posted by user: goel || 8503 views || tracked by 10 users: [display]

ASIA 2011 : 6th Annual Symposium on Information Assurance (held jointly with the NYS Cyber Security Conference)

FacebookTwitterLinkedInGoogle

Link: http://www.albany.edu/iasymposium/index.shtml
 
When Jun 7, 2011 - Jun 8, 2011
Where Empire State Plaza, Albany, NY
Submission Deadline Feb 15, 2011
Notification Due Mar 15, 2011
Final Version Due Mar 31, 2011
Categories    security   information security   network security   forensics
 

Call For Papers

CALL FOR PAPERS - 6th Annual Symposium on Information Assurance (ASIA '11)
14th Annual New York State Cyber Security Conference
Empire State Plaza, Albany, NY
June 7-8, 2011

WEBSITES:
http://www.albany.edu/iasymposium (ASIA - for academic peer-reviewed
presentations & proceedings)
http://www.cscic.state.ny.us/security/conferences/security/2011/2011call.cfm(Cyber Security Conference - for practitioner presentations)

IMPORTANT DATES
Paper Submission Deadline February 15, 2010
Reviewer Feedback March 15, 2011
Final Paper Submission March 31, 2011
Symposium Dates June 7-8, 2011

Authors are invited to submit original and unpublished papers to the 6th Annual Symposium on Information Assurance. Accepted papers will appear in the symposium proceedings. This symposium is jointly held with the 14th Annual New York State Cyber Security Conference. This two-day event attracts practitioners, researchers, and vendors providing opportunities for business and intellectual engagement among attendees. The symposium is organized by the University at Albany, State University of New York, the NYS Division of Homeland Security and Emergency Services Office of Cyber Security (OCS), and the NYS Forum. There is no registration fee for authors of accepted papers.

All participants in ASIA '11 will also be able to attend the rest of the NYS Cyber Security Conference sessions.

In the past, the NYS Cyber Security Conference and ASIA have had excellent keynote speakers such as Larry Ponemon from the Ponemon Institute; Billy Rios from Google; Philip Reitinger, the Deputy Under Secretary of the National Protection and Programs Directorate (NPPD), U.S. Department of Homeland Security; and Raphael Perl, Head, Action
Against Terrorism Unit, Office of Security Cooperation in Europe among others.

In addition to the keynotes, we have had wonderful presenters including top information security officials, consultants, policy developers and analysts, and researchers from a myriad of well-known institutions. This includes the Lance Spitzer of Honeytech; Johnny Starrunner from the FBI Cyber Division, Deputy Director of the Office of SAFETY Act Implementation, Science and Technology Directorate, Department of Homeland Security; the Lead for Cyber, Public Sector, Global Business Services, IBM; National Security and Emergency Preparedness Department, U.S. Chamber of Commerce; Team Cymru; M&T Bank Corporation, Principal Architect for the Microsoft Malware Protection Center (MMPC), Microsoft; Identity Force; Booz Allen Hamilton; LexisNexis; President, EMPACT America; Anti-Phishing Working Group, Greylogic, Nassau County District Attorney's Office; General Electric; NYS Attorney General's Office, NYS Department of Health; Computer Crime Unit, USPS Office of the Inspector General, National Institute of Standards and Technology, and the PCI Security Standards Council.

Suggested topics for submission of papers are listed below (but not limited to): Cyber Warfare, Information Assurance, Security Data Collection and Analysis, Linguistic Analysis for Security and Intelligence, Internet-based Terrorism and Espionage, Reverse Engineering of Viruses and Worms, Security Policy Implementation & Compliance, Botnet Detection and Prevention, Information Security Risk Management, Self-organization Based Security Models, Economics of Information Security, Biological Models of Security, Computer & Network Forensics, Network Security and Intrusion Detection, Computer Crime and Digital Forensics, Security in the Cloud / Distributed Systems, Forensic Accounting and Fraud Detection,Curriculum Development in Information Security, Digital Rights Management, Privacy & Security, Smart Grid / Critical Infrastructure Security

SUBMISSION CATEGORIES
Submissions can be made in a number of categories: Completed research papers, research-in-progress papers, case studies, and panel proposals/round table discussions. Please follow the following guidelines in preparing your submission.

* Completed Research Papers: Typically 5,000 words long (excluding abstract and references).
* Research in Progress Papers: Typically 2,500 words (excluding abstract and references).
* Case Studies: Typically between 3,000 and 5,000 words long.
* Round Table Discussion: Typically a 1,000 word synopsis of the topic area.
* Panel Proposals: Typically a 1,000 word description, identifying the panelists to be involved.


SUBMISSION GUIDELINES
1. Submitted papers must not have been previously published, or currently under consideration for publication elsewhere, or have substantial overlap with papers the author has submitted elsewhere.
2. Submissions undergo a double-blind peer review process.
3. Papers selected for presentation will be published in formal proceedings. Arrangements are also being made with journals to publish extended versions of selected papers from the symposium.
4. Papers in the topic areas discussed are preferred, although contributions outside those topics may also be of interest. Please feel free at any time to contact the symposium chair if you have questions regarding your submission.
5. Papers should be submitted via email to the chair at goel@albany.edu in IEEE format and should include the following:
a) Separate title page (in plain text) with Title, Name(s) of authors, Organizational affiliation(s), telephone and fax number(s), postal address(es), and email address(es), Author to contact for correspondence about the paper. b) Abstract (less than 250 words) c) Paper including a brief biography of each author as appropriate at the end of the paper


SYMPOSIUM CHAIR
Sanjay Goel
Director of Research, NYS Center for Information Forensics and Assurance (CIFA)
Associate Professor, School of Business University at Albany, State
University of New York
BA 310b, 1400 Washington Ave. Albany, NY 12222
PH: (518) 442-4925
Email: goel@albany.edu

SUBMISSIONS CHAIR
Damira Pon
Senior Research Analyst, NYS Center for Information Forensics and
Assurance (CIFA)
University at Albany, State University of New York
1400 Washington Ave. Albany, NY 12222
PH: (518) 442-4925
Email: damira@gmail.com

2011 TECHNICAL PROGRAM COMMITTEE
Anil B. Somayaji, Carleton University, Canada; Boleslaw Szymanski, Rensselaer Polytechnic University; George Berg, University at Albany, State University of New York; Jeffrey Carr, GreyLogic; Gurpreet Dhillon, Virginia Commonwealth University; Ronald Dodge, United States Military Academy West Point; Hemantha Herath, Brock University; Hong C. Li, Intel Corporation; Martin Loeb, University of Maryland; Alvaro Ortigosa, Autonoma Universidad de Madrid; Billy Rios, Google, Inc.; S. Ravi, University at Albany, State University of New York; Raj Sharman, University at Buffalo, State University of New York; M.P. Gupta, Indian Institute of Technology, Delhi, India; Dipankar Dasgupta, University of Memphis; Daniel O. Rice, Technology Solutions Experts, Inc.; Stephen F. Bush, GE Global Research Center; Shambhu J. Upadhyaya, University at Buffalo, State University of New York; Teju Herath, Brock University; Stelios Sidiroglou-Douskos, MIT; Shiu-Kai Chin, Syracuse University; Sumita Mishra, Rochester Institute of Technology

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
IEEE-Ei/Scopus-CNIOT 2025   2025 IEEE 6th International Conference on Computing, Networks and Internet of Things (CNIOT 2025) -EI Compendex
MSEJ 2024   Advances in Materials Science and Engineering: An International Journal
Hong Kong-MIST 2025   2025 Asia-Pacific Conference on Marine Intelligent Systems and Technologies (MIST 2025)
SECRYPT 2025   22nd International Conference on Security and Cryptography
NeurIPS 2025   Annual Conference on Neural Information Processing Systems
ICISSP 2025   11th International Conference on Information Systems Security and Privacy
IEIJ 2024   Informatics Engineering, an International Journal
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing