CINXE.COM
SECURWARE 2019
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1"><title>SECURWARE 2019</title><link rel="shortcut icon" href="https://www.iaria.org/images/_icons/favicon_iaria.ico" type="image/x-icon" /><link rel="stylesheet" href="https://www.iaria.org/css2/css6.css" /><meta http-equiv="Content-type" value="text/html; charset=UTF-8" /></head><body><div class="wrap"><div class="headmenu"> <div class="menudiv"><div class="homeimage"><a href="https://www.iaria.org"><img src="https://www.iaria.org/images2/webpage/logo.png" width="42" height="42"/></a></div><a href="SECURWARE19.html"><div class="dropdown"> <button class="dropbtn">HOME</button> <div class="dropdown-content"> </div></div></a><a href="CfPSECURWARE19.html"><div class="dropdown"> <button class="dropbtn">Call for Papers</button> <div class="dropdown-content"> </div></div></a><a href="ComSECURWARE19.html"><div class="dropdown"> <button class="dropbtn">Committees</button> <div class="dropdown-content"> </div></div></a><div class="dropdown"> <button class="dropbtn">Participation</button> <div class="dropdown-content"> <a href="SubmitSECURWARE19.html">Submit a Paper</a> <a href="CameraSECURWARE19.html">Camera Ready</a> <a href="RegistrationSECURWARE19.html">Registration</a> </div></div><div class="dropdown"> <button class="dropbtn">Venue</button> <div class="dropdown-content"> <a href="TouristSECURWARE19.html">Touristic Info</a> <a href="HotelTravelSECURWARE19.html">Hotel and Travel</a> </div></div><div class="dropdown"> <button class="dropbtn">Program</button> <div class="dropdown-content"> <a href="TutorialsSECURWARE19.html">Tutorials</a> <a href="ProgramSECURWARE19.html">Event Program</a> </div></div><div class="dropdown"> <button class="dropbtn">Post Conference</button> <div class="dropdown-content"> <a href="StatsSECURWARE19.html">Statistics</a> <a href="AwardsSECURWARE19.html">Awards</a> <a href="PhotosSECURWARE19.html">Photos</a> </div></div><a href="mailto:contact@iaria.org"><div class="dropdown"> <button class="dropbtn">Contact</button> <div class="dropdown-content"> </div></div></a> </div> </div><div class="head" style="background-image: url(https://www.iaria.org/images2/banners/nice/nice_strip_9.jpg); background-size: cover;"><div class="conflabels"><h2>The Thirteenth International Conference on Emerging Security Information, Systems and Technologies</h2><h2>SECURWARE 2019</h2><h3>October 27, 2019 to October 31, 2019 - Nice, France</h3></div></div><div class="contents"><div class="first"><a href="SubmitSECURWARE19.html"><div class="dropdown"> <button class="dropbtn sidemenu submitbtn">Submit a Contribution</button> <div class="dropdown-content"> </div></div></a><a href="RegistrationSECURWARE19.html"><div class="dropdown"> <button class="dropbtn sidemenu">Registration</button> <div class="dropdown-content"> </div></div></a><a href="CameraSECURWARE19.html"><div class="dropdown"> <button class="dropbtn sidemenu">Camera Ready</button> <div class="dropdown-content"> </div></div></a><p></p><div class="titledbox"><div class="title">Deadlines</div><div class="content"> <table width="100%" border="0" cellpadding="0"> <tr> <td><p class="lean">Submission</p></td> <td><p class="lean red">Jul 25, 2019</p></td> </tr> <tr> <td><p class="lean">Notification</p></td> <td><p class="lean">Aug 30, 2019</p></td> </tr> <tr> <td><p class="lean">Registration</p></td> <td><p class="lean">Sep 13, 2019</p></td> </tr> <tr> <td><p class="lean">Camera ready</p></td> <td><p class="lean">Sep 19, 2019</p></td> </tr> </table><p></p><p class="lean"><strong>Deadlines</strong> differ for special tracks. Please consult the conference home page for special tracks Call for Papers (if any).</p> </div></div><p></p><a href="https://www.iaria.org/conferences/SECURWARE.html"><div class="dropdown"> <button class="dropbtn sidemenu">Past Events</button> <div class="dropdown-content"> </div></div></a><p></p><div class="slidecontainer"> <div class="slideshow-container"> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_2631.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_5956.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_5949.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_7730.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_7841.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_7784.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_7749.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_7823.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_5915.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_3820.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_5772.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_5947.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_3992.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_7825.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_3277.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_3954.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_3981.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_3819.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_3239.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_3180.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_7527.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_3289.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_7710.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_5784.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_3318.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_7667.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_7699.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_3956.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_7694.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_2786.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_5766.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_7721.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_7829.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_5910.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_5948.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_5776.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_7651.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_7781.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_5951.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_3847.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_3246.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_7665.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_2666.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_5945.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_3850.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_3311.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_2573.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_3865.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_3204.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_5953.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_7658.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_3941.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_7535.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_3985.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_3210.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_5950.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_2667.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_5907.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_7701.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_3256.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_5786.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_3313.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_2789.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_5952.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_2763.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_5946.jpg"> </div> <div class="mySlides fade"> <img class="slideimg" src="https://www.iaria.org/images2/slideshow/nice/IMG_3948.jpg"> </div> </div> <script> var slideIndex = 0; showSlides(); function showSlides() { var i; var slides = document.getElementsByClassName("mySlides"); for (i = 0; i < slides.length; i++) { slides[i].style.display = "none"; } slideIndex++; if (slideIndex> slides.length) {slideIndex = 1} slides[slideIndex-1].style.display = "block"; setTimeout(showSlides, 4000); } </script> </div><p></p><div class="titledbox"> <div class="title">Publication</div> <div class="content"> <table width="100%" border="0" cellpadding="0"> <tr> <td style="vertical-align: top;"><p class="small">Published by IARIA Press (operated by <a target="_blank" href="https://www.xpertps.com/">Xpert Publishing Services</a>)</p></td> <td style="vertical-align: top;"><p class="small"><a target="_blank" href="https://www.xpertps.com/"><img src="https://www.iaria.org/images/_general/xps.jpg"/></a></p></td> </tr> <tr> <td style="vertical-align: top;"><p class="small">Archived in the Open Access <a target="_blank" href="https://www.thinkmind.org">IARIA ThinkMind Digital Library</a></p></td> <td style="vertical-align: top;"><p class="small"><a target="_blank" href="https://www.thinkmind.org"><img src="https://www.iaria.org/images/_general/thinkmind.jpg"/></a></p></td> </tr> <tr> <td colspan="2" style="vertical-align: top;"><p class="small">Prints available at <a href="http://www.proceedings.com/9769.html">Curran Associates, Inc.</a></p></td> </tr> <tr> <td colspan="2" style="vertical-align: top;"><p class="small">Authors of selected papers will be invited to submit extended versions to a <a href="https://www.iariajournals.org/">IARIA Journal</a></p></td> </tr> <tr> <td colspan="2" style="vertical-align: top;"><p class="small"><a href="https://www.iaria.org/indexing.html">Indexing Procedure</a></p></td> </tr> </table> </div></div><p></p><div class="titledbox"> <div class="title">Affiliated Journals</div> <div class="centeredcontent"> <a href="http://www.iariajournals.org/security/index.html"><img class="journalimg" src="https://www.iaria.org/images2/journals/sec_cover_small.jpg" /></a> </div></div><p></p></div> <div class="second"> <div class="dropdown"> <button onclick="myFunction()" class="dropbtn mobilebtn">Menu</button> <div id="myDropdown" class="dropdown-content"> <a href="SECURWARE19.html">HOME</a> <a href="CfPSECURWARE19.html">Call for Papers</a> <a href="ComSECURWARE19.html">Committees</a> <a href="TouristSECURWARE19.html">Touristic Info</a> <a href="HotelTravelSECURWARE19.html">Hotel and Travel</a> <a href="ProgramSECURWARE19.html">Event Program</a> <a href="TutorialsSECURWARE19.html">Tutorials</a> <a href="RegistrationSECURWARE19.html">Registration</a> <a href="CameraSECURWARE19.html">Camera Ready</a> <a href="SubmitSECURWARE19.html">Submit a Paper</a> <a href="https://www.iaria.org">iaria.org</a> <a href="mailto:contact@iaria.org">Contact</a> </div> </div><script language="javascript">function myFunction() { document.getElementById("myDropdown").classList.toggle("show");}// Close the dropdown menu if the user clicks outside of itwindow.onclick = function(event) { if (!event.target.matches(".dropbtn")) { var dropdowns = document.getElementsByClassName("dropdown-content"); var i; for (i = 0; i < dropdowns.length; i++) { var openDropdown = dropdowns[i]; if (openDropdown.classList.contains("show")) { openDropdown.classList.remove("show"); } } }}</script><div class="phoneinfo"> <p class="phoneinfop">SECURWARE 2019 - The Thirteenth International Conference on Emerging Security Information, Systems and Technologies</p> <p class="phoneinfop">October 27, 2019 - October 31, 2019</p></div><div class="titlebar">SECURWARE 2019</div> <p><strong>ISSN:</strong> 2162-2116<br /> <strong>ISBN:</strong> 978-1-61208-746-7 </p> <ul><li>Registered: with the Library of Congress of the United States of America (ISSN)</li> <li>Free Access: in <a href="https://www.thinkmind.org">ThinkMind Digital Library</a></li></ul> <p><strong>SECURWARE 2019 is colocated with the following events as part of <a href="NetWare19.html">NetWare 2019 Congress</a>:</strong></p> <ul> <li><a href="SENSORCOMM19.html">SENSORCOMM 2019</a>, The Thirteenth International Conference on Sensor Technologies and Applications</li> <li><a href="SENSORDEVICES19.html">SENSORDEVICES 2019</a>, The Tenth International Conference on Sensor Device Technologies and Applications</li> <li><a href="SECURWARE19.html">SECURWARE 2019</a>, The Thirteenth International Conference on Emerging Security Information, Systems and Technologies</li> <li><a href="AFIN19.html">AFIN 2019</a>, The Eleventh International Conference on Advances in Future Internet</li> <li><a href="CENICS19.html">CENICS 2019</a>, The Twelfth International Conference on Advances in Circuits, Electronics and Micro-electronics</li> <li><a href="ICQNM19.html">ICQNM 2019</a>, The Thirteenth International Conference on Quantum, Nano/Bio, and Micro Technologies</li> <li><a href="FASSI19.html">FASSI 2019</a>, The Fifth International Conference on Fundamentals and Advances in Software Systems Integration</li> <li><a href="GREEN19.html">GREEN 2019</a>, The Fourth International Conference on Green Communications, Computing and Technologies</li> </ul><div class="tracks"> <p><strong>Special tracks:</strong></p> <p><strong><a href="filesSECURWARE19/PriMal.pdf">PriMal: Privacy for High-Utility Machine Learning</a></strong><br /> <strong>Chair and Coordinator: </strong> Dr. rer. nat. Christoph Stach, Universität Stuttgart, Institut für Parallele und Verteilte Systeme (IPVS), Deutschland <a href="mailto:Christoph.Stach@ipvs.uni-stuttgart.de">Christoph.Stach@ipvs.uni-stuttgart.de</a></p> </div> <p><strong>SECURWARE 2019 conference tracks:</strong></p> <p><strong>TRENDS: Security challenges with new technologies</strong></p> <p> Security in SDN, SDX, NFV; Security in 4G/5G networks; Security and Internet of X (everything, things, people, etc.); Security for Virtualization and Cloud; Security and Big Data; Security in sensing and sensor networks; Security and energy-aware networks; Security in content-oriented networking; Security in cellular cognitive networks</p> <p><strong>TRUSTED CONTRACTS: Secured digital society</strong></p> <p> Trusted transaction contracts; Blockchain; Bitcoin; Cryptocurrency Fees; Cryptocurrency Governance; Cryptocurrency Lending; Certificate transparency; Revocation transparency; Confidential assets; eVoting technologies and methods; Sealed-bid auctions; Trusted smart contracts; Cryptographic Web applications; Real estate: titles&tokens</p> <p><strong>SECSERV: Security-as-a-Service - Security technologies and systems-oriented security and safety </strong></p> <p> Certified services and businesses; Security certifying processes, technologies and standards; Industrial security; Security in information systems; Physical/Virtual/Cloud security; Corporate/Personal security; Security guarantee/assurance/risks; Surveillance systems; Security/Safety digital environments (electromagnetic waves, unsafe facilities, undocumented logistics, etc.); Cyber-security and public services risks (thefts, health, alarms, vehicular, surveillance, people with special needs, credit carts, use of arms, drone-based delivery, etc.); Security in supply-based systems; Security in mobile applications, Web-based, Cloud-based services, and Internet of Things (IoT)-based systems; Designing secure and green-oriented industrial systems; Security in production systems; Secure production lines and secure human-oriented products and services</p> <p><strong>SECSTATUS: Advances and Challenges</strong></p> <p> Cryptography; Encryption schemes; Cryptanalysis; Thrifty zero-knowledge approaches; Chaos-information hiding; Advances in biometric authentication; Passive forensics; Access, computation and communication security mechanisms; Secure error-tolerant protocols; Side-channel attacks; Malware and attacks prevention; Anti-analysis signals; Security-awareness; Culture-oriented prevention; Security for smart devices; Security for mobile applications; Anonymity and pseudo-anonymity; Mitigating threats; Privilege control and isolation; Cyber-attacks and human factors; IoT and big data security issues; Privacy and protection in eTechnologies; Secure virtualized environments; Security during system migration or updates; Security integration pitfalls; Data leakage, vulnerabilities, failures and lessons learned; Security standards</p> <p><strong>SERVICES: Cyber Laboratory Services</strong></p> <p>Cyber intelligence systems; Global defense; Security-awareness; Data sanitization and end-of-lifecycle solutions; Compliance solutions with PCI DSS standard from PCI DSS certified datacenters; Mobile Device Management (MDM) and Mobile Application Management (MAM); Identity and Access Management (IAM); Risk and security management; IT-Governance, Risks and compliance; Public safety and professional communications and solutions for situational awareness, command and control; Data security services</p> <p><strong>SOLUTIONS: Cyber Laboratory Solutions</strong></p> <p>Cyber intelligence technologies; Global threat correlation and reputation services; credentials, expiration time for client installations, feature restrictions, Web-console audit logging, etc.; Advanced testing software, for known and unknown flaws in software; identifying the weaknesses and vulnerabilities; E-mail communication confidentiality protection; Protect of enterprises and government agencies for their confidential data against leaks; Internet security and content cloud services; Risk and security management; IT-Governance, Risks and compliance; SCADA-based information security systems; Guideline on advising, building, developing and inspecting/auditing; information security practices and systems </p> <p><strong>ARCH: Security frameworks, architectures and protocols </strong></p> <p>Formal aspects of security; Security analysis methodologies; Security verification; Security protocols; Security architectures and formalisms; Security and design vulnerability; Security and privacy protection; Performance and security; Secure group communication/multicast; Software design security; Middleware security; Security for nomadic code; Intrusion detection systems; Static analysis for software security; Security modeling </p> <p><strong>METRICS: Security, trust and privacy measurement</strong></p> <p>Security, trust and privacy metrics; Security assurance metrics; Security measurement architectures; Metrics for adaptive security systems; Taxonomical and ontological support of security metrics; Experiments and benchmarks for security measurements; Embedding security measurability in software and service architectures; Risk-driven assessment of security; Assessment of effectiveness, efficiency and correctness of security; Mapping security metrics and security assurance metrics; Mapping security measurements and non-functional requirements</p> <p><strong>SECMAN: Security management </strong></p> <p>Identity management; Security law enforcement; PKI; PKI Key management; Incident response planning; Intrusion detection and event correlation; Firewalls; Trust management; Software security assurance</p> <p><strong>SECTECH: Security technologies</strong></p> <p>Secure protocols; Applied cryptography; Smart cards; Biometrics; Digital rights management; Electronic surveillance; Database security </p> <p><strong>SYSSEC: System security </strong></p> <p>Internet security; Security in wireless; Sensor/cellular network security; Ad hoc network security; Security in peer-to-peer networks; Security in wireless multimedia systems; Security in different networks (mesh, personal, local, metropolitan, GSM, Bluetooth, WiMax, IEEE 802.x, etc.); Security of emergency services </p> <p><strong>INFOSEC: Information security </strong></p> <p>Information hiding; Anonymity; Authentication; Data Integrity; Security data mining; Data confidentiality and integrity; Information flow protection; Trustworthy networks: authentication, privacy and security models; Secure service discovery; Secure location-based service; Information survivability</p> <p><strong>RISK: Risk and security</strong></p> <p>Operational risk (opRisk); OpRisk and field studies; Reputation risk; Risk and security-awareness; Business continuity and disaster recovery; Privacy-awareness; Security and trust</p> <p><strong>MALWA: Malware and Anti-malware</strong></p> <p>Threat taxonomies and modeling; Security threats; Threats propagation; Anti-malware technologies; Engineering anti-malware; Anti-virus, anti-spyware, anti-phishing; Malware propagation models; Profiling security information; Vulnerability analysis and countermeasures; Denial of service attacks; Measurements and metrics; Testing samples and techniques; Quarantine/reuse decisions; Anti-malware tool performance; Anti-malware tool suites; Open-source anti-malware; Host-based anti-malware; On-line anti-malware scanning </p> <p><strong>MISUSE: Electronic abuse protection</strong></p> <p>Messaging, viruses, spyware; Advanced misuse detection techniques /machine learning, natural language processing, challenge-response, etc./; Message filtering, blocking, authentication; Digital signatures; Generalized spamming /over email, Internet telephony, instant messaging, mobile phone, phishing, etc. /; Spam compression and recognition; Learning misuse patterns; Payment schemes; Economics of generalized spam; Tracking abuse tactics and patterns; Protecting legitimate use patterns; Methods for testing protection robustness; Costs and benefits of messaging use and misuse; Standards for messaging and misuse reporting; Legal aspects /identity theft, privacy, freedom of speech, etc./</p> <p><strong>ANTIFO: Anti-forensics</strong></p> <p>Advanced anti-forensics mechanisms; Smart anti-forensics; e-discovery industry and anti-forensics; Overwriting data and metadata; Data hiding approaches; Detecting forensics analysis; Anti-forensics tools; Unix-, Windows-, and Linux anti-forensics techniques; Open source anti-forensics tools; Network anti-forensics tools </p> <p><strong>PRODAM: Profiling data mining</strong></p> <p>User and traffic profiling; Data mining and visualization; Profile mining and knowledge discovery; Mining lifecycle for profile collections; Profile warehouse construction; Profile portfolio and profile discovery; Profiling game users and game traffic; Profiling transactions; Simpson'd paradox; Real-time profiling mechanisms; Patterns for information profiling; Profiling engines; Profiling metrics; Forensics; Profiling applications (banks, on-line shopping, etc.); Data mining-based user profile prediction </p> <p><strong>SECHOME: Smart home security</strong></p> <p>Fundamentals for SHS; Privacy and protection for SHS; Identify and location management in SHS; Authentication and authorization in SHS; Access control and security policies in SHS; Trust and reputation management; Security context-based interfaces for SHS; SHS for accessibility and elderly/disabled people; Real-time challenges for SHS in eHealth environments; Architectures and systems for SHS; Network technologies and protocols for SHS; Ubiquitous/pervasive platform and middleware for SHS; Services and applications for SHS; SHS on campuses and hotels; SHS for mission critical laboratories; Content protection and digital rights management for SHS; Intelligent devices, sensor network/RFID for SHS; Intrusion detection and computer forensics for SHS; SHS and Homeland security; Personal data privacy and protection in SHS; Emerging standards and technologies for SHS; Commercial and industrial for SHS; Case studies, prototypes and experience</p> <p><strong>SECDYN: Security and privacy in dynamic environments</strong></p> <p>Fundamentals on highly dynamic environments; Privacy and predefined access control dilemma; Privacy police, provisions and obligations; Dependability in dynamic environments; Protection of digital documents in dynamic environments; On-line activities in high dynamic systems; Law enforcement in high dynamic systems; Personalization; Privacy and transparency; Distributed usage control; Privacy compliance; Secure ambient intelligence; Secure embedded microprocessor architectures; Secure compilation techniques</p> <p><strong>ECOSEC: Ecosystem security and trust</strong></p> <p>Secure and trusted service compositions in peer-to-peer networks; Secure data management in collaborative peer-to-peer networks; Security and reputation models for self-adaptive overlay networks; Identity and trust management in dynamic, self-organizing environments; Social institutional-based trust models for self-evolving communities</p> <p><strong>CRYPTO: Cryptography </strong></p> <p>Foundations of cryptography; Applied cryptography; Cryptanalysis; Signatures schemes and trust models; Cryptographic algorithms; Electronic payment systems; High-performance encryption methods; Group-oriented cryptography; Identity-based cryptography; Anonymous authentication; Cryptography for multi-user environments; Cryptography and secure localization systems; Attacks on cryptosystems </p> <p><strong>CYBER-Threat</strong></p> <p>e-Crime; Epidemiological models for warware and cyber-crime propagation; Record and retrieval of cyber-crimes; Cyber-crime prevention; Cyber-crime vulnerabilities; Cyber-counterattack at source; Distributed cyber-attacks; Orchestrated cyber-attacks; Recursion attacks; Cyber-storm attacks; Cyber-pranks, hoaxes; Phishing/Pharming and anti-phishing; Cyber-terrorism; Online cyber-crime reporting; Accuracy and security of cyber-reports; Fighting cyber-crimes; Cyber-crime laws</p> <p><strong>DEPEND: Dependability</strong></p> <p>Dependability and new technologies; Dependability facets; Adaptability and (self)adaptability; Adaptability and dependability; Big Data and dependability; Dependability and security; Trust and system dependability; Dependability, adaptability, and new technologies</p> <hr width="80%"/><p><strong>Deadlines:</strong><br/> <table align="center" width="80%" border="0" cellpadding="0"> <tr> <td><p class="tight">Submission</p></td> <td><p class="tight red">Jul 25, 2019</p></td> </tr> <tr> <td><p class="tight">Notification</p></td> <td><p class="tight">Aug 30, 2019</p></td> </tr> <tr> <td><p class="tight">Registration</p></td> <td><p class="tight">Sep 13, 2019</p></td> </tr> <tr> <td><p class="tight">Camera ready</p></td> <td><p class="tight">Sep 19, 2019</p></td> </tr> </table><p></p><p><strong>Deadlines</strong> differ for special tracks. Please consult the conference home page for special tracks Call for Papers (if any).</p></div></div><p></p><p></p><a name="Sponsors" id="Sponsors"><p class="copyright">Copyright (c) 2006-2024, IARIA</p></div></body></html>