posted by user: rafa_orozco || 8797 views || tracked by 26 users: [display]

ICCST - 2013 : 47th International Carnahan Conference on Security Technologies

FacebookTwitterLinkedInGoogle

Link: http://ingenieria.udea.edu.co/iccst2013
 
When Oct 8, 2013 - Oct 11, 2013
Where Medellín, Colombia
Abstract Registration Due Mar 25, 2013
Submission Deadline Jul 8, 2013
Notification Due Apr 30, 2013
Final Version Due Jul 8, 2013
Categories    security   pattern recognition   signal processing   biometri
 

Call For Papers

This annual conference is the world’s longest-running, international technical symposium on security technology. This conference is a forum for collaboration on all aspects of physical, cyber and electronic security research, development, systems engineering, testing, evaluation, operations and sustainment. The ICCST facilitates the exchange of ideas and sharing of information on both new and existing technology and systems. Conference participants are encouraged to consider the impact of their work on society. The ICCST provides a foundation for support to authorities and agencies responsible for security, safety and law enforcement in the use of available and future technology.

CONFERENCE TOPICS

1. Sensor and detection technology, including sensor webs and signal fusion
2. Advanced video systems, automatic monitoring, automatic threat recognition
3. Alarm monitoring, command and control systems, including human factors
4. Threat identification and modeling
5. Information security, encryption, privacy
6. Cyber security and malware protection
7. Wireless communications security including spectrum use and encryption
8. Biometrics including voice, hand, print, face and other characteristics
9. Access control and identity management
10. Barrier technology and modeling
11. Inspection
12. Less-than-lethal weapons technology
13. Counter-proliferation of weapons of mass destruction
14. Airport and transportation security
15. Emergency operations and management
16. Local, state and national interoperability
17. Network-centric systems, deployment, operations and life-cycle management and forensics technologies
18. System engineering and modeling
19. Operator training and performance
20. User experiences of operating security systems including testing
21. Vulnerability analysis and modeling
22. Impact on society of security technology
23. Security Education (*)

(*) The goal is to present experiences related to security in BEng, MSc, PhD courses.
If you have any questions, please feel free to contact the conference chair
Prof. Jesús Francisco Vargas Bonilla jfvargas@udea.edu.co
Prof. Claudia Victoria Isaza cisaza@udea.edu.co
For further information contact Juan Rafael Orozco Arroyave rafael.orozco@udea.edu.co
Thank you for your consideration.

Related Resources

FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
BMVC 2018   British Machine Vision Conference
IJIS-IoTSec 2018   Springer IJIS Special Issue on IoT Security and Privacy
IJSCMC 2018   International Journal of Soft Computing, Mathematics and Control
Cyber Security Attacks and Defenses 2018   Workshop of Cyber Security Attacks and Defenses
IJMPICT 2018   International Journal of Managing Public Sector Information and Communication Technologies
WCMC-IoT 2018   WCMC journal, Special issue on Security, Privacy, and Trust on Internet of Things
FAST 2019   17th USENIX Conference on File and Storage Technologies
IJGTT 2018   International Journal of Game Theory and Technology
SECITC 2018   11th International Conference on Security for Information Technology and Communications