| News | Staff | Projects | Awards | Patents | Results | Conferences | Collaboration | ISL ISoCPS | Publications | Events | Matherials |
 | Links | Contacts |
rus | eng |

International Conferences and Workshops in Computer Security

[First] [Prev] Page 1 of 2 [Next] [Last]

129th IFIP TC-11 SEC 2014 International Conference ICT Systems Security and Privacy Protection
(Marrakech, Morocco)

This conference is the flagship event of the International Federation for Information Processing (IFIP) Technical Committee 11 on Security and Privacy Protection in Information Processing Systems (TC-11, www.ifiptc11.org). We seek submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and privacy protection in ICT Systems. Topics of interest include, but are not limited to:
  • Access control and authentication
  • Applied cryptography
  • Cloud and big data security
  • Critical Infrastructure Protection
  • Data and Applications Security
  • Digital Forensics
  • Human Aspects of Information Security and Assurance
  • Identity Management
  • Information Security Education
  • Information Security Management
  • Information Technology Mis-Use and the Law
  • Managing information security functions
  • Mobile security
  • Multilateral Security
  • Network & Distributed Systems Security
  • Pervasive Systems Security
  • Privacy protection
  • Trust Management
  • Audit and risk analysis
227th IEEE Computer Security Foundations Symposium
CSF 2014
(Vienna, Austria)

The Computer Security Foundations Symposium is an annual conference for researchers in computer security. CSF seeks papers on foundational aspects of computer security, e.g., formal security models, relationships between security properties and defenses, principled techniques and tools for design and analysis of security mechanisms, as well as their application to practice. While CSF welcomes submissions beyond the topics listed below, the main focus of CSF is foundational security: submissions that lack foundational aspects risk rejection. New results in computer security are welcome. Possible topics include, but are not limited to: access control, accountability, anonymity, authentication, critical infrastructure security, cryptography, data and system integrity, database security, decidability and complexity, distributed systems, electronic voting, executable content, formal methods and verification, game theory and decision theory, hardware-based security, humans and computer security, information flow, intrusion detection, language-based security, network security, novel insights on attacks, privacy, provenance, resource usage control, security for mobile computing, security models, security protocols, software security, socio-technical security, trust management, usable security, web security.
311th International Conference on Detection of Intrusions and Malware & Vulnerability Assessment, , July 10-11, 2014. (Submission Due 8 February 2014)
DIMVA 2014
(Royal Holloway London, Egham, UK)

The annual DIMVA conference serves as a premier forum for advancing the state of the art in intrusion detection, malware detection, and vulnerability assessment. Each year, DIMVA brings together international experts from academia, industry, and government to present and discuss novel research in these areas. DIMVA is organized by the special interest group "Security - Intrusion Detection and Response" (SIDAR) of the German Informatics Society (GI). The conference proceedings will appear as a volume in the Springer Lecture Notes in Computer Science (LNCS) series (approval pending). DIMVA encourages submissions from the following broad areas: Intrusion Detection
  • Novel approaches and domains
  • Insider detection
  • Prevention and response
  • Data leakage and exfiltration
  • Result correlation and cooperation
  • Evasion and other attacks
  • Potentials and limitations
  • Operational experiences
Malware Detection
  • Automated analyses
  • Behavioral models
  • Prevention and containment
  • Infiltration
  • Acquisition and monitoring
  • Forensics and recovery
  • Underground economy
Vulnerability Assessment
  • Vulnerability detection
  • Vulnerability prevention
  • Fuzzing techniques
  • Classification and evaluation
  • Situational awareness
4International Workshop on Cyber Crime, Held in conjunction with the IEEE CS Security & Privacy Workshops (SPW 2014) IWCC 2014
(San Jose, CA, USA)

Today's world's societies are becoming more and more dependent on open networks such as the Internet
  • where commercial activities, business transactions and government services are realized. This has led to the fast development of new cyber threats and numerous information security issues which are exploited by cyber criminals. The inability to provide trusted secure services in contemporary computer network technologies has a tremendous socio-economic impact on global enterprises as well as individuals. Moreover, the frequently occurring international frauds impose the necessity to conduct the investigation of facts spanning across multiple international borders. Such examination is often subject to different jurisdictions and legal systems. A good illustration of the above being the Internet, which has made it easier to perpetrate traditional crimes. It has acted as an alternate avenue for the criminals to conduct their activities, and launch attacks with relative anonymity. The increased complexity of the communications and the networking infrastructure is making investigation of the crimes difficult. Traces of illegal digital activities are often buried in large volumes of data, which are hard to inspect with the aim of detecting offences and collecting evidence. Nowadays, the digital crime scene functions like any other network, with dedicated administrators functioning as the first responders. This poses new challenges for law enforcement policies and forces the computer societies to utilize digital forensics to combat the increasing number of cybercrimes. Forensic professionals must be fully prepared in order to be able to provide court admissible evidence. To make these goals achievable, forensic techniques should keep pace with new technologies. The aim of this workshop is to bring together the research accomplishments provided by the researchers from academia and the industry. The other goal is to show the latest research results in the field of digital forensics and to present the development of tools and techniques which assist the investigation process of potentially illegal cyber activity. We encourage prospective authors to submit related distinguished research papers on the subject of both: theoretical approaches and practical case reviews. The workshop will be accessible to both non-experts interested in learning about this area and experts interesting in hearing about new research and approaches. Topics of interest include, but are not limited to:
    • Cyber crimes: evolution, new trends and detection
    • Cyber crime related investigations
    • Computer and network forensics
    • Digital forensics tools and applications
    • Digital forensics case studies and best practices
    • Privacy issues in digital forensics
    • Network traffic analysis, traceback and attribution
    • Incident response, investigation and evidence handling
    • Integrity of digital evidence and live investigations
    • Identification, authentication and collection of digital evidence
    • Anti-forensic techniques and methods
    • Watermarking and intellectual property theft
    • Social networking forensics
    • Steganography/steganalysis and covert/subliminal channels
    • Network anomalies detection
    • Novel applications of information hiding in networks
    • Political and business issues related to digital forensics and anti-forensic techniques
  • 51st International Workshop on Big Data Analytics for Security, Helid in conjunction with ICDCS 2014
    DASec 2014
    (Madrid, Spain)

    In the last 10 years we have witnessed a strong integration of several human activities with computers and digital networks. This has led to an interconnected economy, where interactions occur through the mediation of networked devices. The openness of this scenario was instrumental in creating new business opportunities. However, it has also paved the way to new forms of criminal activities that, while happening in the cyber domain, have strong implications in the real world. The current trend towards an Internet of Things will possibly worsen this scenario. In this context, private companies and public bodies struggle to defend their businesses against a deluge of attacks spanning from complex online frauds to malicious scanning activities of their IT infrastructures. As attacks continue to grow in complexity, classic "border-control" approaches to system security quickly prove to be ineffective, calling for an investigation into new methodologies and solutions. At the same time, ongoing research efforts on "Big Data" systems are devising new and innovative methodologies to manage and analyze large amounts of data with the aim of recognizing specific patterns and behaviors. The First International Workshop on Big Data Analytics for Security aims to bring together people from both academia and industry to present their most recent work related to trust, security and privacy issues in big data analytics, together with application of big data technologies in the field of security. The purpose is to establish if and how large-scale data analytics technologies can help in creating new security solutions for today's complex IT infrastructures.
    614th Privacy Enhancing Technologies Symposium
    PETS 2014
    (Amsterdam, Netherlands)

    The Privacy Enhancing Technologies Symposium (PETS) aims to advance the state of the art and foster a world-wide community of researchers and practitioners to discuss innovation and new perspectives. Suggested topics include but are not restricted to:
    • Behavioral targeting
    • Building and deploying privacy-enhancing systems
    • Crowdsourcing for privacy
    • Cryptographic tools for privacy
    • Data protection technologies
    • Differential privacy
    • Economics of privacy and game-theoretical approaches to privacy
    • Forensics and privacy
    • Information leakage, data correlation and generic attacks to privacy
    • Interdisciplinary research connecting privacy to economics, law, ethnography, psychology, medicine, biotechnology
    • Location and mobility privacy
    • Measuring and quantifying privacy
    • Obfuscation-based privacy
    • Policy languages and tools for privacy
    • Privacy and human rights
    • Privacy in ubiquitous computing and mobile devices
    • Privacy in cloud and big-data applications
    • Privacy in social networks and micro-blogging systems
    • Privacy-enhanced access control, authentication, and identity management
    • Profiling and data mining
    • Reliability, robustness, and abuse prevention in privacy systems
    • Surveillance
    • Systems for anonymous communications and censorship resistance
    • Traffic analysis
    • Transparency enhancing tools
    • Usability and user-centered design for PETs
    719th ACM Symposium on Access Control Models and Technologies
    SACMAT 2014
    (London, Ontario, Canada)

    Papers offering novel research contributions in all aspects of access control are solicited for submission to the 19th ACM Symposium on Access Control Models and Technologies (SACMAT 2014). We have expanded the scope to include several new topics that have relevance to access control. These include cyber-physical systems, applications, systems, hardware, cloud computing, and usability. The Program Committee for this year reflects this expanded scope.
    • Administration
    • Applications
    • Attribute-based systems
    • Authentication
    • Biometrics
    • Cryptographic approaches
    • Cyber-physical systems
    • Design methodology
    • Distributed, cloud, and mobile systems
    • Economic models and game theory
    • Enforcement
    • Hardware enhanced
    • Identity management
    • Mechanisms, systems, and tools
    • Models and extensions
    • Obligations
    • Policy engineering and analysis
    • Requirements
    • Risk
    • Safety analysis
    • Standards
    • Theoretical foundations
    • Trust management
    • Usability
    813th Annual Workshop on the Economics of Information Security
    WEIS 2014
    (Pennsylvania State University, PA, USA)

    The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary scholarship on information security and privacy, combining expertise from the fields of economics, social science, business, law, policy, and computer science. Prior workshops have explored the role of incentives between attackers and defenders of information systems, identified market failures surrounding Internet security, quantified risks of personal data disclosure, and assessed investments in cyber-defense. The 2014 workshop will build on past efforts using empirical and analytic tools not only to understand threats, but also to strengthen security and privacy through novel evaluations of available solutions. We encourage economists, computer scientists, legal scholars, business school researchers, security and privacy specialists, as well as industry experts to submit their research and participate by attending the workshop. Suggested topics include (but are not limited to) empirical and theoretical studies of:
    • Optimal investment in information security
    • Models and analysis of online crime (including botnets, phishing, and spam)
    • Risk management and cyber-insurance
    • Security standards and regulation
    • Cyber-security and privacy policy
    • Security and privacy models and metrics
    • Economics of privacy and anonymity
    • Behavioral security and privacy
    • Vulnerability discovery, disclosure, and patching
    • Cyber-defense strategy and game theory
    • Incentives for information sharing and cooperation
    9Symposium On Usable Privacy and Security. In-cooperation with USENIX
    SOUPS 2014
    (Menlo Park, CA, USA)

    The 2014 Symposium on Usable Privacy and Security (SOUPS) will bring together an interdisciplinary group of researchers and practitioners in human computer interaction, security, and privacy. The program will feature technical papers, a poster session, panels and invited talks, lightning talks and demos, and workshops and tutorials. This year SOUPS will be held at Facebook in Menlo Park, CA. We invite authors to submit original papers describing research or experience in all areas of usable privacy and security. Topics include, but are not limited to:
    • innovative security or privacy functionality and design,
    • new applications of existing models or technology,
    • field studies of security or privacy technology,
    • usability evaluations of new or existing security or privacy features,
    • security testing of new or existing usability features,
    • longitudinal studies of deployed security or privacy features,
    • the impact of organizational policy or procurement decisions, and
    • lessons learned from the deployment and use of usable privacy and security features,
    • reports of replicating previously published studies and experiments,
    • reports of failed usable security studies or experiments, with the focus on the lessons learned from such experience.
    1010th Workshop on RFID Security, Co-located with ACM WiSec 2014
    RFIDSec 2014
    (Oxford, United Kingdom)

    RFIDsec is the premier workshop devoted to security and privacy in Radio Frequency Identification (RFID) with participants throughout the world. RFIDsec brings together researchers from academia and industry for topics of importance to improving the security and privacy of RFID, NFC, contactless technologies, and the Internet of Things. RFIDsec bridges the gap between cryptographic researchers and RFID developers through invited talks and contributed presentations. Topics of interest include:
    • New applications for secure RFID, NFC and other constrained systems
    • Resource-efficient implementations of cryptography
    • Attacks on RFID systems (e.g. side-channel attacks, fault attacks, hardware tampering)
    • Data protection and privacy-enhancing techniques
    • Cryptographic protocols (e.g. authentication, key distribution, scalability issues)
    • Integration of secure RFID systems (e.g. infrastructures, middleware and security)
    • Data mining and other systemic approaches to RFID security
    • RFID hardware security (e.g. Physical Unclonable Functions (PUFs), RFID Trojans)
    • Case studies

    [First] [Prev] Page 1 of 2 [Next] [Last]

    RUSSIA, 199178, Saint-Petersburg, liniya 14-ya, 39, SPC RAS (metro station Vasileostrovskaya).
    +7-(812)-328-7181, +7-(812)-328-2642, ivkote[AT]comsec[DOT]spb[DOT]ru

    Comments? Questions? chechulin[AT]comsec[DOT]spb[DOT]ru

    Locations of visitors to this page