Conference Information
NordSec 2016: Nordic Conference on Secure IT Systems
http://nordsec.oulu.fi/Submission Date: |
2016-06-23 |
Notification Date: |
2016-08-15 |
Conference Date: |
2016-11-02 |
Location: |
Oulu, Finland |
Years: |
21 |
CORE: c Viewed: 12093 Tracked: 0 Attend: 0
Call For Papers
The 21st Nordic Conference on Secure IT Systems[1] will be held in Oulu, Finland, November 2-4, 2016. NordSec[2] addresses a broad range of topics within IT security with the aim of bringing together computer security researchers and encouraging interaction between academia and industry. NordSec 2016 is co- located with the 10th International Crisis Management Workshop (CriM'16)[5] and Oulu Winter School. ## Scope NordSec 2016 (http://nordsec.oulu.fi/) welcomes contributions within, but not limited to, the following areas: * Access control and security models * Applied cryptography * Cloud security * Commercial security policies and enforcement * Cyber crime, warfare, and forensics * Economic, legal, and social aspects of security * Enterprise security * Hardware and smart card security * Mobile and embedded security * Internet of Things and M2M security * Internet, communication, and network security * Intrusion detection * Language-based techniques for security * New ideas and paradigms in security * Operating system security * Privacy and anonymity * Security education and training * Security evaluation and measurement * Security management and audit * Security protocols * Security usability * Social engineering and phishing * Software security and malware * Trust and identity management * Trusted computing * Vulnerability testing ## Submitting All submitted papers will be judged based on their quality and relevance through double-blind reviewing, where the identities of the authors are withheld from the reviewers. As an author, you are required to make a good- faith effort to preserve the anonymity of your submission, while at the same time allowing the reader to fully grasp the context of related past work, including your own. Minimally, please take the following steps when preparing your submission: * Remove the names and affiliations of authors from the title page. * Remove acknowledgment of identifying names and funding sources. * Use care in referring to related work, particularly your own. Do not omit references to provide anonymity, as this leaves the reviewer unable to grasp the context. Instead, reference your past work in the third person, just as you would any other piece of related work by another author. * Submit the paper at https://easychair.org/conferences/?conf=nordsec2016
Last updated by Xin Yao in 2016-06-17
Related Conferences
Related Journals
CCF | Full Name | Impact Factor | Publisher | ISSN |
---|---|---|---|---|
Journal of Trust Management | Springer | 2196-064X | ||
Information Polity | 1.300 | IOS Press | 1570-1255 | |
Journal of Logic, Language and Information | 0.700 | Springer | 0925-8531 | |
International Journal on Digital Libraries | 1.600 | Springer | 1432-5012 | |
IEEE Computational Intelligence Magazine | 10.30 | IEEE | 1556-603X | |
Applied Mathematics and Computation | 3.500 | Elsevier | 0096-3003 | |
a | ACM Transactions on Programming Languages and Systems | 1.500 | ACM | 0164-0925 |
Cybernetics and Physics | IPME RAS | 2223-7038 | ||
IEEE Communications Letters | 3.700 | IEEE | 1089-7798 | |
Journal of Visual Languages and Computing | Elsevier | 1045-926X |
Full Name | Impact Factor | Publisher |
---|---|---|
Journal of Trust Management | Springer | |
Information Polity | 1.300 | IOS Press |
Journal of Logic, Language and Information | 0.700 | Springer |
International Journal on Digital Libraries | 1.600 | Springer |
IEEE Computational Intelligence Magazine | 10.30 | IEEE |
Applied Mathematics and Computation | 3.500 | Elsevier |
ACM Transactions on Programming Languages and Systems | 1.500 | ACM |
Cybernetics and Physics | IPME RAS | |
IEEE Communications Letters | 3.700 | IEEE |
Journal of Visual Languages and Computing | Elsevier |
Recommendation