jeudi 2 janvier 2014

4ème Edition des Journées Nationales de la Sécurité (JNS4) - 4th Edition of National Security Days

4th Edition of National Security Days
4èmeEdition des Journées Nationales de la Sécurité (JNS4)
FS-Tetuan - May, 12 - 13 2014
With the partnership of IEEE Morocco Section
*******************************
Submission deadline: February 15, 2014
***************************************

Call For Papers

We have the real pleasure to invite you to submit a paper to the 4th National Security Days (Journées Nationales de la Sécurité : JNS) which is taking place in Tetuan-Morocco, in May 12-13, 2014.
We are planning that all accepted papers will be included in the conference proceedings. English versions of accepted and presented papers will be submitted to IEEE for potential publication in the IEEE Xplore. IEEE reserves the right to not publish any proceedings not meeting its quality standards.
JNS4 is organized with the objective to bring together researchers and practitioners working on the information systems security field. A wide range of topics is covered by JNS, ranging from security management to security policies formalization, while integrating trust management systems, network security solutions, crypto-systems, together with newer topics such as security issues in cloud computing, collaborative systems, mobile applications, critical infrastructures, etc.

TOPICS:

Security Policies Formalization & Security and Trust Management

Security Policies, Formal methods & verification,
Digital Identity,
Access Control Models,
Trust management systems, Public-Key Infrastructures (PKI), Reputation systems
Risk Analysisthreats and vulnerabilities
Metrology, measurement of security
Privacy Protection
Organizational, juridical and ethical Aspects of Security
Information Systems Security and Governance, …
Network and Application Security
Security of e-commerce, e-government, e-health,…
Web Applications Security
Intrusion Detection, Honeypots, Malware prevention
Embedded Systems Security, smartcards security,...
Authentication and biometric Access Control
Wired, Mobile and Next Generation Networks Security,…
Cloud Computing and Collaborative Systems Security
Cloud Computing Security
Virtualization and Security
Web Services, midellewares and Security
Peer to Peer and distributed systems Security
Social Networks Security and Privacy
Workflow and Collaborative Systems Security, …
Cryptology, Watermarking & Steganography
Steganography, Watermarking
Secret-key & public-key Cryptography (Encryption, Hash functions, electronic signatures, ...)
Elliptic Curve Cryptography
Quantum Cryptography
Cryptanalysis, security proofs
- Cryptographic Protocols
- etc.
This topic list is not meant to be exhaustive; so any contribution related to networks and information systems security is welcome. Presentations of practical deployment and implementations of security techniques in new application areas are particularly encouraged.
Submissions from both industry and institutional circles will be considered with particular interest.

Paper Submission and publication
We invite Research Papers submission to the conference which should not exceed 6 pages using the IEEE Conference Template (Word, Latex) without page numbers. Papers will be peer-reviewed (by at least 3 reviewers), and selected based on their originality, technical strength and topical relevance. One of the authors of an accepted submission must attend the conference and present their work as a condition of publication. A dedicated session of the conference will be held for the presentation of posters. The full papers should be submitted in PDF format to the JNS'4 EasyChair online submission system.
The following instructions should be respected:
  1. Authors should make sure that the English of their papers (that will be published) meets the required standard.
  2. No hyperlinks should be included in the document (e. g., clickable website addresses in the references).
  3. The quality of figures, photos and tables is also a very important requirement for the publication.
  4. It is also the obligation of the authors to make sure that all sources of the research used in their papers have been adequately referenced.

DEADLINES

  • Submission deadline: February 15, 2014
  • Notification to authors: March 15, 2014
  • Final version due: January March 30, 2014
  • JNS’4 Conference: May 12-13, 2014

CONTACT

Contact: jns4@uae.ma

mercredi 1 janvier 2014

META'2014 International Conference on Metaheuristics and Nature Inspired Computing

***************************************************************
                          META'2014
International Conference on Metaheuristics and Nature Inspired Computing

            27-31 Oct 2014
            Marrakech, Morocco

      http://meta2014.sciencesconf.org/

********************************************************************************

The 5th International Conference on Metaheuristics and Nature Inspired Computing META’14 will held in Marrakech, Morocco from 27 to 31 Oct 2014.

The Conference will be an exchange space thanks to the sessions, tutorials, workshops and a vocational training of metaheuristics and nature inspired computing.

The scope of the META’2014 conference includes, but is not limited to:
    * Local search, tabu search, simulated annealing, VNS, ILS, …
    * Evolutionary algorithms, swarm optimization, scatter search, …
    * Emergent nature inspired algorithms: quantum computing, artificial immune systems, bee colony, DNA computing, …
    * Parallel algorithms
    * Hybrid methods with machine learning, game theory, mathematical programming, constraint programming, co-evolutionary, …
    * Application to: logistics and transportation, networks, scheduling, data mining, engineering design, energy, cloud, bio-medical, …
    * Theory of metaheuristics, landscape analysis, convergence, problem difficulty, very large neighbourhoods, …
    * Multi-objective optimization, bi-level optimization
    * Dynamic optimization, problems with uncertainty, …
    * Parameter tuning (static, dynamic, adaptive, self-adaptive)
    * Software frameworks for metaheuristics and nature inspired computing


Submission papers:
_________________

- Submission of papers should be in shape of an abstract of two pages sent before the 9th May 2014 via the website.
- Proceedings of the conference will be provided. Selected papers will be published in international journals (ISI journals).
- Predefined styles are available on the website http://meta2014.sciencesconf.org/
- Proposals for invited sessions, workshops and tutorials: Deadline 26th April 2014. 

contact talbi@lifl.fr - ellaia@emi.ac.ma


R. Ellaia (Co-Chair)