Security Theme

 

Security addresses the various components of an information system that safeguard the data and associated infrastructure from unauthorized activity. Topics of interest in this theme include (but are not limited to):

  • access control
  • adaptive security and system management
  • analysis of network and security protocols
  • applications of cryptographic techniques
  • attacks against networks and machines
  • authentication and authorization of users, systems, and applications
  • botnets
  • critical infrastructure security
  • firewall technologies
  • forensics and diagnostics for security
  • intrusion and anomaly detection and prevention
  • malicious code analysis, anti-virus, anti-spyware
  • network infrastructure security
  • operating system security
  • public safety and emergency management
  • security architectures
  • security in heterogeneous and large-scale environments
  • techniques for developing secure systems
  • web security
  • wireless and pervasive/ubiquitous computing security

TECHNICAL PROGRAM CHAIRS

  • Robert H. Deng (Singapore Management University)
  • Paul Miller (Queen’s University, Belfast)

COMMITTEE

  • Dima Alhadidi (Univesrity of New Brunswick)
  • Hassan Takabi (Department of Computer Science and Engineering)
  • Zhiqiang Lin (University of Texas at Dallas)
  • Luigi Logrippo (University du Quebec en Outaouais)
  • Mourad Debbabi (Concordia University)
  • Nadia Tawbi (Universite Laval)
  • Natalia Stakhanova (University of New Brunswick)
  • Amr Youssef (Concordia University)
  • Josep Domingo-Ferrer (Universitat Rovira i Virgili)
  • Saeed Samet (Memorial University of Newfoundland)
  • Laurence T. Yang (St Francis Xavier University)
  • Selma Tekir (Izmir Institute of Technology Dept. of Computer Engineering)
  • Pierangela Samarati (Universita` degli Studi di Milano)
  • Evangelos Kranakis (Carleton University Computer Science)
  • Natalija Vlajic (York University)
  • Luis Javier García Villalba (Complutense University of Madrid, UCM)
  • Nora Cuppens-Boulahia (Telecom Bretagne)
  • Alvaro Cardenas (University of Texas at Dallas)
  • Jeffrey McDonald (University of South Alabama)
  • Chin-Laung Lei (National Taiwan University)
  • Fu-Hau Hsu (National Central University)
  • Guy-Vincent Jourdan (University of Ottawa)
  • Marijke Coetzee (University of Johannesburg)
  • Alec Yasinsac (University of South Alabama)
  • Jose Morales (Institute for Cyber Security, University of Texas at San Antonio)
  • Atsuko Miyaji (School of Information Science, Japan Advanced Institute of Science and Technology)
  • Charles Morisset (Newcastle University)
  • Joaquin Garcia-Alfaro (Telecom SudParis)
  • Serap Sahin (Izmir Institute of Technologie)
  • Ali Aydın Selçuk (TOBB University)
  • Marina Gavrilova (University of Calgary)
  • Ken Barker (University of Calgary)
  • Colin Boyd (NTNU)
  • Florian Kerschbaum (University of Waterloo)
  • Sherman S. M. Chow (Chinese University of Hong Kong)
  • Silvio Ranise (FBK-Irst)
  • Indrakshi Ray (Colorado State University)
  • Melek Onen (EURECOM)
  • Sid Stamm (Rose-Hulman Institute of Technology)
  • Peter Herrmann (NTNU Trondheim)
  • Gerhard P. Hancke (City University of Hong Kong)
  • Urs Hengartner (University of Waterloo)
  • Pascal Lafourcade (Université Clermont Auvergne)
  • Siamak Shahandashti (University of York, UK)
  • Rino Falcone (Institute of Cognitive Sciences and Technologies-CNR)
  • JosÈ M. Fernandez (Ecole Polytechnique de Montreal)
  • Omar Chowdhury (University of Iowa)
  • Alvaro Zhou (Singapore University of Technology and Design)
  • Julie Thorpe (UOIT)
  • Anna Squicciarini (The Pennsylvania State University)
  • Keith Martin (Information Security Group, Royal Holloway, University of London)
  • Peter Gutmann (University of Auckland)
  • Aikaterini Mitrokotsa (Chalmers University of Technology)
  • Sjouke Mauw (University of Luxembourg)
  • Huaxiong Wang (Nanyang Technological University)
  • Arash Habibi Lashkari (University of New Brunswick)
  • Vladimir Oleshchuk (University of Agder)
  • Hongxin Hu (Clemson University)
  • Ghassan Karame (NEC Laboratories Europe)
  • Ting Yu (Qatar Computing Research Institute)
  • Erman Ayday (Bilkent University)
  • Willy Susilo (University of Wollongong)
  • Carsten Rudolph (Monash University)
  • Raymond Choo (The University of Texas at San Antonio, USA)
  • Bogdan Carbunar (Motorola Labs)
  • Gail-Joon Ahn (Arizona State University)
  • Nicolas Courtois (University College London)
  • Sara Foresti (DI – Universita` degli Studi di Milano)
  • Hugo Gonzalez (Universidad Politecnica de San Luis Potosi)

About the author: