Honeypots
CFP - ASIA '09 - 4th Annual Symposium on Information Assurance Jan 05 2009 02:39PM
Damira (damira gmail com)
-- On Behalf of ASIA '09 Chair Sanjay Goel <goel (at) albany (dot) edu [email concealed]>

CALL FOR PAPERS
4th Annual Symposium on Information Assurance (ASIA '09)
12th Annual New York State Cyber Security Conference
June 3-4, 2009, Empire State Plaza (Albany, NY)

Website: http://www.albany.edu/iasymposium

IMPORTANT DATES
Paper Submission Deadline February 15, 2009
Reviewer Feedback March 15, 2009
Final Paper Submission March 31, 2009

SYMPOSIUM GENERAL CHAIR:
Sanjay Goel
Director of Research, NYS Center for Information Forensics and
Assurance(CIFA)
Associate Professor, School of Business
University at Albany, State University of New York
BA 310b, 1400 Washington Ave. Albany, NY 12222
PH: (518) 442-4925
Email: goel (at) albany (dot) edu [email concealed]

SYMPOSIUM CO-CHAIR:
Laura Iwan
NY State Information Security Officer, NY State Office of Cyber
Security & Critical Infrastructure Coordination

OVERVIEW:
Authors are invited to submit original and unpublished papers to the
4th Annual Symposium on Information Assurance. Accepted papers will
appear in the symposium proceedings and selected papers may be
selected for a journal. This symposium is jointly held with the 12th
Annual New York State Cyber Security Conference. A special theme for
the overall conference is cyber warfare. This two-day event attracts
practitioners, researchers, and vendors providing opportunities for
business and intellectual engagement among attendees. The symposium is
organized by the School of Business and the NYS Center for Information
Forensics and Assurance (CIFA) at the University at Albany, State
University of New York, as well as the NYS Office of Cyber Security
and Critical Infrastructure Coordination.

SUGGESTED TOPICS (but not limited to):
Cyber Warfare; Network Security and Intrusion Detection;
Internet-based Terrorism and Espionage; Reverse Engineering of Viruses
and Worms; Security Policy Implementation & Compliance; Botnet
Detection and Prevention; Information Security Risk Management;
Security in Wireless and Ad hoc Networks; Economics of Information
Security; Adaptive & Resilient Security Models; Computer & Network
Forensics; Biological Models of Security; Computer Crime and Digital
Forensics; Distributed Systems Security; Privacy & Security, Database
Security and Data Integrity; Digital Rights Management, Forensic
Accounting and Fraud Detection; Linguistic Analysis for Security and
Intelligence; Curriculum; Development in Information Security

SUBMISSION CATEGORIES:
Submissions can be made in a number of categories: Completed research
papers, research-in-progress papers, case studies, and panel
proposals/round table discussions. Please follow the following
guidelines in preparing your submission.
1. Completed Research Papers: Typically 5,000 words long (excluding
abstract and references).
2. Research in Progress Papers: Typically 2,500 words (excluding
abstract and references).
3. Case Studies: Typically between 3,000 and 5,000 words long.
4. Round Table Discussion: Typically a 1,000 word synopsis of the topic area.
5. Panel Proposals: Typically a 1,000 word description, identifying the
panelists to be involved.

SUBMISSION GUIDELINES:
1. Submitted papers must not have been previously published, or
currently under consideration for publication elsewhere, or have
substantial overlap with papers the author has submitted elsewhere.
2. Submissions undergo a double-blind peer review process.
3. Papers selected for presentation will be published in formal
proceedings. Arrangements are also being made with journals to publish
extended versions of selected papers from the symposium.
4. Papers in the topic areas discussed are preferred, although
contributions outside those topics may also be of interest. Please feel
free at any time to contact the symposium chair if you have questions
regarding your submission.
5. Papers should be submitted via email to the chair at
goel (at) albany (dot) edu [email concealed] in IEEE format and should include the following:
a) Separate title page (in plain text) with Title, Name(s) of authors,
Organizational affiliation(s), telephone and fax number(s), postal
address(es), and email address(es), Author to contact for
correspondence about the paper.
b) Abstract (less than 250 words)
c) Paper including a brief biography of each author as appropriate at
the end of the paper

TECHNICAL PROGRAM COMMITTEE:
- Alexey Salnikov, Moscow State University, Russia
- Anil B. Somayaji, Carleton University, Canada
- George Berg, University at Albany, SUNY
- Gurpreet Dhillon, Virginia Commonwealth University
- Hong C. Li, Intel Corporation
- Martin Loeb, University of Maryland
- Nasir Memon, Brooklyn Polytechnic
- Raghu T. Santanam, Arizona State University
- Stephen F. Bush, GE Global Research Center
- Boleslaw Szymanski, Rensselaer Polytechnic Institute
- Shambhu J. Upadhyaya, University at Buffalo, SUNY
- Rahul Singh, University of North Carolina, Greensboro
- Michael Sobolewski, Texas Tech University
- R. Sekar, Stony Brook University, SUNY
- Robert Bangert-Drowns, University at Albany, SUNY
- S. S. Ravi,University at Albany, SUNY
- Raj Sharman, University at Buffalo, SUNY
- Stelios Sidiroglou, Columbia University
- Daniel Rice, Loyola College
- M.P. Gupta, Indian Institute of Technology, Delhi
- Dipankar Dasgupta, University of Memphis
- Shiu-Kai Chin, Syracuse University
- Ronald W. Dodge, United States Military Academy West Point

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus