ASIA 2009 - 4th Annual Symposium on Information Assurance (ASIA '09) and 12th Annual New York State Cyber Security Conference
View: 1900
Website http://www.albany.edu/iasymposium |
Edit Freely
Category ASIA 2009
Deadline: February 15, 2009 | Date: June 03, 2009
Venue/Country: New York, U.S.A
Updated: 2010-06-04 19:32:22 (GMT+9)
Call For Papers - CFP
CALL FOR PAPERS4th Annual Symposium on Information Assurance (ASIA '09) and 12th Annual New York State Cyber Security Conference June 3-4, 2009, Empire StatePlaza (Albany, NY)Website: http://www.albany.edu/iasymposiumIMPORTANT DATESPaper Submission Deadline February 15, 2009 Reviewer Feedback March 15, 2009Final Paper Submission March 31, 2009SYMPOSIUM GENERAL CHAIR:Sanjay GoelDirector of Research, NYS Center for Information Forensics and Assurance(CIFA) Associate Professor, School of Business University at Albany,State University of New York BA 310b, 1400 Washington Ave. Albany, NY12222PH: (518) 442-4925goelalbany.eduSYMPOSIUM CO-CHAIR:Laura IwanNY State Information Security Officer, NY State Office of Cyber Security& Critical Infrastructure CoordinationOVERVIEW:Authors are invited to submit original and unpublished papers to the 4thAnnual Symposium on Information Assurance. Accepted papers will appearin the symposium proceedings and selected papers may be selected for ajournal. This symposium is jointly held with the 12th Annual New YorkState Cyber Security Conference. A special theme for the overallconference is cyber warfare. This two-day event attracts practitioners,researchers, and vendors providing opportunities for business andintellectual engagement among attendees. The symposium is organized bythe School of Business and the NYS Center for Information Forensics andAssurance (CIFA) at the University at Albany, State University of NewYork, as well as the NYS Office of Cyber Security and CriticalInfrastructure Coordination.SUGGESTED TOPICS (but not limited to):Cyber WarfareNetwork Security and Intrusion Detection Internet-based Terrorism andEspionage Reverse Engineering of Viruses and Worms Security PolicyImplementation & Compliance Botnet Detection and Prevention InformationSecurity Risk Management Security in Wireless and Ad hoc NetworksEconomics of Information Security Adaptive & Resilient Security ModelsComputer & Network Forensics Biological Models of Security ComputerCrime and Digital Forensics Distributed Systems Security Privacy &Security Database Security and Data Integrity Digital Rights ManagementForensic Accounting and Fraud Detection Linguistic Analysis for Securityand Intelligence Curriculum Development in Information SecuritySUBMISSION CATEGORIES:Submissions can be made in a number of categories: Completed researchpapers, research-in-progress papers, case studies, and panelproposals/round table discussions. Please follow the followingguidelines in preparing your submission. 1. Completed Research Papers: Typically 5,000 words long (excludingabstract and references).2. Research in Progress Papers: Typically 2,500 words (excludingabstract and references). 3. Case Studies: Typically between 3,000 and 5,000 words long.4. Round Table Discussion: Typically a 1,000 word synopsis of the topicarea.5. Panel Proposals: Typically a 1,000 word description, identifying thepanelists to be involved.SUBMISSION GUIDELINES:1. Submitted papers must not have been previously published, orcurrently under consideration for publication elsewhere, or havesubstantial overlap with papers the author has submitted elsewhere. 2. Submissions undergo a double-blind peer review process.3. Papers selected for presentation will be published in formalproceedings. Arrangements are also being made with journals to publishextended versions of selected papers from the symposium.4. Papers in the topic areas discussed are preferred, althoughcontributions outside those topics may also be of interest. Please feelfree at any time to contact the symposium chair if you have questionsregarding your submission.5. Papers should be submitted via email to the chair at goelalbany.eduin IEEE format and should include the following: a) Separate title page (in plain text) with Title, Name(s) of authors,Organizational affiliation(s), telephone and fax number(s), postaladdress(es), and email address(es), Author to contact for correspondenceabout the paper.b) Abstract (less than 250 words)c) Paper including a brief biography of each author as appropriate atthe end of the paper TECHNICAL PROGRAM COMMITTEE:Alexey Salnikov, Moscow State University, Russia Anil B. Somayaji,Carleton University, Canada George Berg, University at Albany, SUNYGurpreet Dhillon, Virginia Commonwealth University Hong C. Li, IntelCorporation Martin Loeb, University of Maryland Nasir Memon, BrooklynPolytechnic Raghu T. Santanam, Arizona State University Stephen F. Bush,GE Global Research Center Boleslaw Szymanski, Rensselaer PolytechnicInstitute Shambhu J. Upadhyaya, University at Buffalo, SUNY Rahul Singh,University of North Carolina, Greensboro Michael Sobolewski, Texas TechUniversity R. Sekar, Stony Brook University, SUNY Robert Bangert-Drowns,University at Albany, SUNY S. S. Ravi, University at Albany, SUNY RajSharman, University at Buffalo, SUNY Stelios Sidiroglou, ColumbiaUniversity Daniel Rice, Loyola College M.P. Gupta, Indian Institute ofTechnology, Delhi Dipankar Dasgupta, University of Memphis Shiu-KaiChin, Syracuse University
Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.