-------- Original-Nachricht -------- Betreff: [AISWorld] Second Call For Papers - 5th Annual Symposium on Information Assurance (ASIA '10) Datum: Tue, 19 Jan 2010 13:37:10 -0500 Von: Sanjay Goel SGoel@uamail.albany.edu An: aisworld@lists.aisnet.org
CALL FOR PAPERS 5th Annual Symposium on Information Assurance (ASIA '10) and 13th Annual New York State Cyber Security Conference June 16-17, 2010, Empire State Plaza (Albany, NY) Website: http://www.albany.edu/iasymposium
IMPORTANT DATES Paper Submission Deadline January 31, 2010 Reviewer Feedback February 28, 2010 Final Paper Submission March 15, 2010
SYMPOSIUM GENERAL CHAIR: Sanjay Goel Director of Research, NYS Center for Information Forensics and Assurance(CIFA) Associate Professor, School of Business University at Albany, State University of New York BA 310b, 1400 Washington Ave. Albany, NY 12222 PH: (518) 442-4925 Email: goel@albany.edu
SYMPOSIUM CO-CHAIR: Laura Iwan NY State Information Security Officer, NY State Office of Cyber Security & Critical Infrastructure Coordination
OVERVIEW: Authors are invited to submit original and unpublished papers to the 5th Annual Symposium on Information Assurance. Accepted papers will appear in the symposium proceedings and selected papers may be selected for a journal. This symposium is jointly held with the 13th Annual New York State Cyber Security Conference. This two-day event attracts practitioners, researchers, and vendors providing opportunities for business and intellectual engagement among attendees. The symposium is organized by the School of Business and the NYS Center for Information Forensics and Assurance (CIFA) at the University at Albany, State University of New York, as well as the NYS Office of Cyber Security and Critical Infrastructure Coordination. There is no registration fee for authors of accepted papers. All participants in ASIA '10 will also be able to attend the rest of the NYS Cyber Security Conference sessions.
SUGGESTED TOPICS (but not limited to): Cyber Warfare Information Assurance Security Data Collection and Analysis Linguistic Analysis for Security and Intelligence Internet-based Terrorism and Espionage Reverse Engineering of Viruses and Worms Security Policy Implementation& Compliance Botnet Detection and Prevention Information Security Risk Management Self-organization based Security Models Economics of Information Security Biological Models of Security Computer& Network Forensics Network Security and Intrusion Detection Computer Crime and Digital Forensics Security in the Cloud / Distributed Systems Forensic Accounting and Fraud Detection Curriculum Development in Information Security Digital Rights Management Privacy& Security
SUBMISSION CATEGORIES: Submissions can be made in a number of categories: Completed research papers, research-in-progress papers, case studies, and panel proposals/round table discussions. Please follow the following guidelines in preparing your submission. 1. Completed Research Papers: Typically 5,000 words long (excluding abstract and references). 2. Research in Progress Papers: Typically 2,500 words (excluding abstract and references). 3. Case Studies: Typically between 3,000 and 5,000 words long. 4. Round Table Discussion: Typically a 1,000 word synopsis of the topic area. 5. Panel Proposals: Typically a 1,000 word description, identifying the panelists to be involved.
SUBMISSION GUIDELINES: 1. Submitted papers must not have been previously published, or currently under consideration for publication elsewhere, or have substantial overlap with papers the author has submitted elsewhere. 2. Submissions undergo a double-blind peer review process. 3. Papers selected for presentation will be published in formal proceedings. Arrangements are also being made with journals to publish extended versions of selected papers from the symposium. 4. Papers in the topic areas discussed are preferred, although contributions outside those topics may also be of interest. Please feel free at any time to contact the symposium chair if you have questions regarding your submission. 5. Papers should be submitted via email to the chair at goel@albany.edu in IEEE format and should include the following: a) Separate title page (in plain text) with Title, Name(s) of authors, Organizational affiliation(s), telephone and fax number(s), postal address(es), and email address(es), Author to contact for correspondence about the paper. b) Abstract (less than 250 words) c) Paper including a brief biography of each author as appropriate at the end of the paper
TECHNICAL PROGRAM COMMITTEE: Arun Lakhotia, University of Louisiana at Lafayette Anil B. Somayaji, Carleton University, Canada George Berg, University at Albany, SUNY Jeffrey Carr, GreyLogic Hemantha Herath, Brock University Melissa Dark, Purdue University John Crain, ICANN Gurpreet Dhillon, Virginia Commonwealth University Ronald Dodge, United States Military Academy Hemantha Herath, Brock University Hong C. Li, Intel Corporation Martin Loeb, University of Maryland Raghu T. Santanam, Arizona State University Saeed Abu Nimeh, Websense Inc. Billy Rios, Microsoft Corporation Michael Sobolewski, Texas Tech University R. Sekar, Stony Brook University, SUNY S. S. Ravi, University at Albany, SUNY Raj Sharman, University at Buffalo, SUNY Rahul Singh, University of North Carolina, Greensboro Billy Rios, Microsoft M.P. Gupta, Indian Institute of Technology, Delhi Dipankar Dasgupta, University of Memphis Daniel Rice, Loyola College Stephen F. Bush, GE Global Research Center Shambhu J. Upadhyaya, University at Buffalo, SUNY
____________________________________________________________ Director of Research, NYS Center for Information Forensics and Assurance Associate Professor, Information Technology Management, School of Business University at Albany, State University of New York Business Administration 310b, 1400 Washington Ave. Albany, NY 12222 PH: (518) 442-4925 FX: (518) 442-2568 http://www.albany.edu/~goel
_______________________________________________ AISWorld mailing list AISWorld@lists.aisnet.org