posted by user: goel || 5606 views || tracked by 9 users: [display]

ASIA 2011 : 6th Annual Symposium on Information Assurance (held jointly with the NYS Cyber Security Conference)

FacebookTwitterLinkedInGoogle

Link: http://www.albany.edu/iasymposium/index.shtml
 
When Jun 7, 2011 - Jun 8, 2011
Where Empire State Plaza, Albany, NY
Submission Deadline Feb 15, 2011
Notification Due Mar 15, 2011
Final Version Due Mar 31, 2011
Categories    security   information security   network security   forensics
 

Call For Papers

CALL FOR PAPERS - 6th Annual Symposium on Information Assurance (ASIA '11)
14th Annual New York State Cyber Security Conference
Empire State Plaza, Albany, NY
June 7-8, 2011

WEBSITES:
http://www.albany.edu/iasymposium (ASIA - for academic peer-reviewed
presentations & proceedings)
http://www.cscic.state.ny.us/security/conferences/security/2011/2011call.cfm(Cyber Security Conference - for practitioner presentations)

IMPORTANT DATES
Paper Submission Deadline February 15, 2010
Reviewer Feedback March 15, 2011
Final Paper Submission March 31, 2011
Symposium Dates June 7-8, 2011

Authors are invited to submit original and unpublished papers to the 6th Annual Symposium on Information Assurance. Accepted papers will appear in the symposium proceedings. This symposium is jointly held with the 14th Annual New York State Cyber Security Conference. This two-day event attracts practitioners, researchers, and vendors providing opportunities for business and intellectual engagement among attendees. The symposium is organized by the University at Albany, State University of New York, the NYS Division of Homeland Security and Emergency Services Office of Cyber Security (OCS), and the NYS Forum. There is no registration fee for authors of accepted papers.

All participants in ASIA '11 will also be able to attend the rest of the NYS Cyber Security Conference sessions.

In the past, the NYS Cyber Security Conference and ASIA have had excellent keynote speakers such as Larry Ponemon from the Ponemon Institute; Billy Rios from Google; Philip Reitinger, the Deputy Under Secretary of the National Protection and Programs Directorate (NPPD), U.S. Department of Homeland Security; and Raphael Perl, Head, Action
Against Terrorism Unit, Office of Security Cooperation in Europe among others.

In addition to the keynotes, we have had wonderful presenters including top information security officials, consultants, policy developers and analysts, and researchers from a myriad of well-known institutions. This includes the Lance Spitzer of Honeytech; Johnny Starrunner from the FBI Cyber Division, Deputy Director of the Office of SAFETY Act Implementation, Science and Technology Directorate, Department of Homeland Security; the Lead for Cyber, Public Sector, Global Business Services, IBM; National Security and Emergency Preparedness Department, U.S. Chamber of Commerce; Team Cymru; M&T Bank Corporation, Principal Architect for the Microsoft Malware Protection Center (MMPC), Microsoft; Identity Force; Booz Allen Hamilton; LexisNexis; President, EMPACT America; Anti-Phishing Working Group, Greylogic, Nassau County District Attorney's Office; General Electric; NYS Attorney General's Office, NYS Department of Health; Computer Crime Unit, USPS Office of the Inspector General, National Institute of Standards and Technology, and the PCI Security Standards Council.

Suggested topics for submission of papers are listed below (but not limited to): Cyber Warfare, Information Assurance, Security Data Collection and Analysis, Linguistic Analysis for Security and Intelligence, Internet-based Terrorism and Espionage, Reverse Engineering of Viruses and Worms, Security Policy Implementation & Compliance, Botnet Detection and Prevention, Information Security Risk Management, Self-organization Based Security Models, Economics of Information Security, Biological Models of Security, Computer & Network Forensics, Network Security and Intrusion Detection, Computer Crime and Digital Forensics, Security in the Cloud / Distributed Systems, Forensic Accounting and Fraud Detection,Curriculum Development in Information Security, Digital Rights Management, Privacy & Security, Smart Grid / Critical Infrastructure Security

SUBMISSION CATEGORIES
Submissions can be made in a number of categories: Completed research papers, research-in-progress papers, case studies, and panel proposals/round table discussions. Please follow the following guidelines in preparing your submission.

* Completed Research Papers: Typically 5,000 words long (excluding abstract and references).
* Research in Progress Papers: Typically 2,500 words (excluding abstract and references).
* Case Studies: Typically between 3,000 and 5,000 words long.
* Round Table Discussion: Typically a 1,000 word synopsis of the topic area.
* Panel Proposals: Typically a 1,000 word description, identifying the panelists to be involved.


SUBMISSION GUIDELINES
1. Submitted papers must not have been previously published, or currently under consideration for publication elsewhere, or have substantial overlap with papers the author has submitted elsewhere.
2. Submissions undergo a double-blind peer review process.
3. Papers selected for presentation will be published in formal proceedings. Arrangements are also being made with journals to publish extended versions of selected papers from the symposium.
4. Papers in the topic areas discussed are preferred, although contributions outside those topics may also be of interest. Please feel free at any time to contact the symposium chair if you have questions regarding your submission.
5. Papers should be submitted via email to the chair at goel@albany.edu in IEEE format and should include the following:
a) Separate title page (in plain text) with Title, Name(s) of authors, Organizational affiliation(s), telephone and fax number(s), postal address(es), and email address(es), Author to contact for correspondence about the paper. b) Abstract (less than 250 words) c) Paper including a brief biography of each author as appropriate at the end of the paper


SYMPOSIUM CHAIR
Sanjay Goel
Director of Research, NYS Center for Information Forensics and Assurance (CIFA)
Associate Professor, School of Business University at Albany, State
University of New York
BA 310b, 1400 Washington Ave. Albany, NY 12222
PH: (518) 442-4925
Email: goel@albany.edu

SUBMISSIONS CHAIR
Damira Pon
Senior Research Analyst, NYS Center for Information Forensics and
Assurance (CIFA)
University at Albany, State University of New York
1400 Washington Ave. Albany, NY 12222
PH: (518) 442-4925
Email: damira@gmail.com

2011 TECHNICAL PROGRAM COMMITTEE
Anil B. Somayaji, Carleton University, Canada; Boleslaw Szymanski, Rensselaer Polytechnic University; George Berg, University at Albany, State University of New York; Jeffrey Carr, GreyLogic; Gurpreet Dhillon, Virginia Commonwealth University; Ronald Dodge, United States Military Academy West Point; Hemantha Herath, Brock University; Hong C. Li, Intel Corporation; Martin Loeb, University of Maryland; Alvaro Ortigosa, Autonoma Universidad de Madrid; Billy Rios, Google, Inc.; S. Ravi, University at Albany, State University of New York; Raj Sharman, University at Buffalo, State University of New York; M.P. Gupta, Indian Institute of Technology, Delhi, India; Dipankar Dasgupta, University of Memphis; Daniel O. Rice, Technology Solutions Experts, Inc.; Stephen F. Bush, GE Global Research Center; Shambhu J. Upadhyaya, University at Buffalo, State University of New York; Teju Herath, Brock University; Stelios Sidiroglou-Douskos, MIT; Shiu-Kai Chin, Syracuse University; Sumita Mishra, Rochester Institute of Technology

Related Resources

eCrime 2018   13th Symposium on Electronic Crime Research
IJCSITY 2017   International Journal of Computational Science and Information Technology
MWAIS 2018   13th Annual Conference of the Midwest Association for Information Systems
MathSJ 2017   Applied Mathematics and Sciences: An International Journal
PAKDD 2018   The 22nd Pacific-Asia Conference on Knowledge Discovery and Data Mining
ICSS 2017   3rd International Conference on Software Security
ICITA 2018   International Conference on Information Technology and Applications
AITIJ 2017   Advances in Interconnect Technologies: An International Journal
IPMU 2018   17th Information Processing and Management of Uncertainty in Knowledge-Based Systems Conference
CODASPY 2018   Conference on Data and Application Security and Privacy