1 / 21

SIN Conferences - Then and Now

SIN Conferences - Then and Now. Atilla ELCI Aksaray University , Turkey. International Conference on Security of Information and Networks : 12-15 September 2019, Marins Park Hotel, Sochi , Russia (SIN 2019)

schmidta
Download Presentation

SIN Conferences - Then and Now

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. SIN Conferences-ThenandNow Atilla ELCI Aksaray University, Turkey

  2. International Conference on Security of Information and Networks: • 12-15 September 2019, Marins Park Hotel, Sochi, Russia (SIN 2019) • 10-12 September 2018, Cardiff University, Cardiff, Wales, UK (SIN 2018) • 13-15 October 2017, ManipalUniv. Jaipur, Jaipur, Rajasthan, India (SIN 2017) • 20-22 July 2016, Rutgers University, New Jersey, USA(SIN 2016). • 8-10 September 2015, Sochi, Russia (SIN 2015). • 9-11 September 2014, Glasgow, United Kingdom (SIN 2014). • 26-28 November 2013, Aksaray, Turkey (SIN 2013). • 22-27 October 2012, Jaipur, India (SIN 2012). • 14-19 November 2011, Sydney, Australia (SIN 2011). • 7-11 September 2010, Taganrog, Rostov Region, Russia (SIN 2010). • 6-10 October 2009, Gazimagusa, TRNC, North Cyprus (SIN 2009). • 8-10 May 2007, Gazimagusa, TRNC, North Cyprus (SIN 2007). SIN Conferences- past

  3. Proceedings of the International Conferences on Security of Information and Networks: • SIN ’19: pending ACM DL upload • SIN ‘18 • SIN ‘17 • SIN '16 • SIN '15 • SIN '14 • SIN '13 • SIN '12 • SIN '11 • SIN '10 • SIN '09 • SIN ’07 @Trafford Publishing • Proceedings of all SIN Conferences are also listed in DBLP. Procs at ACM Digital Library

  4. 12th International Conference on Security of Information andNetworks • SubmissionReviewed: 53  • Full Papers:17 • Short Papers:12 • Extended Abstract:- • Full paperacceptanceratio: < 32 % SIN 2019-Submissions

  5. Sıddıka Berna ÖrsYalçın: • System on Chip Design for Secure Internet of Things • Igor V. Kotenko: • Situational Awareness for Cyber Defense: security analysis, attack modeling,and selection of countermeasures KeynoteSpeakers- 2019

  6. 11th International Conference on Security of Information andNetworks • SubmissionReviewed: 42  • Full Papers:15 • Short Papers:9 • Extended Abstract:7 • Full paperacceptanceratio: < 36 % SIN 2018-Submissions

  7. Edgar Weippl: • Distributed Ledger Technology, Blockchain & Crypto Currencies – Hype & anOpportunity for Interdisciplinary Research • Dr. Surya Nepal: • Building Trustworthy IoT-Cloud Data Lifecycle • Atilla Elçi: • Unavoidable Rise of Blockchain- Yet, How Far? KeynoteSpeakers- 2018

  8. 10th International Conference on Security of Information andNetworks • SubmissionReviewed: 143  • Full Papers: 25 • Short Papers:16 • Extended Abstract: 12 • Full paperacceptanceratio: < 18 % SIN 2017-Submissions

  9. Dr. KD Nayak: • India's Cyber Security Challenges and Opportunities • Prof. Bimal Kumar Roy: • SelectedSharingandMatroids • Prof. Suraj C. Kothari: • Software Security Headaches: Analgesic or Hospital? • Dr. AkkaZemmari: • Android Malware: Will machine learning be help in hand? KeynoteSpeakers- 20171/2

  10. Prof. MohamedMosbah: • Models and Approaches for the Safety and the Security of Distributed Systems • Dr. PriyadarsiNanda: • Software Defined Perimeter : "A new way to protect Network Systems against Cyber Threats" • Dr. MauroConti: • Can't You Hear Me Knocking: Novel Security and Privacy Threats to Mobile Users • Sushmita Ruj: • Blockchains for Secure Data Storage KeynoteSpeakers- SIN 2017 2/2

  11. BhavaniThuraisingham: • Scienceof Data Security • Eugene H. Spafford: • Stepping Back From Cyber Security KeynoteSpeakers- SIN 2016

  12. RonPoet: • The Use of Mobile Devices in Authentication • RamkiThurimella: •  Some new results in keyless jam resistance communication (Joint work with Hamid Hanifi and Leemon Baird) • Alexander Barabanov, AlexeyMarkov: •  Modern trends in the regulatory framework of the information security conformity assessment in Russia based on Common Criteria • AlexeyZhukov: • Lightweight cryptography: modern development paradigms KeynoteSpeakers- SIN 2015

  13. Chris Johnson: • Improving the Cyber-security of Safety-Critical Systems • ChrisHankin: • Games and Industrial Control Systems • Bill Buchanan: • Complete Anatomy of Heartbleed, TrueCrypt and Large-scale Vulnerabilities • JaideepVaidya: • Preserving Privacy in Collaborative Optimization • Bill Hargenrader: • Advances In Continuous Monitoring As an Integrated Component of Cybersecurity Management • Atilla Elci: • Isn’t the time ripe for a standard ontology on security of information and networks? KeynoteSpeakers- SIN 2014

  14. Georges Ataya: •  Information Security and Risk Governance and Management Frameworks. An Overview of COBIT 5 • LudmilaBabenko: • Analysis of GOST 28147-89 Security: Methods and Algorithms • BartPreneel: • The SHA-3 Competition: Lessons Learned • Erkay Savaş: • Attacks on implementation of Cryptographic Algorithms: Fault and Side-Channel Attacks • Ali Aydın Selçuk: • Trusting SSL in Practice • RudrapatnaShyamasundar: • Security and Protection of SCADA: A Bigdata Algorithmic Approach • Edgar Weippl: • Social Engineering Attacks on the Knowledge Worker and the Digital Native KeynoteSpeakers- SIN 2013

  15. T. A. Gonsalves: • Innovation for a Better India • R.K.Shyamasundar: • Security and Privacy in Smart Grids: An Overview • RaghuIyer: • Network Managment and Security Challenges faced by Organizations adopting BYOD • DebrataNayak: • Security Issues and Its Implication in Cloud Computing • V. Kamakoti: • SecureSystemsEngineering • RakeshKharwal: • BuildingResilientCyberDefense KeynoteSpeakers- SIN 2012 1/2

  16. AlexLiu: • High Speed Regular Expression Matching using Small TCAMS • AnishMathuria: • Malicious Insiders in Group Key Exchange Protocols and its Implications in Cloud Computing • PierangelaSamarati: • Privacy and Data Protection in Cloud Scenarios • VincenzoPiuri: • Biometrics Privacy: Technology and Applications • OlegMakarevich: • Scientific, Methodological and Infrastructural Support of Lifelong IT-Security Education at SFedU • Christian W. Probst: • From Organizational Models to Attacks KeynoteSpeakers- SIN 2012 2/2

  17. VijayVaradharajan: • RethinkingCyber Security • KevinKwiat: • Fault Tolerance for Fight-Through: A Basis for Strategic Survival KeynoteSpeakers- SIN 2011

  18. Josef Pieprzyk: • Evolution of CryptographicHashing • Alexander Tereshkin: • Evil Maid GoesAfter PGP Whole Disk Encryption KeynoteSpeakers- SIN 2010

  19. Vijay VARADHARAJAN: • Evolution and Challenges in Trust and Security in Information System Infrastructures • Elisa BERTINO: • Assured Information Sharing - Concepts and Research Issues • Erdal CAYIRCI: • Deployed Sensor Networks and Their Security Challenges in Practice • Sorin Alexander HUSS: • Embedded Systems for IT Security Applications: Properties and Design Considerations KeynoteSpeakers- SIN 2009

  20. BartPreneel: • ResearchChallenges in Cryptology • MarcJoye: • White-boxcryptography • ElisabethOswald: • Power Analysis Attacks—A VeryBriefIntroduction • Çetin Kaya KOÇ: • Micro-Architectural Side-Channel Attacks & BranchPrediction Attack • Mehmet Ufuk ÇAĞLAYAN: • Secure Routing in Ad Hoc Networks and Model Checking • Karthik BHARGAWAN: • Web Services Security: Protocols, Implementations, andProofs KeynoteSpeakers- SIN 2007

  21. Questions? Thankyouforlistening

More Related