caml-list - the Caml user's mailing list
 help / Atom feed
Subject: [Caml-list] cfp-14th International Conference on Risks and Security of Internet and Systems (CRiSIS)
Date: Tue, 5 Feb 2019 11:50:15 +0100
Message-ID: <> (raw)

[-- Attachment #1: Type: text/plain, Size: 7033 bytes --]

Call for papers

The 14th International Conference on Risks and Security of Internet and
Systems (CRiSIS)
29-31 October 2019, Hammamet, Tunisia

The International Conference on Risks and Security of Internet and Systems
2019 will be the 14th in a series dedicated to
security issues in Internet-related applications, networks and systems.
Internet has become essential for the exchange of
information between user groups and organizations from different
backgrounds and with different needs and objectives. These
users are exposed to increasing risks regarding security and privacy, due
to the development of more and more sophisticated
online attacks, the growth of Cyber Crime, etc. Attackers nowadays do not
lack motivation and they are more and more
experienced. To make matters worse, for performing attacks have become
easily accessible. Moreover, the increasing
complexity as well as the immaturity of new technologies such as pervasive,
mobile and wireless devices and networks, raise
new security challenges.

In this context, new security mechanisms and techniques should be deployed
to achieve an assurance level acceptable for critical
domains such as energy, transportation, health, defence, banking, critical
infrastructures, embedded systems and networks,
avionics systems, etc. The CRiSIS conference offers a remarkable forum for
computer and network security actors from
industry, academia and government to meet, exchange ideas and present
recent advances on Internet-related security threats and
vulnerabilities, and on the solutions that are needed to counter them.

=== TOPICS ===
The topics addressed by CRiSIS range from the analysis of risks, attacks to
networks and system survivability, to security
models, security mechanisms and privacy enhancing technologies. The authors
are invited to submit research results as well as
practical experiment or deployment reports. Industrial papers about
applications or case studies are also welcomed in different
domains (e.g., telemedicine, banking, e-government, e-learning, e-commerce,
critical infrastructures, mobile networks,
embedded applications, etc.). The list of topics includes but is not
limited to:
- Analysis and management of risk
- Attacks and defenses
- Attack data acquisition and network monitoring
- Cryptography, biometrics, watermarking
- Dependability and fault tolerance of Internet applications
- Distributed systems security and safety
- Embedded system security and safety
- Empirical methods for security and risk evaluation
- Hardware-based security and physical security
- Intrusion detection and prevention systems
- Organizational, ethical and legal issues
- Privacy protection and anonymization
- Risk-aware access and usage control
- Security and risk assessment
- Security and risks metrics
- Security and dependability of operating systems
- Security and safety of critical infrastructures
- Security and privacy of peer-to-peer system
- Security and privacy of wireless networks
- Security models and security policies
- Security of new generation networks, security of VoIP and multimedia
- Security of e-commerce, electronic voting and database systems
- Security of social networks
- Security of industrial control systems
- Smartphone security and privacy
- Traceability, metrology and forensics
- Trust management
- Use of smart cards and personal devices for Internet applications
- Web and cloud security

Submitted papers must not substantially overlap with papers that have been
published or that are simultaneously submitted to a
journal or a conference with proceedings. Papers must be written in English
and must be submitted electronically in PDF format.

The papers that will be selected for presentation at the conference will be
included in post-proceedings published by Springer in
the Lecture Notes in Computer Science (LNCS) series (prior to publication
the papers should be revised according to the review
comments). Pre-proceedings will appear at the time of the conference.

Maximum paper length will be 16 printed pages for full
papers or 6 pages for short papers, in LNCS style ( Authors of accepted papers
must guarantee that their papers will be presented at the conference. All
paper submissions will be handled through the Easy
Chair conference management system:

- Submission deadline: June 09, 2019
- Notification to authors: July 20, 2019
- Camera-ready versions: September 22, 2019
- Conference dates: October 29-31, 2019

Nora Cuppens, IMT Atlantique, France
Ahmed Hadj Kacem, University of Sfax, Tunisia

=== PC CHAIRS ===
Frédéric Cuppens, IMT Atlantique, France
Slim Kallel, University of Sfax, Tunisia

Nora Cuppens, IMT Atlantique, France
Mohamed Mosbah, Bordeaux INP, France

Saoussen Cheikhrouhou, University of Sfax, Tunisia
Reda Yaich, IRT SystemX, France

Nesrine Khabou, University of Sfax, Tunisia
Fairouz Fakhfekh, University of Sfax, Tunisia
Riadh Ben Halima, University of Sfax, Tunisia
Ismail Bouassida, University of Sfax, Tunisia
Hatem Hadj Kacem, University of Sfax, Tunisia

=== PROGRAM COMMITTEE(to be completed) ===
Esma Aimer, University of Montreal
Luca Allodi ,University of Torento
Jocelyn Aubert, Luxembourg Institute of Science and Technology
Fabrizio Biondi, IRISA/INRIA Rennes
Anis Bkakria, IMT Atlantique
Yu Chen, State University of New York Binghamton
Nora Cuppens-Boulahia,IMT Atlantique, France
Frédéric Cuppens, IMT Atlantique, France
Imen Jemili, Faculté des Sciences, Bizerte, Tunisia
Jose M. Fernandez, Ecole Polytechnique de Montreal
Manoj Singh Gaur, IIT Jammu, India
Bogdan Groza, Politehnica University of Timisoara
Ruan He, Orange
Christos Kalloniatis, University of the Aegean
Sokratis Katsikas, Center for Cyber and Information Security, NTNU
Nizar Kheir, Thales Group
Igor Kotenko, St. Petersburg Institute for Informatics and Automation of
the Russian Academy of Sciences (SPIIRA)
Marc Lacoste, Orange
Kostas Lambrinoudakis, University of Piraeus
Jean-Louis Lanet, LHS Rennes, France
Mohamed Mosbah, LaBRI, Bordeaux INP, France
Raja Natarajan, TIFR, India
Stephen Neville, University of Victoria
Roberto Di Pietro, Bell Labs
Kai Rannenberg, Goethe University Frankfurt
Michael Rusinowitch, LORIA INRIA Nancy
Ketil Stoelen, SINTEF
Nadia Tawbi, Université de Laval
Akka Zemmari, LaBRI - Université de Bordeaux
Lingyu Wang, Concordia University

Caml-list mailing list.  Subscription management and archives:
Bug reports:

[-- Attachment #2: Type: text/html, Size: 8458 bytes --]

                 reply index

Thread overview: [no followups] expand[flat|nested]  mbox.gz  Atom feed

Reply instructions:

You may reply publically to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \ \ \ \ \

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link

caml-list - the Caml user's mailing list

Archives are clonable: git clone --mirror

AGPL code for this site: git clone public-inbox