visualization,
- Self-protecting and healing,
- Smartphone security,
- Trusted computing,
- Trust and reputation management,
- Vulnerability assessment.

Important Dates:

  • - Paper submission deadline: March 18, 2017
  • - Notification deadline: April 15, 2017
  • - Camera-ready: April 30, 2017

User Name : shaun
Posted 14-03-2017 on 22:01:04 AEDT


Related CFPs

ECTIJ   Economics, Commerce and Trade Management: An International Journal
IJDKP   International Journal of Data Mining & Knowledge Management Process
IJDKP   International Journal of Data Mining & Knowledge Management Process
IJCCMS   International Journal of Chaos, Control, Modelling and Simulation

All Rights Reserved @ Call for Papers - Conference & Journals