Stream: Mirror: Isabelle Users Mailing List

Topic: [isabelle] CFP: Publisher: Springer Nature; Security, Cyb...


view this post on Zulip Email Gateway (Feb 24 2022 at 17:10):

From: <>
CALL FOR PAPERS
Publisher: SPRINGER NATURE
July 25-28, 2022, Luxor (MGM), Las Vegas, USA

SAM'22: 21st International Conference on Security & Management
http://sam.udmercy.edu/sam22

ICWN'22: 21st International Conference on Wireless Networks
https://american-cse.org/csce2022/conferences-ICWN

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

SAM'22 SCOPE: TOPICS OF INTEREST INCLUDE, BUT NOT LIMITED TO:

- CYBER WARFARE TECHNOLOGIES AND STRATEGIES:
Cyber Defense Technologies and Strategies; Autonomous Security;
Novel Biometric Methods; Forensic Technologies; Trapping Technologies;
Data Protection Methods; Security and Reverse Engineering;
Vulnerability Analysis; Identity Management; Security Policies;
Identification and Prevention of Online Scams; Security Risk Analysis,
Management and Trade-offs; Incident Response Methods; Lifecycle
Security Management and Identification of the Weakest Links;
Methodologies in Reducing National Vulnerability to Cyber Attacks;
Prevention of Fake and Fabricated News; Media Trust Management;
Cyber Warfare and Attack Prevention during Elections; Secure Voting
Systems; Securing Electric Power Grids + Smart Grids; Cyber
Counter-intelligence; Tools in Cyber Warfare and Cyber Defense
Arsenal; Cyber Weapons; Threats from Social Media; Crime and Terrorism;
Global Security; Data Analytics and Cyber Warfare; ...

- NETWORK SECURITY - SECURITY ALGORITHMS:
Mobile Network Security; Security in CDN (Contents Distribution
Networks); Virtual Private Network (VPN); Tracing Techniques in
Internet; Security in Grid; Control Systems / SCADA Security;
Network Security Engineering; Transport-Level Security;
IP Security; Electronic Mail security, ...

- CRYPTOGRAPHIC TECHNOLOGIES - SECURITY PROTOCOLS:
Key Management Techniques; Cryptographic Technologies;
Applications of Block and Stream Ciphers; Applications of Public
Key Cryptology; Message Authentication; Anonymity; Digital
Signature Schemes; Secret Sharing; Cryptanalysis, ...

- SECURITY MANAGEMENT - SURVEILLANCE TECHNOLOGIES:
Security Policies; Security for Protocol Management; Location
Management; Channel Management; Mobility Management; Digital
Contents Copyright Protection; System Security Management;
Network Security Management; Storage Area Networks (SAN)
Management; Information Security Management; Government Security
Policy; Web Penetration Testing; Vulnerabilities Management;
Change & Patch Management, ...

- SECURITY APPLICATIONS - SECURITY IN E-COMMERCE & M-COMMERCE:
Secure OS; Watermarking; High-Tech Systems at Airports;
Emerging Technologies & Applications; Cloud Computing Security;
Database Security; Cyber Security Automation, ...

- BIOMETRICS & FORENSICS - NOVEL BIOMETRIC METHODS:
Forensics; Biological Security Technologies; Face Recognition
Systems; Signature Recognition Systems; Cyber Forensics;
Biometric Technologies for Security; Feature Extraction, ...

- HARDWARE SECURITY - EMBEDDED SYSTEMS SECURITY:
Cryptographic Processors & Co-Processors; Security
Architectures; True & Pseudo-random Number Generators;
Side Channel Attacks; Fault Attacks; Hardware Tamper Resistance;
Smart Card Processors; Secure Storage Devices, ...

- COMPUTER SECURITY - FIREWALL SYSTEMS:
Hacking Techniques & Related Issues; Intrusion Detection
System (IDS); Honeypot; Virus Issues (Detection, Prevention, ...);
Trusted Computing; Alert Correlation; Attack Graphs; Incident
Responding; Malware Analysis, ...

- SECURITY EDUCATION - COMPUTER SECURITY EDUCATION:
Network Security Education; Cyber Security Education;
Cyber Security Body of Knowledge; ...

ICWN'22 SCOPE: TOPICS OF INTEREST INCLUDE, BUT NOT LIMITED TO:

- SENSOR NETWORKS & AD HOC NETWORKS:
+ Wireless Information Networks: Power Management, Remote
Sensing and Telemetry, WiFi, ZigBee, WiMax, Bluetooth,
Wireless Network Protocols, ...

+ Data Manipulation: Noise Reduction, Data Quality and
Integrity, Sensor Data Fusion, Aggregation, Classification
and Tracking, ...

+ Sensor Networks Software: Interoperability, Scheduling,
Internet of Things, Agent-based Simulation, Programming
and Middleware, ...

+ Hardware and Systems: Hardware Design, Packaging, Testing and
Reliability, Electronic Interfaces, RFID Readers and Tags, ...

+ Signal Processing: Distributed and Collaborative Signal
Processing, Multimedia Signal Processing, Fault Detection,
Sparse Signal Processing, Statistical Signal Processing, ...

+ Sensor Networks and Challenges: Infrastructure Reliability,
Energy Efficiency, Self-healing, Data Overload, Security and
Vulnerability, Authentication, ...

+ Sensor Network Applications: Healthcare, Medical Imaging,
Environment Monitoring, Industrial and Structural Monitoring,
Smart Grids and Energy Control Systems, Smart Buildings and
Smart Cities, Home Monitoring and Assisted Living Applications,
Wireless Surveillance, ...

+ Ad Hoc Networks: Vehicular Networks, Underwater Networks,
Underground Networks, Network Scalability and Capacity, Service
Discovery, Middleware for Ad Hoc Networks, Body Area Networks,
Personal Area Networks, Protocol Design, MAC and Transport
Protocols, Network Control and Management, ...

- WIRELESS COMMUNICATION AND MOBILE COMPUTING:
Power Management and Control, Low-Power Protocols; Wireless
Applications, Mobile e-Commerce, Multimedia; Satellite-based
Systems; Broadcast Networks; High Altitude Platforms; GPS;
Mobile Agents; Routing, Multicasting, ...; Resource Management,
Wireless QoS; Mobile Internet; Personal Area Networks, Body
Wireless Networks, Wireless Sensor and Actuator Networks;
Node Placement and Topology Control Issues; Coding and
Modulation; Radio Access Networks; Software-defined Radio,
Wireless Multimedia, QoS Adaptation; Disruption Tolerant
Networks & Applications; Autonomous Mobile Sensor Networks, ...

- PERVASIVE SYSTEMS AND COMPUTING:
Location-dependent/personalized Application; Hardware Support
Pervasive Computing and Communication; Software Infrastructures
for Pervasive System; Low Power, Energy-Aware Pervasive
Computing; Service Discovery Mechanisms and Protocols; Middleware
Services and Agent Technologies; Intelligent Devices and
Environments; User Interfaces and Interaction Models; Wearable
Computers and Technologies; Resource Management in Pervasive
Platforms; Embodied Agents; Interactive Workspace; Ubiquitous
Computing; Biometric Methods for Pervasive Computing; ...

ALL ACCEPTED PAPERS WILL BE PUBLISHED BY

Publisher: Springer Nature - Book Series:
Transactions on Computational Science & Computational
Intelligence
https://www.springer.com/series/11769 (ISSN: 2569-7072)

Indexation: Subject to Springer science indexation which includes:
online Springer Link (link.springer.com/), Scopus
(www.info.scopus.com), SCI Compendex, EI Compendex
(www.ei.org), EMBASE, Web of Science, Inspec, ACM digital
library, Google Scholar, EBSCO, and others.

INTRODUCTION:

In order to leverage the synergies between various CS & CE fields, the
program committees of a number of premier conferences have their
2022 events held at one venue (same location and dates). Thus,
this year, The Congress is composed of a number of tracks (joint-
conferences, sessions, workshops, poster and panel discussions);
all will be held simultaneously, same location and dates:
July 25-28, 2022. For the complete list of joint conferences, refer to:
https://american-cse.org/csce2022/conferences

This year's Congress will be a hybrid event that combines a "live"
in-person event with a "virtual" online component. We anticipate that
most speakers will physically be attending (ie, most talks are expected
to be face-to-face).

We anticipate having between 1,000 and 2,000 participants in the
Congress. The congress includes 20 major tracks, composed of: 122
technical, research, and panel sessions as well as a number of
keynote lectures. Last year, the Congress had attracted speakers,
authors and participants affiliated with over 158 different
universities (including many from the top 50 ranked institutions),
major IT corporations (including: Microsoft, Google, Apple, SAP,
Facebook, Oracle, Amazon, Yahoo, Samsung, IBM, Ebay, GE, Siemens,
Philips, Ericsson, BAE Systems, Hitachi, NTT, Twitter, Uber
Technologies, ...), major corporations (including: Exxon Mobil,
Johnson & Johnson, JPMorgan Chase, PetroChina, GlaxoSmithKline, HSBC,
Airbus, Boeing, Hyundai, Goldman Sachs, Deutsche Bank, ...), government
research agencies (NSF, NIH, DoE, US Air Force, NSA National Security
Agency, Central Intelligence Agency, ...), US national laboratories
(including, NASA National Aeronautics and Space Administration, ANL
Argonne National Lab, Sandia National Lab, ORNL Oak Ridge National Lab,
Lawrence Berkeley National Lab, Lawrence Livermore National Lab,
Los Alamos National Lab, Pacific Northwest National Lab, ...), and a
number of Venture Capitalists as well as distinguished speakers
discussing Intellectual Property issues. Last year, 54% of attendees
were from academia, 25% from industry; 20% from government and funding
agencies; and 1% unknown. About half of the attendees were from
outside USA; from 69 nations.

See the web links below for a small subset of publications based on
papers a
[message truncated]


Last updated: Jul 15 2022 at 23:21 UTC