SECURWARE 2018 - The Twelfth International Conference on Emerging Security Information, Systems and Technologies
September 16, 2018 - September 20, 2018
SECURWARE 2018
ISSN: 2162-2116
ISBN: 978-1-61208-661-3
SECURWARE 2018 is colocated with the following events as part of NetWare 2018 Congress:
- SENSORCOMM 2018, The Twelfth International Conference on Sensor Technologies and Applications
- SENSORDEVICES 2018, The Ninth International Conference on Sensor Device Technologies and Applications
- SECURWARE 2018, The Twelfth International Conference on Emerging Security Information, Systems and Technologies
- AFIN 2018, The Tenth International Conference on Advances in Future Internet
- CENICS 2018, The Eleventh International Conference on Advances in Circuits, Electronics and Micro-electronics
- ICQNM 2018, The Twelfth International Conference on Quantum, Nano/Bio, and Micro Technologies
- FASSI 2018, The Fourth International Conference on Fundamentals and Advances in Software Systems Integration
- GREEN 2018, The Third International Conference on Green Communications, Computing and Technologies
Special tracks:
CIP-NCT: Critical Infrastructure Protection – Novel Concepts and Technologies
Chairs and Coordinators:
Stefan Schauer, Scientist, PhD, Austrian Institute of Technology, Center of Digital Safety and Security, Vienna, Austria stefan.schauer@ait.ac.at
Martin Latzenhofer, Scientist, PhD Candidate, Austrian Institute of Technology, Center of Digital Safety and Security, Vienna, Austria martin.latzenhofer@ait.ac.at
SECIoT: Security and Privacy in the Internet of Things (IoT)
Chair and Coordinator: Tal Melamed, FBK, the Security & Trust Research Unit, Italy |
AppSec Labs, Security Academy, Israel tal@appsec.it
ML-SOP: Machine Learning and Semantic/Ontology-based Processing
Chair:
Prof. Dr. Hanae Sbai, Faculty of Sciences and Technology, University of Hassan II,
Casablanca, Morocco hanae.sbai@univh2c.ma
Coordinator:
Prof. Dr. My Driss Laanaoui, University of Cadi Ayaad, Morocco d.laanaoui@uca.ma
SECURWARE 2018 conference tracks:
TRENDS: Security challenges with new technologies
Security in SDN, SDX, NFV; Security in 4G/5G networks; Security and Internet of X (everything, things, people, etc.); Security for Virtualization and Cloud; Security and Big Data; Security in sensing and sensor networks; Security and energy-aware networks; Security in content-oriented networking; Security in cellular cognitive networks
SECSERV: Security-as-a-Service - Security technologies and systems-oriented security and safety
Certified services and businesses; Security certifying processes, technologies and standards; Industrial security; Security in information systems; Physical/Virtual/Cloud security; Corporate/Personal security; Security guarantee/assurance/risks; Surveillance systems; Security/Safety digital environments (electromagnetic waves, unsafe facilities, undocumented logistics, etc.); Cyber-security and public services risks (thefts, health, alarms, vehicular, surveillance, people with special needs, credit carts, use of arms, drone-based delivery, etc.); Security in supply-based systems; Security in mobile applications, Web-based, Cloud-based services, and Internet of Things (IoT)-based systems; Designing secure and green-oriented industrial systems; Security in production systems; Secure production lines and secure human-oriented products and services
SECSTATUS: Advances and Challenges
Cryptography; Encryption schemes; Cryptanalysis; Thrifty zero-knowledge approaches; Chaos-information hiding; Advances in biometric authentication; Passive forensics; Access, computation and communication security mechanisms; Secure error-tolerant protocols; Side-channel attacks; Malware and attacks prevention; Anti-analysis signals; Security-awareness; Culture-oriented prevention; Security for smart devices; Security for mobile applications; Anonymity and pseudo-anonymity; Mitigating threats; Privilege control and isolation; Cyber-attacks and human factors; IoT and big data security issues; Privacy and protection in eTechnologies; Secure virtualized environments; Security during system migration or updates; Security integration pitfalls; Data leakage, vulnerabilities, failures and lessons learned; Security standards
SERVICES: Cyber Laboratory Services
Cyber intelligence systems; Global defense; Security-awareness; Data sanitization and end-of-lifecycle solutions; Compliance solutions with PCI DSS standard from PCI DSS certified datacenters; Mobile Device Management (MDM) and Mobile Application Management (MAM); Identity and Access Management (IAM); Risk and security management; IT-Governance, Risks and compliance; Public safety and professional communications and solutions for situational awareness, command and control; Data security services
SOLUTIONS: Cyber Laboratory Solutions
Cyber intelligence technologies; Global threat correlation and reputation services; credentials, expiration time for client installations, feature restrictions, Web-console audit logging, etc.; Advanced testing software, for known and unknown flaws in software; identifying the weaknesses and vulnerabilities; E-mail communication confidentiality protection; Protect of enterprises and government agencies for their confidential data against leaks; Internet security and content cloud services; Risk and security management; IT-Governance, Risks and compliance; SCADA-based information security systems; Guideline on advising, building, developing and inspecting/auditing; information security practices and systems
ARCH: Security frameworks, architectures and protocols
Formal aspects of security; Security analysis methodologies; Security verification; Security protocols; Security architectures and formalisms; Security and design vulnerability; Security and privacy protection; Performance and security; Secure group communication/multicast; Software design security; Middleware security; Security for nomadic code; Intrusion detection systems; Static analysis for software security; Security modeling
METRICS: Security, trust and privacy measurement
Security, trust and privacy metrics; Security assurance metrics; Security measurement architectures; Metrics for adaptive security systems; Taxonomical and ontological support of security metrics; Experiments and benchmarks for security measurements; Embedding security measurability in software and service architectures; Risk-driven assessment of security; Assessment of effectiveness, efficiency and correctness of security; Mapping security metrics and security assurance metrics; Mapping security measurements and non-functional requirements
SECMAN: Security management
Identity management; Security law enforcement; PKI; PKI Key management; Incident response planning; Intrusion detection and event correlation; Firewalls; Trust management; Software security assurance
SECTECH: Security technologies
Secure protocols; Applied cryptography; Smart cards; Biometrics; Digital rights management; Electronic surveillance; Database security
SYSSEC: System security
Internet security; Security in wireless; Sensor/cellular network security; Ad hoc network security; Security in peer-to-peer networks; Security in wireless multimedia systems; Security in different networks (mesh, personal, local, metropolitan, GSM, Bluetooth, WiMax, IEEE 802.x, etc.); Security of emergency services
INFOSEC: Information security
Information hiding; Anonymity; Authentication; Data Integrity; Security data mining; Data confidentiality and integrity; Information flow protection; Trustworthy networks: authentication, privacy and security models; Secure service discovery; Secure location-based service; Information survivability
RISK: Risk and security
Operational risk (opRisk); OpRisk and field studies; Reputation risk; Risk and security-awareness; Business continuity and disaster recovery; Privacy-awareness; Security and trust
MALWA: Malware and Anti-malware
Threat taxonomies and modeling; Security threats; Threats propagation; Anti-malware technologies; Engineering anti-malware; Anti-virus, anti-spyware, anti-phishing; Malware propagation models; Profiling security information; Vulnerability analysis and countermeasures; Denial of service attacks; Measurements and metrics; Testing samples and techniques; Quarantine/reuse decisions; Anti-malware tool performance; Anti-malware tool suites; Open-source anti-malware; Host-based anti-malware; On-line anti-malware scanning
MISUSE: Electronic abuse protection
Messaging, viruses, spyware; Advanced misuse detection techniques /machine learning, natural language processing, challenge-response, etc./; Message filtering, blocking, authentication; Digital signatures; Generalized spamming /over email, Internet telephony, instant messaging, mobile phone, phishing, etc. /; Spam compression and recognition; Learning misuse patterns; Payment schemes; Economics of generalized spam; Tracking abuse tactics and patterns; Protecting legitimate use patterns; Methods for testing protection robustness; Costs and benefits of messaging use and misuse; Standards for messaging and misuse reporting; Legal aspects /identity theft, privacy, freedom of speech, etc./
ANTIFO: Anti-forensics
Advanced anti-forensics mechanisms; Smart anti-forensics; e-discovery industry and anti-forensics; Overwriting data and metadata; Data hiding approaches; Detecting forensics analysis; Anti-forensics tools; Unix-, Windows-, and Linux anti-forensics techniques; Open source anti-forensics tools; Network anti-forensics tools
PRODAM: Profiling data mining
User and traffic profiling; Data mining and visualization; Profile mining and knowledge discovery; Mining lifecycle for profile collections; Profile warehouse construction; Profile portfolio and profile discovery; Profiling game users and game traffic; Profiling transactions; Simpson'd paradox; Real-time profiling mechanisms; Patterns for information profiling; Profiling engines; Profiling metrics; Forensics; Profiling applications (banks, on-line shopping, etc.); Data mining-based user profile prediction
SECHOME: Smart home security
Fundamentals for SHS; Privacy and protection for SHS; Identify and location management in SHS; Authentication and authorization in SHS; Access control and security policies in SHS; Trust and reputation management; Security context-based interfaces for SHS; SHS for accessibility and elderly/disabled people; Real-time challenges for SHS in eHealth environments; Architectures and systems for SHS; Network technologies and protocols for SHS; Ubiquitous/pervasive platform and middleware for SHS; Services and applications for SHS; SHS on campuses and hotels; SHS for mission critical laboratories; Content protection and digital rights management for SHS; Intelligent devices, sensor network/RFID for SHS; Intrusion detection and computer forensics for SHS; SHS and Homeland security; Personal data privacy and protection in SHS; Emerging standards and technologies for SHS; Commercial and industrial for SHS; Case studies, prototypes and experience
SECDYN: Security and privacy in dynamic environments
Fundamentals on highly dynamic environments; Privacy and predefined access control dilemma; Privacy police, provisions and obligations; Dependability in dynamic environments; Protection of digital documents in dynamic environments; On-line activities in high dynamic systems; Law enforcement in high dynamic systems; Personalization; Privacy and transparency; Distributed usage control; Privacy compliance; Secure ambient intelligence; Secure embedded microprocessor architectures; Secure compilation techniques
ECOSEC: Ecosystem security and trust
Secure and trusted service compositions in peer-to-peer networks; Secure data management in collaborative peer-to-peer networks; Security and reputation models for self-adaptive overlay networks; Identity and trust management in dynamic, self-organizing environments; Social institutional-based trust models for self-evolving communities
CRYPTO: Cryptography
Foundations of cryptography; Applied cryptography; Cryptanalysis; Signatures schemes and trust models; Cryptographic algorithms; Electronic payment systems; High-performance encryption methods; Group-oriented cryptography; Identity-based cryptography; Anonymous authentication; Cryptography for multi-user environments; Cryptography and secure localization systems; Attacks on cryptosystems
CYBER-Threat
e-Crime; Epidemiological models for warware and cyber-crime propagation; Record and retrieval of cyber-crimes; Cyber-crime prevention; Cyber-crime vulnerabilities; Cyber-counterattack at source; Distributed cyber-attacks; Orchestrated cyber-attacks; Recursion attacks; Cyber-storm attacks; Cyber-pranks, hoaxes; Phishing/Pharming and anti-phishing; Cyber-terrorism; Online cyber-crime reporting; Accuracy and security of cyber-reports; Fighting cyber-crimes; Cyber-crime laws
DEPEND: Dependability
Dependability and new technologies; Dependability facets; Adaptability and (self)adaptability; Adaptability and dependability; Big Data and dependability; Dependability and security; Trust and system dependability; Dependability, adaptability, and new technologies
Deadlines:
Submission | Jun 03, 2018 |
Notification | Jul 03, 2018 |
Registration | Jul 16, 2018 |
Camera ready | Jul 22, 2018 |
Deadlines differ for special tracks. Please consult the conference home page for special tracks Call for Papers (if any).