CALL FOR PAPERS
The 2024 International Conference on Security and Management (SAM’24)
Las Vegas, USA, July 22-25, 2024
http://sam.udmercy.edu/sam24/

You are invited to submit a full paper for consideration. All accepted
papers will appear in the SAM'24 conference proceedings published by
IEEE CPS (in printed book form; later, the proceedings will also be
accessible online). Papers should demonstrate significant contribution
to the construction, evaluation, application, or operation of secure
systems. Those interested in proposing workshops/sessions, should
refer to the "Call for Sessions/Workshops" section.

Accepted papers must be uploaded to the site that will be provided in
the paper acceptance email. One of the authors must present the
paper. There are three options for paper presentation. Please click on
Presentation Modes.

Topics of interest are listed below. Other topics not listed will also
be considered.

Network Security 

    Security Algorithms
    Mobile Network Security
    Security in CDN (Contents Distribution Networks)
    Virtual Private Network (VPN)
    Tracing Techniques in Internet
    Active Networks
    Security in Grid
    Web Monitoring
    Control Systems/SCADA Security
    Network Security Engineering
    Transport-Level Security
    Wireless Network Security
    IP Security
    Electronic Mail security

Cryptographic Technologies

    Security Protocols
    Key Management Techniques
    Cryptographic Technologies
    Applications of Block and Stream Ciphers
    Applications of Public Key Cryptology
    Message Authentication and Hash Functions
    Anonymity
    Digital Signature Schemes
    Secret Sharing
    Cryptanalysis

Security Management 

    Surveillance Technologies
    Security Policies
    Security for Protocol Management
    Location Management
    QoS Management
    Resource Management
    Channel Management
    Mobility Management
    Digital Contents Copyright Protection
    System Security Management
    Network Security Management
    Management in Network Equipment
    Storage Area Networks (SAN) Management
    Information Security Management
    Government Security Policy
    Web Penetration Testing
    Security Operations
    Vulnerabilities Management
    Change and Patch Management

Security Applications 

    Security in E-Commerce and M-Commerce
    Secure OS
    Watermarking
    High-Tech Systems at Airports
    Emerging Technologies and Applications
    Cloud Computing Security
    Database Security
    Data Mining Security
    Cyber Security Automation

Biometrics and Forensics 

    Novel Biometric Methods
    Forensics
    Biological Security Technologies
    Face Recognition Systems
    Signature Recognition Systems
    Cyber Forensics
    Forensic Analysis
    Biometric Technologies for Security
    Feature Extraction and Matching Algorithms

Hardware Security 

    Security in E-Commerce and M-Commerce
    Embedded Systems Security
    Cryptographic Processors and Co-Processors
    Security Architectures
    True and Pseudorandom Number Generators
    Side Channel Attacks
    Fault Attacks
    Hardware Tamper Resistance
    Smart Card Processors
    Secure Storage Devices

Information Assurance 

    Mission Assurance
    Risk Assessment and Risk Management
    Continuity of Operations and Business Impact Analysis
    Cyber Security Compliance
    Security Auditing
    Security-Savvy Software Development
    Disaster Recovery
    Business Continuity Analysis
    Access Control
    Secure Use of Software
    Secure Performance

Computer Security 

    Firewall Systems
    Hacking Techniques and Related Issues
    Intrusion Detection System (IDS)
    Honeypot
    Virus Issues (Detection, Prevention ...)
    Trusted Computing
    Alert Correlation
    Attack Graphs
    Incident Responding
    Malware Analysis
    Incident Responding
    Malware Analysis
    Intrusion Detection

Security Education 

    Computer Security Education
    Network Security Education
    Cyber Security Education
    Cyber Security Body of Knowledge
    Information Assurance Education

Paper Submission: April 15, 2024
Acceptance Notification: April 29, 2024
Camera-ready Submission: May 12, 2024
Registration: May 12, 2024
SAM'24 Conference: July 22-25, 2024

Submissions in doc, docx, or pdf format must be uploaded to the Paper
Evaluation site https://cmt3.research.microsoft.com/SAM2024 . SAM'24
uses the Microsoft Conference Management Tool (CMT). Papers should be
6-8 page long. If you are new to CMT, you should register first by
clicking on Register. Corresponding author needs to insert an ‘*’
after their last/family name.

When you see the Author Console, click on the '+' next to Create new
submission. The Create New Submission page will be displayed. Please
enter Title of paper, Abstract, add your Co-authors, if any, by
clicking on +Add, upload your file (paper), select your Primary Area
(the Track that your paper is addressing), and provide a minimum of 5
keywords separated by commas. All submissions must not have been
previously published or currently being considered by others for
publication.