Date
8 - 10 Sep 2015

SIN 2015

8th International Conference on Security of Information and Networks

City
Sochi, Russia
Place
ЮФУ
Registration
Registration is closed
8 - 10 Sep 2015
ЮФУ, Sochi, Russia

SIN 2015

8th International Conference on Security of Information and Networks

About

Description

[Apologies for cross postings.  Please circulate to colleagues and prospective interested parties.]

 

CALL FOR CONTRIBUTIONS

======================

 

8th International Conference on Security of Information and Networks (SIN 2015)

8-10 September 2015

Sochi, Russia

 

www.sinconf.org

 

In Technical Cooperation with ACM Special Interest Group on Security, Audit and Control (SIGSAC)

-------------------------

Proceedings by ACM Press; all papers will be inserted into the ACM Digital Library.

-------------------------

 

In succession to the successful SIN 2007 - SIN 2014, the 8th International Conference on Security of Information and Networks (SIN 2015) provides an international forum for presentation of research and applications of security in information and networks. SIN 2015 conference features contributed as well as invited papers, special sessions, workshops, and tutorials on theory and practice. 

 

SIN 2015 will feature the following keynote papers and talks:

- Ron Poet, The University of Glasgow

 

Future SIN Conferences are scheduled to take place in the USA (2016) and Australia (2017).

 

PROPOSALS 

==================

 

Papers, special sessions, tutorials, and workshops addressing all aspects of security in information and networks are being sought. Researchers and industrial practitioners working on the following and related subjects are especially encouraged: development and realization of cryptographic solutions, security schemes, new algorithms; critical analysis of existing approaches; secure information systems, especially distributed control and processing applications, and security in networks; interoperability, service levels and quality issues in such systems; information assurance, security, and public policy; detection and prevention of cybercrimes such as fraud and phishing; next generation network architectures, protocols, systems and applications; industrial experiences and challenges of the above. Doctoral students are encouraged to propose papers on ongoing research.

 

Original papers will be considered; submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any other conference or workshop that has proceedings. All submitted papers will be reviewed by at least three members of the program committee judging its originality, significance, correctness, presentation and relevance. Authors are also encouraged to propose position papers on practical studies and experiments, critique of existing work, emerging issues, and novel ideas under development. 

 

Enterprises and research centers developing, implementing, or using security tools and frameworks are encouraged to propose application / tool demo. 

 

Proposals of half-day tutorials on fundamental to advanced subjects covering practical implementation aspects of security are welcome.

 

Proposals of special session(s) to be held in the main conference are welcome.

 

Proposals are invited for workshops to be held in conjunction with SIN 2015 Conference. The workshop proposal theme should be closely related to the conference topics.

 

Broad areas of interest in security theory, technology and applications will include, but are not limited to, the following: 

 

* Access control and intrusion detection

* Security of cyber-physical systems

* Autonomous and adaptive security

* Security tools and development platforms

* Computational intelligence techniques in security

* Security ontology, models, protocols & policies

* Computer network defense

* Standards, guidelines and certification

* Cryptographic techniques and key management

* Security-aware software engineering

* Industrial applications of security

* Trust and privacy

* Information assurance

* Next generation network architectures

* Malware analysis

* Network security and protocols

* Security challenges in Mobile/Embedded Systems

* Cloud security

* Security Awareness and Education

 

The conference will feature the following special sessions in 2015:

 

* Detecting and Preventing Fraud with Data Analytics

* Cybersecurity of Large-Scale and Distributed Systems

 

The details about the special sessions can be found at http://www.sinconf.org/sin2015/index.php/workshops-call-for-workshops

 

SUBMISSION OF PROPOSALS

=======================

 

Papers must be submitted electronically via the SIN 2015 Submission Site at https://cmt.research.microsoft.com/SIN2015/. Title, author's name(s), affiliation, mailing address, telephone, fax and email of the principal author should be included. Maximum length for the proceedings is 8 pages for full paper, 4 pages for short paper, 2 pages for fast abstract and position statement, and 2 pages for demo and tutorial proposals. Extra page charges apply. All papers should be written according to double-column ACM conference format (http://www.acm.org/sigs/publications/proceedings-templates). 

 

All proposals for organizing workshops, tutorials, demos, and special sessions are expected at the conference e-mail sin2015@sinconf.org.

 

All accepted papers will be published by ACM Press in a conference proceedings and placed into ACM Digital Library. Extended versions of selected papers will be invited for possible publication in a special issue of the International Journal of Information Security and Privacy (IJISP) by IGI Global (http://www.sinconf.org/sin2015/images/docs/IJISP-SIN2015-rev.pdf). Each accepted paper must be registered to be included in the proceedings. Papers not presented during the conference may be removed from the online proceedings.

 

IMPORTANT DATES

===============

 

Please consult www.sinconf.org site for the most up-to-date info on the following:

 

Workshop / Special Session Proposals: 1 March 2015 (passed)

Paper Submission by: 20 April 2015

Tutorial Proposal by: 10 May 2015

Tutorial Notification: 20 May 2015

All Author Notification: 17 May 2015

All Papers Camera Ready by:  1 June 2015

Author Registration due date: 1 June 2015

Tutorial Date: 7 September 2015

Conference Dates: 8–10 September 2015

Workshops Date: 10 September 2015

 

ORGANIZATION & SPONSORS

=======================

 

Organized by

------------

- Southern Federal University, Taganrog, Rostov-on-Don, Russia

- The University of Glasgow, Glasgow, UK

- Aksaray University, Aksaray, Turkey

- Malaviya National Institute of Technology, Jaipur, India

- Macquarie University, Sydney, Australia

 

Supported by

------------

Southern Federal University, Russia (pending)

Russian Foundation for Basic Research (pending)

 

Sponsored by

------------

NeoBIT LLC, St. Petersburg, Russia

NPO Echelon, Moscow, Russia

 

Hosted by

---------

Department of Security of Information Technologies and South-Russian Regional Scientific-Educational Center for Information Security Problems, Southern Federal University, Taganrog, Rostov-on-Don, Russia

 

ORGANIZATION COMMITTEE

=====================

 

Honorary Chair: Marina Borovskaya, Rector of Southern Federal University, Russia

 

Conference Chair: Oleg Makarevich, Southern Federal University, Russia

Conference Co-Chair: Ron Poet, University of Glasgow, UK

Conference Co-Chair: Atilla Elci, Aksaray University, Turkey

Conference Co-Chair: Manoj Singh Gaur, Malaviya National Institute of Technology, India

Conference Co-Chair: Mehmet Orgun, Macquarie University, Australia

 

Program Chair: Ludmila Babenko, Southern Federal University, Russia

Program Co-Chair: Sadek Ferdous, University of Glasgow, UK

Program Co-Chair: Anthony T.S. Ho, University of Surrey, UK

Program Co-Chair: Vijay Laxmi, Malaviya National Institute of Technology, India

Program Co-Chair: Josef Pieprzyk, Queensland University of Technology, Australia

 

Tutorials Chair: Evgeny Abramov, Southern Federal University, Russia

Tutorials Co-Chair: Hani Aljahdali, University of Glasgow, UK

Tutorials Co-Chair: Behnam Rahnama, Okan University, Turkey

Tutorials Co-Chair: Dhiren Patel, SVNIT Surat, India

 

Workshops Chair: Peter Zegzhda, Saint-Petersburg State Polytechnical University, Russia

Workshops Co-Chair: Maria Evangelopoulou, University of Glasgow, UK

Workshops Co-Chair: Hossain Shahriar, Kennesaw State University, USA

Workshops Co-Chair: Chhagan Lal, SKIT, India

 

Publication Chair: Alexander Chefranov, Eastern Mediterranean University, North Cyprus

Publication Co-Chair: Jaideep Vaidya, Rutgers University, USA

 

Treasurer: Vladimir Strukov, Southern Federal University, Russia

 

Registration Chair: Olga Peskova, Southern Federal University, Russia

 

Local Arrangements Chair: Maxim Anikeev, Southern Federal University, Russia

 

e-Presence Chair: Ivan Polovko, Southern Federal University, Russia

e-Presence Co-Chair: Muhammet Saygin, Mersin University, Silifke Vocational School, Turkey

 

Promotion Chair: Maxim Anikeev, Southern Federal University, Russia

Promotion Co-Chair: Alexey Nekrasov, Southern Federal University, Russia

Promotion Co-Chair: Soum Chowdhury, University of Glasgow, UK

Promotion Co-Chair: Duygu Зelik, Istanbul Aydin University, Turkey

Promotion Co-Chair: Parvez Faruki, BPTI, Bhavnagar, India

 

Liaison for South America: Carlos Becker Westphall, Federal University of Santa Catarina, Brazil

 

Logo, certificates & covers designs: Efe Cem Elзi, Turkey

 

Volunteers Team: Nikita Sushkin, Students of IT-Security Department (Southern Federal University, Russia)

 

Advisory Committee Members:

Bart Preneel, Katholieke Universiteit Leuven, Belgium

Bьlent Цrencik, Beykent University, Turkey

Cetin Kaya Koc, University of California Santa Barbara, USA

Edward Dawson, Queensland University of Technology, Australia

Elisa Bertino, Purdue University, USA

N. Balakrishnan, IISc Bangalore, India

Willy Susilo, University of Wollongong, Australia

 

INTERNATIONAL PROGRAM COMMITTEE

===============================

 

Full list of the IPC is available at www.sinconf.org.

 

GENERAL INQUIRIES

=================

 

For updated information, please refer to www.sinconf.org or the Conference e-mail sin2015@sinconf.org.

 

Dated 2015-04-03.

 

Organizers

Южный федеральный университет, Институт компьютерных технологий и информационной безопасности

- Southern Federal University, Taganrog, Rostov-on-Don, Russia

- The University of Glasgow, Glasgow, UK

- Aksaray University, Aksaray, Turkey

- Malaviya National Institute of Technology, Jaipur, India

- Macquarie University, Sydney, Austr

Contacts

Phone/Fax: +7 8634 312018

mak@tsure.ru

sin2015@sinconf.org

About partners

In technical cooperation with ACM SIGSAC, proceedings in ACM Digital Library. Extended versions of selected papers will be invited for possible publication in a special issue of the International Journal of Information Security and Privacy (IJISP) by IGI Global.

Cost of participation

250€