Información de la conferencia
MMM-ACNS 2017: International Conference on Mathematical Methods, Models and Architectures for Computer Network Security
http://www.mmm-acns2017.pl/
Día de Entrega:
2017-02-04
Fecha de Notificación:
2017-03-25
Fecha de Conferencia:
2017-08-28
Ubicación:
Warsaw, Poland
Años:
7
Vistas: 12465   Seguidores: 1   Asistentes: 0

Solicitud de Artículos
The authors are encouraged to submit full papers describing original, previously unpublished research results, not currently under review by another conference or journal, addressing state-of-the-art research and development in the area of mathematical methods, models and architectures for computer networks security.

The total length of a paper should not exceed 12 pages formatted according to the template of Lecture Notes in Computer Science provided by Springer at: http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0.

All submitted papers will be reviewed.

The topics cover, but are not necessarily limited to the following:

    Adaptive security,
    Anti-malware techniques: detection, analysis, prevention,
    Anti-phishing, anti-spam, anti-fraud, anti-botnet techniques,
    Applied cryptography,
    Authentication, authorization and access control,
    Cloud Security,
    Computer and network forensics,
    Covert channels,
    Critical infrastructure protection,
    Cyber-physical systems,
    Cyber security of industrial control systems,
    Data and application security,
    Data mining, machine learning, and bio-inspired approaches for security,
    Deception systems and honeypots,
    Denial-of-service attacks and countermeasures,
    Digital Rights Management,
    eCommerce, eBusiness and eGovernment security,
    Embedded system security,
    Formal analysis of security properties,
    Information resilience under malicious attacks,
    Information warfare,
    Internet and web security,
    Intrusion prevention, detection, and response, 
    Language-based security,
    Network resilience,
    New ideas and paradigms for security,
    Operating system security,
    Reliability and dependability,
    Risks metrics, risk analysis and risk management,
    Security and privacy in pervasive and ubiquitous computing,
    Security event and information management,
    Security for large-scale systems and critical infrastructures,
    Security in social networks,
    Security of emerging technologies: sensor, wireless/mobile, peer-to-peer and overlay networks,
    Security of autonomous agents and multi-agent systems,
    Security modeling and simulation,
    Security policies,
    Security protocols,
    Security verification,
    Security visualization,
    Self-protecting and healing,
    Smartphone security,
    Trusted computing,
    Trust and reputation management,
    Vulnerability assessment, 
Última Actualización Por Dou Sun en 2016-10-30
Conferencias Relacionadas
CCFCOREQUALISAbreviaciónNombre CompletoEntregaNotificaciónConferencia
GCCEGlobal Conference on Consumer Electronics2021-06-072021-07-262021-10-12
ab5eScienceIEEE International Conference On E-Science2024-05-062024-07-012024-09-16
aa*a1HPCAInternational Symposium on High-Performance Computer Architecture2024-07-262024-11-052025-03-01
cFPTInternational Conference on Field-Programmable Technology2024-07-142024-10-112024-12-10
ISCTEEInternational Seminar on Information Science, Computer Technology and Electrical Engineering2017-08-11 2017-08-18
SCOMInternational Conference on Soft Computing2023-08-052023-08-102023-08-19
HPCCIHigh Performance Computing and Computational Intelligence Conference2020-09-052020-09-202020-10-23
ICIEMSInternational Conference on Information Engineering, Management and Security2018-09-30 2018-11-29
BigR&IInternational Symposium on Big Data Research and Innovation2019-03-052019-04-162019-08-26
ICPMSInternational Conference on Physics, Mathematics and Statistics2024-03-20 2024-05-23
Revistas Relacionadas
CCFNombre CompletoFactor de ImpactoEditorISSN
International Journal of Embedded and Real-Time Communication SystemsIGI Global Publishing1947-3176
Virtual Reality4.400Springer1359-4338
Journal of Object TechnologyEtH Zurich1660-1769
International Journal of Computer Applications in TechnologyInderscience0952-8091
IAENG International Journal of Computer ScienceInternational Association of Engineers1819-656X
bIEEE Transactions on VLSI Systems2.800IEEE1063-8210
Journal of Information and Organizational SciencesUniversity of Zagreb1846-3312
International Journal of E-Planning ResearchIGI Global Publishing2160-9918
IEEE Open Journal of Circuits and Systems2.600IEEE2644-1225
International Journal of Computerized DentistryQuintessenz Verlags GmbH1463-4201
Recomendaciones