CRiSIS: Conference on Risks and Security of Internet and Systems

FacebookTwitterLinkedInGoogle

 

Past:   Proceedings on DBLP

Future:  Post a CFP for 2018 or later   |   Invite the Organizers Email

 
 

All CFPs on WikiCFP

Event When Where Deadline
CRiSIS 2017 12th International Conference on Risks and Security of Internet and Systems
Sep 19, 2017 - Sep 21, 2017 Dinard, France Jun 23, 2017
CRISIS 2016 11th International Conference on Risks and Security of Internet and Systems
Sep 5, 2016 - Sep 7, 2016 Roscoff, France TBD
CRiSIS 2015 10th International Conference on Risks and Security of Internet and Systems
Jul 20, 2015 - Jul 22, 2015 Mytilene, Lesvos Island, Greece Jun 5, 2015
CRiSIS 2014 Conference on Risks and Security of Internet and Systems
Aug 27, 2014 - Aug 29, 2014 Trento, Italy Jun 12, 2014
CRiSIS 2013 8th International Conference on Risks and Security of Internet and Systems
Oct 23, 2013 - Oct 25, 2013 La Rochelle, France Jun 3, 2013
CRiSIS 2012 Seventh International Conference on Risks and Security of Internet and Systems
Oct 10, 2012 - Oct 12, 2012 Cork, Ireland Jun 18, 2012
CRiSIS 2011 The Sixth International Conference on Risks and Security of Internet and Systems
Sep 26, 2011 - Sep 28, 2011 Timisoara, Romania May 10, 2011
CRISIS 2010 5th International Conference on Risks ans Security of Internet and Systems
Oct 10, 2010 - Oct 13, 2010 Montréal Québec, Canada Apr 26, 2010
CRiSIS 2009 International Conference on Risks and Security of Internet and Systems
Oct 19, 2009 - Oct 22, 2009 Toulouse, France May 25, 2009
 
 

Present CFP : 2017

————— CALL FOR PAPERS — CRiSIS 2017—————

12th International Conference on Risks and Security of Internet and Systems : CRiSIS 2017
September 19-21,
Dinard, Brittany, France


The International Conference on Risks and Security of Internet and Systems 2017 will be the 12th in a series dedicated to security issues in Internet-related applications, networks and systems. Internet has become essential for the exchange of information between user groups and organizations from different backgrounds and with different needs and objectives. These users are exposed to increasing risks regarding security and privacy, due to the development of more and more sophisticated online attacks, the growth of Cyber Crime, etc. Attackers nowadays do not lack motivation and they are more and more experienced. To make matters worse, for performing attacks have become easily accessible. Moreover, the increasing complexity as well as the immaturity of new technologies such as pervasive, mobile and wireless devices and networks, raise new security challenges.

In this context, new security mechanisms and techniques should be deployed to achieve an assurance level acceptable for critical domains such as energy, transportation, health, defense, banking, critical infrastructures, embedded systems and networks, avionics systems, etc. The CRiSIS conference offers a remarkable forum for computer and network security actors from industry, academia and government to meet, exchange ideas and present recent advances on Internet-related security threats and vulnerabilities, and on the solutions that are needed to counter them.


TOPICS :
The topics addressed by CRiSIS range from the analysis of risks, attacks to networks and system survivability, to security models, security mechanisms and privacy enhancing technologies. The authors are invited to submit research results as well as practical experiment or deployment reports. Industrial papers about applications or case studies are also welcomed in different domains (e.g., telemedicine, banking, e-government, e-learning, e-commerce, critical infrastructures, mobile networks, embedded applications, etc.). The list of topics includes but is not limited to:
Analysis and management of risk
Attacks and defenses
Attack data acquisition and network monitoring
Cryptography, biometrics, watermarking
Dependability and fault tolerance of Internet applications
Distributed systems security
Embedded system security
Empirical methods for security and risk evaluation
Hardware-based security and physical security
Intrusion detection and prevention systems
Organizational, ethical and legal issues
Privacy protection and anonymization
Risk-aware access and usage control
Security and risk assessment
Security and risks metrics
Security and dependability of operating systems
Security and safety of critical infrastructures
Security and privacy of peer-to-peer system
Security and privacy of wireless networks
Security models and security policies
Security of new generation networks, security of VoIP and multimedia
Security of e-commerce, electronic voting and database systems
Security of social networks
Security of industrial control systems
Smartphone security and privacy
Traceability, metrology and forensics
Trust management
Use of smart cards and personal devices for Internet applications
Web and cloud security
SUBMISSION GUIDELINES:

Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be written in English and must
be submitted electronically in PDF format.

The papers that will be selected for presentation at the conference will be included in post-proceedings published by Springer in the Lecture Notes in Computer Science (LNCS) series (prior to publication the papers
should be revised according to the review comments). Pre-proceedings will appear at the time of the conference.

Maximum paper length will be 16 printed pages for full papers or 6 pages for short papers, in LNCS style (http://www.springer.de/comp/lncs/authors.html). Authors of accepted
papers must guarantee that their papers will be presented at the conference. All paper submissions will be handled through the Easy Chair conference management system: https://easychair.org/conferences/?conf=crisis2017

PUBLICATION:

Proceedings are planned to be published by Springer in the Lecture Notes in Computer Science (LNCS) series in conjunction with the DPM and QASA workshops. The submitted paper (in PDF format) should follow the template indicated by Springer (see http://www.springer.de/comp/lncs/authors.html).


CALL for Tutorials:

We solicit tutorials on state-of-the-art technologies relevant to the conference themes. We are particularly interested in tutorials that foster knowledge exchange among the different research communities present at the conference.
The intended length of each tutorial is 2 to 3 hours.

A tutorial proposal should include a brief summary and outline, specific goals and objectives, the intended audience and the expected background
of the audience as well as a biographical sketch of the presenter(s). The length of tutorial proposals should not exceed 5 pages.

Tutorial proposals should be submitted to the tutorial program chair:
Nora Cuppens-Boulahia by email :
Nora(dot)Cuppens(at)telecom-bretagne(dot)eu before June 10, 2017.


IMPORTANT DATES:

* Submission deadline: June 23rd
* Notification to authors: July 10th
* Camera-ready versions: July 15th
* Conference dates: September 19th-21nd, 2017


COMMITTEE:

* Organization Chairs:

- Nora Cuppens, IMT Atlantique, France
- Jean-Louis Lanet, LHS Rennes, France

* Program Committee chairs :

- Frédéric Cuppens, IMT Atlantique, France
- Axel Lagay, INRIA, France


* Tutorial and Publication Chair :

- Joaquin Garcia Alfaro, TELECOM SudParis, France

* Publicity Chairs:

- Ronan Lashermes, INRIA, France
- Reda Yaich, IMT Atlantique, France

* Local Organization Chair:

- Ghislaine Le Gall, IMT Atlantique, France

* Program Committee chairs (TBC):
Esma Aimer, University of Montreal
Luca Allodi ,University of Trento
Jocelyn Aubert, Luxembourg Institute of Science and Technology
Christophe Bidan, CentraleSupelec
Fabrizio Biondi, IRISA/INRIA Rennes
Anis Bkakria, IMT Atlantique
Yu Chen, State University of New York Binghamton
Jorge Cuellar, Siemens AG, CT T
Nora Cuppens-Boulahia,
Frédéric Cuppens, IMT Atlantique, France
Jose M. Fernandez, Ecole Polytechnique de Montreal
Simone FischerüH¸bner, Karlstad University
Simon Foley, University College Cork
Joaquin Garcia-Alfaro, Telecom SupParis
Bogdan Groza, Politehnica University of Timisoara
Christos Kalloniatis, University of the Aegean
Sokratis Katsikas, Center for Cyber and Information Security, NTNU
Nizar Kheir, Thales Group
Barbara Kordy, IRISA
Igor Kotenko, St. Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences (SPIIRA)
Jean-Louis Lanet, INRIA - RBA
Javier Lopez, University of Malaga
Raja Natarajan, TIFR, India
Stephen Neville, University of Victoria
Roberto Di Pietro, Bell Labs
Kei Rannenberg, Goethe University Frankfurt
Michael Rusinowitch, LORIA INRIA Nancy
Ketil Stoelen, SINTEF
Nadia Tawbi, Université de Laval
Lingyu Wang, Concordia University

CONTACTS:

For any enquiries, please send an email to : crisis2017[at]easychair.org
 

Related Resources

Smart-City-IoT-Security 2017   Special Issue on Security of IoT-enabled Infrastructures in Smart Cities
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
IJCCSA 2017   International Journal on Cloud Computing: Services and Architecture
IoTBDS 2018   3rd International Conference on Internet of Things, Big Data and Security
IJSC 2017   International Journal on Soft Computing
WorldCIS 2017   World Congress on Internet Security
IJCIS 2017   International Journal on Cryptography and Information Security
SCN-CyberIoT 2017   Special Issue on Cybersecurity in the Internet of Things - Security and Communication Networks Journal
MWAIS 2018   13th Annual Conference of the Midwest Association for Information Systems
IJCSITY 2017   International Journal of Computational Science and Information Technology