Información de la conferencia
SAM' 2023: International Conference on Security and Management
http://sam.udmercy.edu/sam23/Día de Entrega: |
2023-05-24 Extended |
Fecha de Notificación: |
|
Fecha de Conferencia: |
2023-07-24 |
Ubicación: |
Las Vegas, Nevada, USA |
Años: |
11 |
Vistas: 2788 Seguidores: 0 Asistentes: 0
Solicitud de Artículos
You are invited to submit a full paper for consideration. All accepted papers will appear in the SAM'23 conference proceedings published by IEEE CPS (in printed book form; later, the proceedings will also be accessible online). Papers should demonstrate significant contribution to the construction, evaluation, application, or operation of secure systems. Those interested in proposing workshops/sessions, should refer to the "Call for Sessions/Workshops" section. Accepted papers must be uploaded to the site that will be provided in the paper acceptance email. One of the authors must present the paper. There are three options for paper presentation. Please click on Presentation Modes. Topics of interest are listed below. Other topics not listed will also be considered. Network Security Security Algorithms Mobile Network Security Security in CDN (Contents Distribution Networks) Virtual Private Network (VPN) Tracing Techniques in Internet Active Networks Security in Grid Web Monitoring Control Systems/SCADA Security Network Security Engineering Transport-Level Security Wireless Network Security IP Security Electronic Mail security Cryptographic Technologies Security Protocols Key Management Techniques Cryptographic Technologies Applications of Block and Stream Ciphers Applications of Public Key Cryptology Message Authentication and Hash Functions Anonymity Digital Signature Schemes Secret Sharing Cryptanalysis Security Management Surveillance Technologies Security Policies Security for Protocol Management Location Management QoS Management Resource Management Channel Management Mobility Management Digital Contents Copyright Protection System Security Management Network Security Management Management in Network Equipment Storage Area Networks (SAN) Management Information Security Management Government Security Policy Web Penetration Testing Security Operations Vulnerabilities Management Change and Patch Management Security Applications Security in E-Commerce and M-Commerce Secure OS Watermarking High-Tech Systems at Airports Emerging Technologies and Applications Cloud Computing Security Database Security Data Mining Security Cyber Security Automation Biometrics and Forensics Novel Biometric Methods Forensics Biological Security Technologies Face Recognition Systems Signature Recognition Systems Cyber Forensics Forensic Analysis Biometric Technologies for Security Feature Extraction and Matching Algorithms Hardware Security Security in E-Commerce and M-Commerce Embedded Systems Security Cryptographic Processors and Co-Processors Security Architectures True and Pseudorandom Number Generators Side Channel Attacks Fault Attacks Hardware Tamper Resistance Smart Card Processors Secure Storage Devices Information Assurance Mission Assurance Risk Assessment and Risk Management Continuity of Operations and Business Impact Analysis Cyber Security Compliance Security Auditing Security-Savvy Software Development Disaster Recovery Business Continuity Analysis Access Control Secure Use of Software Secure Performance Computer Security Firewall Systems Hacking Techniques and Related Issues Intrusion Detection System (IDS) Honeypot Virus Issues (Detection, Prevention ...) Trusted Computing Alert Correlation Attack Graphs Incident Responding Malware Analysis Incident Responding Malware Analysis Intrusion Detection Security Education Computer Security Education Network Security Education Cyber Security Education Cyber Security Body of Knowledge Information Assurance Education
Última Actualización Por Dou Sun en 2023-05-15
Conferencias Relacionadas
Revistas Relacionadas
CCF | Nombre Completo | Factor de Impacto | Editor | ISSN |
---|---|---|---|---|
Internet and Higher Education | 6.400 | Elsevier | 1096-7516 | |
c | IET Computer Vision | 1.500 | IET | 1350-245X |
IEEE Transactions on Wireless Communications | 8.900 | IEEE | 1536-1276 | |
Structural and Multidisciplinary Optimization | 3.600 | Springer | 1615-147X | |
Memetic Computing | 3.300 | Springer | 1865-9284 | |
Graphs and Combinatorics | 0.600 | Springer | 0911-0119 | |
Computer Methods in Biomechanics and Biomedical Engineering: Imaging & Visualization | 1.300 | Taylor & Francis | 2168-1163 | |
ACM Transactions on Management Information Systems | 2.500 | ACM | 2158-656X | |
Information Systems Management | 3.000 | Taylor & Francis | 1058-0530 |
Nombre Completo | Factor de Impacto | Editor |
---|---|---|
Internet and Higher Education | 6.400 | Elsevier |
IET Computer Vision | 1.500 | IET |
IEEE Transactions on Wireless Communications | 8.900 | IEEE |
Structural and Multidisciplinary Optimization | 3.600 | Springer |
Memetic Computing | 3.300 | Springer |
Graphs and Combinatorics | 0.600 | Springer |
Computer Methods in Biomechanics and Biomedical Engineering: Imaging & Visualization | 1.300 | Taylor & Francis |
ACM Transactions on Management Information Systems | 2.500 | ACM |
Information Systems Management | 3.000 | Taylor & Francis |
Recomendaciones