Sign for Notice Everyday    Sign Up| Sign In| Link| English|

Our Sponsors

    Receive Latest News

    Feedburner
    Share Us


    ARES 2018 - International Conference on Availability, Reliability and Security

    View: 660

    Website https://www.ares-conference.eu/ | Want to Edit it Edit Freely

    Category ARES 2018

    Deadline: March 16, 2018 | Date: August 27, 2018-August 30, 2018

    Venue/Country: Hamburg, Germany

    Updated: 2018-01-16 19:33:11 (GMT+9)

    Call For Papers - CFP

    ARES 2018 - CALL FOR PAPERS

    The 13th International Conference on Availability, Reliability and Security (ARES 2018)

    August 27 - August 30, 2018, Hamburg, Germany

    http://www.ares-conference.eu

    ARES CONFERENCE

    The 13th International Conference on Availability, Reliability and Security (“ARES – The International Dependability Conference”) will bring together researchers and practitioners in the area of dependability. ARES will highlight the various aspects of dependability – with special focus on the crucial linkage between availability, reliability and security.

    ARES aims at a full and detailed discussion of the research issues of dependability as an integrative concept that covers amongst others availability, safety, confidentiality, integrity, maintainability and security in the different fields of applications.

    ARES will emphasize the interplay between foundations and practical issues of dependability in emerging areas such as e-government, m-government, location-based applications, ubiquitous computing, autonomous computing, chances of grid computing etc. ARES is devoted to the critical examination and research challenges of the various aspects of Dependable Computing and the definition of a future road map.

    Selected papers that are accepted by and presented at the ARES Conference will be published, after further revision, in special issues of international journals (e.g. Springer EURASIP Journal on Information Security). The acceptance rate of the ARES 2017 conference was 24% (full papers only). ARES 2017 was published by the International Conference Proceedings Series published by ACM (ACM ICPS).

    ARES is ranked as B-conference in CORE. Qualis (backed by Brazilian Ministry) ranked ARES and Esorics as leading security conference in Europe (A2)

    l papers only).

    CONFERENCE OFFICERS

    General Chairs 2018

    Mathias Fischer, Universität Hamburg, Germany

    Dominik Herrmann, Universität Hamburg, Germany

    Program Committee Chairs 2018

    Christian Doerr, TU Delft, Netherlands

    Sebastian Schrittwieser, FH St. Pölten, Austria

    IMPORTANT DATES

    Submission Deadline: March 16, 2018 23:59 UTC-11

    Author Notification: May 30, 2018

    Proceedings Version: June 29, 2018

    Conference: August 27 - August 30, 2018

    SUBMISSION

    ARES 2017 was published by the International Conference Proceedings Series published by ACM (ACM ICPS).

    Authors are invited to submit research and application papers according the following guidelines: two columns, single-spaced, including figures and references, using 10 pt fonts and number each page.

    For the main conference as well as the workshops submission papers are classified into 3 categorizes representing original, previously unpublished work:

    -full paper (10 pages)

    -short paper (6 pages)

    -workshop paper (8 pages, a maximum of 10 pages is tolerated)

    Formating Instructions / template:

    Please read the template instructions carefully before submitting a paper, they can be found here (http://www.acm.org/publications/article-templates/proceedings-template.html/).

    Papers submitted to ARES 2018 have to use the SigConf template!

    Submitted papers will be carefully evaluated based on originality, significance, technical soundness, presentation and clarity of exposition.

    Simultaneous submission of the same work to multiple venues, submission of previously published work, or plagiarism constitutes dishonesty or fraud. ARES, like other scientific and technical conferences and journals, prohibits these practices and may take action against authors who have committed them.

    Contact author must provide the following information at the ARES conference system: paper title, authors’ names, affiliations, postal address, phone, fax, and e-mail address of the author(s), about 200-250 word abstract, and about five keywords. Accepted papers will be given guidelines in preparing and submitting the final manuscript(s) together with the notification of acceptance.

    Double blind review: ARES requires anonymized submissions – please make sure that submitted papers contain no author names or obvious self-references.

    Submission of a paper implies that should the paper be accepted, at least one of the authors will register and present the paper in the conference.

    The ARES submission system (EasyChair) is available here: https://easychair.org/conferences/?conf=ares2018

    Publishing preprints to Arxiv or other, open repositories is allowed prior to the notification of ARES and does not violate the requirement for novelty. Reviewers will be asked to not search for and ignore preprints that can deanonymize blinded submission.

    Important Note:

    To avoid accepting papers for ARES 2018 which are not presenting original work your paper will be plagiarism checked by PlagScan Plagarism Check. If you don’t want your paper to be checked automatically please contact us.

    PROGRAM COMMITTEE

    Isaac Agudo Ruiz, University of Malaga, Spain

    Todd R. Andel, University of South Alabama, United States

    Abdelmalek Benzekri, University of Toulouse, France

    Francesco Buccafurri, University of Reggio Calabria, Italy

    Lasaro Camargos, Federal University of Uberlândia, Brazil

    David Chadwick, University of Kent, United Kingdom

    Nathan Clarke, Plymouth University, United Kingdom

    Jörg Daubert, TU Darmstadt, Germany

    Luca De Cicco, Politecnico di Bari, Italy

    José Maria de Fuentes, Carlos III University of Madrid, Spain

    Pavlos Efraimidis Democritus, University of Thrace, Greece

    Dominik Engel, Salzburg University of Applied Sciences, Austria

    Christian Engelmann, Oak Ridge National Laboratory, United States

    Hannes Federrath, University of Hamburg, Germany

    Christophe Feltus, Luxembourg Institute of Science and Technology, Luxembourg

    Umberto Ferraro Petrillo, Universitá degli studi di Roma – La Sapienza, Italy

    Steven Furnell, Plymouth University, United Kingdom

    Joaquin Garcia-Alfaro, Télécom SudParis, France

    Karl Goeschka, Vienna University of Technology, Austria

    Lorena Gonzalez-Manzano, Carlos III University of Madrid, Spain

    Bogdan Groza, Politehnica University of Timisoara, Romania

    Sheikh Mahbub Habib, TU Darmstadt, Germany

    Dominik Herrmann, University Hamburg, Germany

    Martin Gilje Jaatun, SINTEF, Norway

    Jan Jürjens, TU Dortmund and Fraunhofer ISST, Germany

    Anatoli Kalysch, Friedrich-Alexander University Erlangen-Nuremberg, Germany

    Sokratis K. Katsikas, NTNU: Norwegian University of Science and Technology, Norway

    Peter Kieseberg, SBA Research, Austria

    Ralf Kuesters, University of Stuttgart, Germany

    Oksana Kulyk, TU Darmstadt, Germany

    Romain Laborde, University of Toulouse, France

    Costas Lambrinoudakis, University of Piraeus, Greece

    Shujun Li, University of Surrey, United Kingdom

    Giovanni Livraga, Universita’ degli Studi di Milano, Italy

    Robert Luh, Institute of IT Security Research, Austria

    Keith Martin, Royal Holloway, University of London, United Kingdom

    Barbara Masucci, University of Salerno, Italy

    Ioannis Mavridis, University of Macedonia, Greece

    Wojciech Mazurczyk, Warsaw University of Technology, Poland

    Mattia Monga, Universita` degli Studi di Milano, Italy

    Haralambos Mouratidis, University of Brighton, United Kingdom

    Thomas Nowey, Krones AG, Germany

    Jaehong Park, University of Alabama in Huntsville, United States

    Günther Pernul, University of Regensburg, Germany

    Stefanie Rinderle-Ma, Vienna University, Austria

    Michael Roßberg, TU Ilmenau, Germany

    Volker Roth, Freie Universität Berlin, Germany

    Giovanni Russello, University of Auckland, New Zealand

    Mark Scanlon, University College Dublin, Ireland

    Sebastian Schinzel, FH Münster, Germany

    Jörn-Marc Schmidt, Secunet, Germany

    Max Schuchard, University of Minnesota, United States

    Stefan Schulte, Vienna University of Technology, Austria

    Daniele Sgandurra, Royal Holloway, University of London, United Kingdom

    Jon A. Solworth, University of Illinois at Chicago, United States

    Jordi Soria-Comas, Universitat Rovira i Virgili, Spain

    Mark Strembeck, WU Vienna, Austria

    Jakub Szefer, Yale University, United States

    Oliver Theel, Carl von Ossietzky Universität Oldenburg, Germany

    Simon Tjoa, St. Pölten University of Applied Sciences, Austria

    Emmanouil Vasilomanolakis, TU Darmstadt Germany

    Umberto Villano, Universita’ del Sannio, Italy

    Corrado Aaron, Visaggio Univeristà del Sannio, Italy

    Xiao Wang, Carnegie Mellon University, United States

    Christos Xenakis, University of Piraeus, Greece

    Nicola Zannone, Eindhoven University of Technology, Netherlands

    TOPCIS of interest include, but are not limited to:

    Authorization, Authentication, and Access Control

    Availability, Dependability, and Resilience

    Botnets and Botnet Monitoring

    Business Continuity & Resilience

    Cost/Benefit Analysis

    Cryptography

    Dependability Aspects for Special Applications

    Dependability Aspects of e-Government

    Dependability and Resilience in Open Source Software

    Designing Security Requirements

    Digital Forensics

    E-Commerce Dependability

    Identity Management

    IPR of Security Technology

    Incident Response and Prevention

    Information Flow Control

    Information Hiding and Steganograhpy

    Interoperability Aspects

    Intrusion Detection and Fraud Detection

    Legal Issues related to Security and Privacy

    Mobile Security

    Network and Organizational Vulnerability Analysis

    Network Security

    Privacy-Enhancing Technologies

    Process based Security Models and Methods

    Resilience and Security for Critical Infrastructures

    Resilience of Computing Systems

    Resilience, Security, and Privacy for Smart Grids

    Resilience, Security, and Privacy for the Internet of Things

    RFID Security and Privacy

    Risk planning, Analysis & Awareness

    Safety Critical Systems

    Secure Enterprise Architectures

    Security and Privacy for Ubiquitous Systems

    Security and Privacy in E-Health

    Security and Trust Management in P2P and Grid applications

    Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications

    Security and Usability

    Security as Quality of Service

    Security in Distributed Systems / Distributed Databases

    Security in Electronic Payments

    Security in Electronic Voting

    Software Engineering of Dependable Systems

    Software Security

    Threats and Attack Modelling

    Trusted Computing

    Tools for Dependable System Design and Evaluation

    Trust Models and Trust Management

    Wireless Security


    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.