Call for Papers
8th International Conference on Communications Security & Information Assurance (CSIA 2017) focuses on all technical and practical aspects of Communications Security & Information Assurance for wired and wireless networks. The goal of this conference is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Authors are solicited to contribute to the Conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of
Topics of Interest
Access Control, Anonymity, Audit and Audit Reduction & Authentication and Authorization
Applied Cryptography, Cryptanalysis, Digital Signatures
Biometric Security
Boundary Control Devices
Certification and Accreditation
Cross-Layer Design for Security
Data and System Integrity, Database Security
Defensive Information Warfare
Denial of Service Protection, Intrusion Detection, Anti-Malware
Distributed Systems Security
Electronic Commerce
E-mail Security, Spam, Phishing, E-mail Fraud, Virus, Worms, Trojan Protection
Grid Security
Information Hiding and Watermarking & Information Survivability
Insider Threat Protection, Integrity
Intellectual Property Protection
Internet/Intranet Security
Key Management and Key Recovery
Language-based Security
Mobile and Wireless Security
Mobile, Ad Hoc and Sensor Network Security
Monitoring and Surveillance
Multimedia Security ,Operating System Security, Peer-to-Peer Security
Performance Evaluations of Protocols & Security Application
Privacy and Data Protection
Product Evaluation Criteria and Compliance
Risk Evaluation and Security Certification
Risk/Vulnerability Assessment
Security & Network Management
Security and Assurance in Operational, Technological, Commercial Area
Security Engineering and Its Application
Security Models & Protocols
Security Threats Like DDoS, MiM, Session Hijacking, Replay Attack etc & Countermeasures
Trusted Computing
Ubiquitous Computing Security
Virtualization Security, VoIP Security, Web 2.0 Security
Paper Submission
Authors are invited to submit papers through the Conference Submission System by August 05, 2017. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & Information Technology (CS & IT) series (Confirmed).
Selected papers from CSIA - 2017, after further revisions, will be published in the special issues of the following journals.
International Journal of Computer Networks & Communications (IJCNC) - ERA Indexed, UGC listed
International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed, UGC listed
International Journal on Cryptography and Information Security (IJCIS)
International Journal of Wireless & Mobile Networks (IJWMN) - ERA Indexed
International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC)
International Journal of Next-Generation Networks (IJNGN)
International Journal of Peer to Peer Networks (IJP2P)
International Journal of Distributed and Parallel systems (IJDPS)
Important Dates
Submission Deadline : August 05, 2017
Authors Notification : September 10, 2017
Final Manuscript Due : September 13, 2017
Co-Located Event
8th International Conference on Ubiquitous Computing (Ubic-2017)
Program Committee Members
Asmaa Shaker Ashoor, Babylon University, Iraq
Avadhani P.S, Andhra University, India
Chin-Chih Chang, Chung Hua University,Taiwan
Emilio Jiménez Macías, University of La Rioja, Spain
Erritali Mohammed, Sultan Moulay Slimane University, Morocco
Hossein Jadidoleslamy, University of Zabol, Zabol, Iran
Houcine Hassan, Univeridad Politecnica de Valencia, Spain
Isa Maleki, Islamic Azad University, Iran
Islam Atef, Alexandria University, Egypt
Kayhan Erciyes, Izmir University,Turkey
Mahdi Mazinani, IAU Shahreqods, Iran
Mahi Lohi, University of Westminster, UK
Mohamed Ashik M, Salalah College of Technology,Oman
Mohamed Fahad AlAjmi, King Saud University, Saudi Arabia
Mohammad M. Banat, Jordan University of Science and Technology, Jordan
Mohammed Ghanbari, University of Essex, United Kingdom