Conference Information
MMM-ACNS 2017: International Conference on Mathematical Methods, Models and Architectures for Computer Network Security
http://www.mmm-acns2017.pl/Submission Date: |
2017-02-04 |
Notification Date: |
2017-03-25 |
Conference Date: |
2017-08-28 |
Location: |
Warsaw, Poland |
Years: |
7 |
Viewed: 16405 Tracked: 1 Attend: 0
Call For Papers
The authors are encouraged to submit full papers describing original, previously unpublished research results, not currently under review by another conference or journal, addressing state-of-the-art research and development in the area of mathematical methods, models and architectures for computer networks security.
The total length of a paper should not exceed 12 pages formatted according to the template of Lecture Notes in Computer Science provided by Springer at: http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0.
All submitted papers will be reviewed.
The topics cover, but are not necessarily limited to the following:
Adaptive security,
Anti-malware techniques: detection, analysis, prevention,
Anti-phishing, anti-spam, anti-fraud, anti-botnet techniques,
Applied cryptography,
Authentication, authorization and access control,
Cloud Security,
Computer and network forensics,
Covert channels,
Critical infrastructure protection,
Cyber-physical systems,
Cyber security of industrial control systems,
Data and application security,
Data mining, machine learning, and bio-inspired approaches for security,
Deception systems and honeypots,
Denial-of-service attacks and countermeasures,
Digital Rights Management,
eCommerce, eBusiness and eGovernment security,
Embedded system security,
Formal analysis of security properties,
Information resilience under malicious attacks,
Information warfare,
Internet and web security,
Intrusion prevention, detection, and response,
Language-based security,
Network resilience,
New ideas and paradigms for security,
Operating system security,
Reliability and dependability,
Risks metrics, risk analysis and risk management,
Security and privacy in pervasive and ubiquitous computing,
Security event and information management,
Security for large-scale systems and critical infrastructures,
Security in social networks,
Security of emerging technologies: sensor, wireless/mobile, peer-to-peer and overlay networks,
Security of autonomous agents and multi-agent systems,
Security modeling and simulation,
Security policies,
Security protocols,
Security verification,
Security visualization,
Self-protecting and healing,
Smartphone security,
Trusted computing,
Trust and reputation management,
Vulnerability assessment,
Last updated by Dou Sun in 2016-10-30
Related Conferences
| Short | Full Name | Conference |
|---|---|---|
| ARCS | International Conference on Architecture of Computing Systems | 2026-03-24 |
| STACS | International Symposium on Theoretical Aspects of Computer Science | 2026-03-10 |
| ESORICS | European Symposium on Research in Computer Security | 2025-09-22 |
| LCN | IEEE Conference on Local Computer Networks | 2025-10-14 |
| FMCAD | Formal Methods in Computer-Aided Design | 2025-10-06 |
| PACT | International Conference on Parallel Architectures and Compilation Techniques | 2025-11-03 |
| MFCS | International Symposium on Mathematical Foundations of Computer Science | 2024-08-26 |
| CRITIS | International Conference on Critical Information Infrastructures Security | 2018-09-24 |
| PDCN | International Conference on Parallel and Distributed Computing and Networks | 2014-02-17 |
| HiPEAC | International Conference on High Performance and Embedded Architectures and Compilers | 2025-01-20 |
Related Journals
| CCF | Full Name | Impact Factor | Publisher | ISSN |
|---|---|---|---|---|
| Journal of Chemical Theory and Computation | 5.5 | American Chemical Society | 1549-9618 | |
| Journal of Theoretical and Applied Electronic Commerce Research | 4.6 | MDPI | 0718-1876 | |
| Mathematics and Computers in Simulation | 4.4 | Elsevier | 0378-4754 | |
| b | The Journal of Systems Architecture: Embedded Software Design | 3.8 | Elsevier | 1383-7621 |
| Mathematical Programming Computation | 3.6 | Springer | 1867-2949 | |
| Applied Mathematics and Computation | 3.4 | Elsevier | 0096-3003 | |
| Mathematical and Computer Modelling of Dynamical Systems | 1.800 | Taylor & Francis | 1387-3954 | |
| International Journal of Applied Mathematics and Computer Science | 1.600 | Walter de Gruyter | 1641-876X | |
| Optical Memory and Neural Networks | 1.000 | Springer | 1060-992X | |
| Mathematical Methods of Operations Research | 0.900 | Springer | 1432-2994 |
| Full Name | Impact Factor | Publisher |
|---|---|---|
| Journal of Chemical Theory and Computation | 5.5 | American Chemical Society |
| Journal of Theoretical and Applied Electronic Commerce Research | 4.6 | MDPI |
| Mathematics and Computers in Simulation | 4.4 | Elsevier |
| The Journal of Systems Architecture: Embedded Software Design | 3.8 | Elsevier |
| Mathematical Programming Computation | 3.6 | Springer |
| Applied Mathematics and Computation | 3.4 | Elsevier |
| Mathematical and Computer Modelling of Dynamical Systems | 1.800 | Taylor & Francis |
| International Journal of Applied Mathematics and Computer Science | 1.600 | Walter de Gruyter |
| Optical Memory and Neural Networks | 1.000 | Springer |
| Mathematical Methods of Operations Research | 0.900 | Springer |