posted by user: jhyi00 || 3754 views || tracked by 4 users: [display]

WISA 2014 : The 15th International Workshop on Information Security Applications

FacebookTwitterLinkedInGoogle


Conference Series : Workshop on Information Security Applications
 
Link: http://wisa.or.kr/
 
When Aug 25, 2014 - Aug 27, 2014
Where Jeju Island, Korea
Submission Deadline Jun 20, 2014
Notification Due Jul 25, 2014
Final Version Due Aug 1, 2014
Categories    informatio security   applied cryptography
 

Call For Papers

The 15th International Workshop on Information Security Applications (WISA 2014) will be held on Jeju Island, Korea on August 25-27, 2014. It is hosted by the Korea Institute of Information Security and Cryptology (KIISC) and sponsored by the Ministry of Science, ICT and Future Planning (MSIP). It is also co-sponsored by the Electronics & Telecommunications Research Institute (ETRI), the Korea Internet & Security Agency (KISA), and the National Security Research Institute (NSRI). The primary focus of WISA 2014 is on systems and network security, and the secondary focus is on all other technical and practical aspects of security applications. The workshop will serve as a forum for new results from the academic research community as well as from the industry.

The areas of interest include, but are not limited to:

• Analysis of network and security protocols
• Anonymity and censorship-resistant technologies
• Applications of cryptographic techniques
• Authentication and authorization
• Automated tools for source code/binary analysis
• Botnet defense
• Critical infrastructure security
• Denial-of-service attacks and countermeasures
• Digital Forensics
• Embedded systems security
• Exploit techniques and automation
• Hardware and physical security
• HCI security and privacy
• Intrusion detection and prevention
• Malware analysis
• Mobile/wireless/cellular system security
• Network-based attacks
• Network infrastructure security
• Operating system security
• Practical cryptanalysis (hardware, DRM, etc.)
• Security policy
• Storage and file system security
• Techniques for developing secure systems
• Trustworthy computing
• Vulnerability research
• Web security


SCIE JOURNAL RECOMMENDATION OF SELECTED PAPAERS

Expanded versions of selected papers will be recommended to peer-reviewed international journals indexed in SCI or SCIE. For this, now we are discussing with the following journals (subject to change):

• International Journal of Distributed Sensor Networks (IJDSN) - Hindawi (SCIE): Confirmed!!
• Journal of Supercomputing (JoS) - Springer (SCI)
• Applied Mathematics & Information Sciences (AMIS) – Natural Science Publishing (SCIE)
• Journal of Applied Mathematics (JAM) - Hindawi (SCIE)


PAPER SUBMISSION

Authors are invited to submit their original papers to the following EDAS system for review: http://edas.info/N17961.


INSTRUCTIONS FOR AUTHORS

Authors must not substantially duplicate work that any of the authors have published elsewhere or have submitted in parallel to journals or any other conferences that have proceedings. The EDAS system automatically checks the similarity using the paper similarity detection tool.

The submission must be anonymous, with no author names, affiliations, acknowledgements, or obvious references. The paper should be prepared according to the "Authors Instruction for LNCS" (http://www.springer.de/comp/lncs/authors.html) and limited to at most 12 pages in total.

Related Resources

ITAS 2023   2023 Information Technology & Applications Symposium (ITAS 2023)
MDA AI&PR 2023   18th International Conference on Mass Data Analysis of Images and Signals with Applications in Medicine, r/g/b Biotechnology, Food Industries and Dietetics, Biometry and Security,
ICCDA--Ei 2023   2023 The 7th International Conference on Computing and Data Analysis (ICCDA 2023)
IEEE CCNC STP-CPS 2023   5th International Workshop on Security Trust Privacy for Cyber-Physical Systems (STP-CPS'23) with IEEE CCNC 2023, 8-11 January, Las Vegas, NV, USA
SI on ATD&IS II 2023   Special Issue on Advanced Technologies in Data and Information Security II, Applied Sciences, MDPI
AIAI 2023   Artificial Intelligence Applications and Innovations
ICoCTA 2023   2023 4th International Conference on Control Theory and Applications (ICoCTA 2023)
EICC 2023   European Interdisciplinary Cybersecurity Conference (EICC 2023)
MVA 2023   Machine Vision Applications
IEEE ICISPP 2023   IEEE--2023 4th International Conference on Information Security and Privacy Protection (ICISPP 2023)