210 likes | 226 Views
SIN Conferences - Then and Now. Atilla ELCI Aksaray University , Turkey. International Conference on Security of Information and Networks : 12-15 September 2019, Marins Park Hotel, Sochi , Russia (SIN 2019)
E N D
SIN Conferences-ThenandNow Atilla ELCI Aksaray University, Turkey
International Conference on Security of Information and Networks: • 12-15 September 2019, Marins Park Hotel, Sochi, Russia (SIN 2019) • 10-12 September 2018, Cardiff University, Cardiff, Wales, UK (SIN 2018) • 13-15 October 2017, ManipalUniv. Jaipur, Jaipur, Rajasthan, India (SIN 2017) • 20-22 July 2016, Rutgers University, New Jersey, USA(SIN 2016). • 8-10 September 2015, Sochi, Russia (SIN 2015). • 9-11 September 2014, Glasgow, United Kingdom (SIN 2014). • 26-28 November 2013, Aksaray, Turkey (SIN 2013). • 22-27 October 2012, Jaipur, India (SIN 2012). • 14-19 November 2011, Sydney, Australia (SIN 2011). • 7-11 September 2010, Taganrog, Rostov Region, Russia (SIN 2010). • 6-10 October 2009, Gazimagusa, TRNC, North Cyprus (SIN 2009). • 8-10 May 2007, Gazimagusa, TRNC, North Cyprus (SIN 2007). SIN Conferences- past
Proceedings of the International Conferences on Security of Information and Networks: • SIN ’19: pending ACM DL upload • SIN ‘18 • SIN ‘17 • SIN '16 • SIN '15 • SIN '14 • SIN '13 • SIN '12 • SIN '11 • SIN '10 • SIN '09 • SIN ’07 @Trafford Publishing • Proceedings of all SIN Conferences are also listed in DBLP. Procs at ACM Digital Library
12th International Conference on Security of Information andNetworks • SubmissionReviewed: 53 • Full Papers:17 • Short Papers:12 • Extended Abstract:- • Full paperacceptanceratio: < 32 % SIN 2019-Submissions
Sıddıka Berna ÖrsYalçın: • System on Chip Design for Secure Internet of Things • Igor V. Kotenko: • Situational Awareness for Cyber Defense: security analysis, attack modeling,and selection of countermeasures KeynoteSpeakers- 2019
11th International Conference on Security of Information andNetworks • SubmissionReviewed: 42 • Full Papers:15 • Short Papers:9 • Extended Abstract:7 • Full paperacceptanceratio: < 36 % SIN 2018-Submissions
Edgar Weippl: • Distributed Ledger Technology, Blockchain & Crypto Currencies – Hype & anOpportunity for Interdisciplinary Research • Dr. Surya Nepal: • Building Trustworthy IoT-Cloud Data Lifecycle • Atilla Elçi: • Unavoidable Rise of Blockchain- Yet, How Far? KeynoteSpeakers- 2018
10th International Conference on Security of Information andNetworks • SubmissionReviewed: 143 • Full Papers: 25 • Short Papers:16 • Extended Abstract: 12 • Full paperacceptanceratio: < 18 % SIN 2017-Submissions
Dr. KD Nayak: • India's Cyber Security Challenges and Opportunities • Prof. Bimal Kumar Roy: • SelectedSharingandMatroids • Prof. Suraj C. Kothari: • Software Security Headaches: Analgesic or Hospital? • Dr. AkkaZemmari: • Android Malware: Will machine learning be help in hand? KeynoteSpeakers- 20171/2
Prof. MohamedMosbah: • Models and Approaches for the Safety and the Security of Distributed Systems • Dr. PriyadarsiNanda: • Software Defined Perimeter : "A new way to protect Network Systems against Cyber Threats" • Dr. MauroConti: • Can't You Hear Me Knocking: Novel Security and Privacy Threats to Mobile Users • Sushmita Ruj: • Blockchains for Secure Data Storage KeynoteSpeakers- SIN 2017 2/2
BhavaniThuraisingham: • Scienceof Data Security • Eugene H. Spafford: • Stepping Back From Cyber Security KeynoteSpeakers- SIN 2016
RonPoet: • The Use of Mobile Devices in Authentication • RamkiThurimella: • Some new results in keyless jam resistance communication (Joint work with Hamid Hanifi and Leemon Baird) • Alexander Barabanov, AlexeyMarkov: • Modern trends in the regulatory framework of the information security conformity assessment in Russia based on Common Criteria • AlexeyZhukov: • Lightweight cryptography: modern development paradigms KeynoteSpeakers- SIN 2015
Chris Johnson: • Improving the Cyber-security of Safety-Critical Systems • ChrisHankin: • Games and Industrial Control Systems • Bill Buchanan: • Complete Anatomy of Heartbleed, TrueCrypt and Large-scale Vulnerabilities • JaideepVaidya: • Preserving Privacy in Collaborative Optimization • Bill Hargenrader: • Advances In Continuous Monitoring As an Integrated Component of Cybersecurity Management • Atilla Elci: • Isn’t the time ripe for a standard ontology on security of information and networks? KeynoteSpeakers- SIN 2014
Georges Ataya: • Information Security and Risk Governance and Management Frameworks. An Overview of COBIT 5 • LudmilaBabenko: • Analysis of GOST 28147-89 Security: Methods and Algorithms • BartPreneel: • The SHA-3 Competition: Lessons Learned • Erkay Savaş: • Attacks on implementation of Cryptographic Algorithms: Fault and Side-Channel Attacks • Ali Aydın Selçuk: • Trusting SSL in Practice • RudrapatnaShyamasundar: • Security and Protection of SCADA: A Bigdata Algorithmic Approach • Edgar Weippl: • Social Engineering Attacks on the Knowledge Worker and the Digital Native KeynoteSpeakers- SIN 2013
T. A. Gonsalves: • Innovation for a Better India • R.K.Shyamasundar: • Security and Privacy in Smart Grids: An Overview • RaghuIyer: • Network Managment and Security Challenges faced by Organizations adopting BYOD • DebrataNayak: • Security Issues and Its Implication in Cloud Computing • V. Kamakoti: • SecureSystemsEngineering • RakeshKharwal: • BuildingResilientCyberDefense KeynoteSpeakers- SIN 2012 1/2
AlexLiu: • High Speed Regular Expression Matching using Small TCAMS • AnishMathuria: • Malicious Insiders in Group Key Exchange Protocols and its Implications in Cloud Computing • PierangelaSamarati: • Privacy and Data Protection in Cloud Scenarios • VincenzoPiuri: • Biometrics Privacy: Technology and Applications • OlegMakarevich: • Scientific, Methodological and Infrastructural Support of Lifelong IT-Security Education at SFedU • Christian W. Probst: • From Organizational Models to Attacks KeynoteSpeakers- SIN 2012 2/2
VijayVaradharajan: • RethinkingCyber Security • KevinKwiat: • Fault Tolerance for Fight-Through: A Basis for Strategic Survival KeynoteSpeakers- SIN 2011
Josef Pieprzyk: • Evolution of CryptographicHashing • Alexander Tereshkin: • Evil Maid GoesAfter PGP Whole Disk Encryption KeynoteSpeakers- SIN 2010
Vijay VARADHARAJAN: • Evolution and Challenges in Trust and Security in Information System Infrastructures • Elisa BERTINO: • Assured Information Sharing - Concepts and Research Issues • Erdal CAYIRCI: • Deployed Sensor Networks and Their Security Challenges in Practice • Sorin Alexander HUSS: • Embedded Systems for IT Security Applications: Properties and Design Considerations KeynoteSpeakers- SIN 2009
BartPreneel: • ResearchChallenges in Cryptology • MarcJoye: • White-boxcryptography • ElisabethOswald: • Power Analysis Attacks—A VeryBriefIntroduction • Çetin Kaya KOÇ: • Micro-Architectural Side-Channel Attacks & BranchPrediction Attack • Mehmet Ufuk ÇAĞLAYAN: • Secure Routing in Ad Hoc Networks and Model Checking • Karthik BHARGAWAN: • Web Services Security: Protocols, Implementations, andProofs KeynoteSpeakers- SIN 2007
Questions? Thankyouforlistening