From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail2-relais-roc.national.inria.fr (mail2-relais-roc.national.inria.fr [192.134.164.83]) by sympa.inria.fr (Postfix) with ESMTPS id 768EC824A7 for ; Mon, 10 Jun 2019 19:02:54 +0200 (CEST) Authentication-Results: mail2-smtp-roc.national.inria.fr; spf=None smtp.pra=saoussen.cheikhrouhou@redcad.org; spf=SoftFail smtp.mailfrom=saoussen.cheikhrouhou@redcad.org; spf=None smtp.helo=postmaster@mail-yw1-f68.google.com Received-SPF: None (mail2-smtp-roc.national.inria.fr: no sender authenticity information available from domain of saoussen.cheikhrouhou@redcad.org) identity=pra; client-ip=209.85.161.68; receiver=mail2-smtp-roc.national.inria.fr; envelope-from="saoussen.cheikhrouhou@redcad.org"; x-sender="saoussen.cheikhrouhou@redcad.org"; x-conformance=sidf_compatible Received-SPF: SoftFail (mail2-smtp-roc.national.inria.fr: domain of saoussen.cheikhrouhou@redcad.org is inclined to not designate 209.85.161.68 as permitted sender) identity=mailfrom; client-ip=209.85.161.68; receiver=mail2-smtp-roc.national.inria.fr; envelope-from="saoussen.cheikhrouhou@redcad.org"; x-sender="saoussen.cheikhrouhou@redcad.org"; x-conformance=sidf_compatible; x-record-type="v=spf1" Received-SPF: None (mail2-smtp-roc.national.inria.fr: no sender authenticity information available from domain of postmaster@mail-yw1-f68.google.com) identity=helo; client-ip=209.85.161.68; receiver=mail2-smtp-roc.national.inria.fr; envelope-from="saoussen.cheikhrouhou@redcad.org"; x-sender="postmaster@mail-yw1-f68.google.com"; x-conformance=sidf_compatible IronPort-PHdr: =?us-ascii?q?9a23=3AAb21/RyeHTm2EaPXCy+O+j09IxM/srCxBDY+r6Qd?= =?us-ascii?q?0ekRKfad9pjvdHbS+e9qxAeQG9mCsrQd1rCd6vi+EUU7or+5+EgYd5JNUxJXwe?= =?us-ascii?q?43pCcHRPC/NEvgMfTxZDY7FskRHHVs/nW8LFQHUJ2mPw6arXK99yMdFQviPgRp?= =?us-ascii?q?OOv1BpTSj8Oq3Oyu5pHfeQpFiCegbb9oMRm7rRvdusYLjYd+K6s61wfErGZPd+?= =?us-ascii?q?lK321jOEidnwz75se+/Z5j9zpftvc8/MNeUqv0Yro1Q6VAADspL2466svrtQLe?= =?us-ascii?q?TQSU/XsTTn8WkhtTDAfb6hzxQ4r8vTH7tup53ymaINH2QLUpUjms86tnVBnlgz?= =?us-ascii?q?ocOjUn7G/YlNB/jKNDoBKguRN/xZLUYJqIP/Z6Z6/RYM8WSXZEUstXSidPAJ6z?= =?us-ascii?q?b5EXAuUOPehWoYrzqUYQoxSiHgSjHv/jxyVSi3PqwaE30eIsGhzG0gw6GNIOtW?= =?us-ascii?q?zZosjpOakLX++70bTGwzrbYfhLxzrz6ofGfBMkr/+OQbx+aMTex0s2GQzLk16d?= =?us-ascii?q?rpflMCmS1uQQqGib9PRvVeS1h2E7qwF+vDmvxsQsionTgYIV11DE9SJkwIsuP9?= =?us-ascii?q?23VlN0bsK+H5RNrS2aMJF2Qsw7TmxupS00xLoGuZuhcygLzpQq3wTfZOKafIeU?= =?us-ascii?q?+B3sSfydITBihHJqYL6wmQy98VOgy+LgVsm7yldKrjBfntnLrHAN2ATf5daCSv?= =?us-ascii?q?Rj5EeuwzKP2B3c6uFeJkA0iLLbK4Y8wrErkpoTsF/DHi/3mEXwg6+abFkr+u+t?= =?us-ascii?q?6+j/ebXmvoWcN45yigHxLKsugNazDvkmPQUIQmOV+vy82aX98UHlRLhGlP47n6?= =?us-ascii?q?nDvJzHJMkXu7S1Dg5W34sl9h2xFS2p0M4CknkCNF9FeAyIj4zuO1zWJfD3F/a/?= =?us-ascii?q?g1C1nDZryfHKI6TtApvMI3XAirvhcrF960lTyAo3099T/Y5bCrYEIP7rW0/xss?= =?us-ascii?q?LXDgMhPgCq3+rqDM9x24AeVG6VH6OUMb7evUWJ6+8sO+WMYZUauDf5K/gr/f7u?= =?us-ascii?q?ino5lEcGfaaz2psXdWu4Hu94LEWfe3bjntcBHnkLvgo9TOzqklqCUSNTZ3a1Qq?= =?us-ascii?q?Ix/Ss7B5y7AojfXI+inaaN3CChHp1ZfmxGEEyDEW/0d4WYXPcBcD6dLdVkkjwA?= =?us-ascii?q?TLShT44h1QqytALh0LpmLu/U+jUCup751dh14ffTlRAo+jBuAcSdyTLFc2YhkW?= =?us-ascii?q?oNSiQe2KFkvVc70Eif0e1xivdYGNoV6/4NGgw0LbbdxfY8AMu0Rh+EdMzPRFvi?= =?us-ascii?q?Cs2hDTp0VN81ysMDb255Gs6+lR3ZwWyjCLpTkKaEQNQf0oOZ9l7XAPtb4Fvj+Y?= =?us-ascii?q?8dtHEiQ9BTLmC8mOh2/A2VAJTG1w2Unr2xaeEZ0SvH+X2Y5W6Pp11DFgp9F6zO?= =?us-ascii?q?G20cIgPTvN/+4kfPRrCzBK8PNwJAzcuLLO1XZMbiy19cAL/5I9ibbWWrhmKYDh?= =?us-ascii?q?eOy6jKYpCuM34QwyLHDEQsiAEc5nGIKU45HCjl627UEzt0EV7HaFiq7uhlozW2?= =?us-ascii?q?QlJwhwiFYkt9zJK+4VgIgPaXDf4fw/ZMszwqtHB9GFKV3dPNAN+Jpg4nda4afN?= =?us-ascii?q?B5qFdOzmHUswhVPpW7LK1mghgZaQsz92W06BJyB4MIxc5ws3QvwQxaIKmdllRb?= =?us-ascii?q?eGXclZXtPqHWI2b/+gyHeqfW3VbRytGL4rxJ4/M97x3ouwSxC1Yr73Rg1dBRlW?= =?us-ascii?q?CX55jMBwc6VZPqTl1x9hNxvLicZTMyo8v68FAkPLe5tCPZk4YkGuYj1g2IcdJS?= =?us-ascii?q?LbmDDAK0FNcVUYzmIvEunx2oNToFJuFOsqAue4upbfKawqeDOOd7gCngkGJGpZ?= =?us-ascii?q?h03k+W/S1mTKjE0tJNyPGZmwmAXSzUhVyk9MftlsQMfTwOBGu5xDTMBYhfYbd3?= =?us-ascii?q?dJoKCiGzJczyxtx7jYP3VDhU+RrrDFdD2dSgcxeWa1G4wBZdz18/pX28hTD+xD?= =?us-ascii?q?Vx1Tgi6LecmGTP2eHrMR4GIXJjRXNnhBLtJ5S5ldYTQEmvaQEt0hy/6gKyzK9d?= =?us-ascii?q?r7llNWTVSlZgeyntM3pvSLW9rPyefsMJ7pds+SBJXMy4YEuGUfj2uF0b1yfiGW?= =?us-ascii?q?xf33Y2eyzu8o3jmBM/jGubI154tzzEeNx7gxrT+ZiUSfNdwzEaSSB9zCLaA1m6?= =?us-ascii?q?NsOB/NOOlp6FvPr6H3mkX7VXdjPqxMWOrm/z7HB2ARqlhNi2k9zjFAE8lzL1zN?= =?us-ascii?q?IsXz+M5A7ieaHgzKD8KvhmOEJvARu04tJiAYx7uo8xn40Ln2QRndOU83tBlWLu?= =?us-ascii?q?d9lWner1aHcEQ3sPwsXJyBPu2UBlJX/P3Z+/UHHZitBoaNT/a2UQ3T875M1iDa?= =?us-ascii?q?6V6LlNm21uq1W16wXLbrw1mj4ByP0l73oejugGpQc25iCUA7QXFE8eICL3nFKC?= =?us-ascii?q?9ZT2kqZWIWKuaqSY2ER9nJatAfXK6A9VU228d4kvGzNrxsd+K1nJ2Xz3rIjvPs?= =?us-ascii?q?TTJ5pHuBSfiFLNkeVTNIkZlPsRji9uOGa7tHZj1u1tyVRn25e9oY6MJk1s+qy+?= =?us-ascii?q?GBtRKjz+fIYe5yvqlasYmdyZm8imBY9JETQNUYCuQ+jsWCoIsvuiMw+IHxU4q2?= =?us-ascii?q?yHAvzeGQue7kBntDTCH43vf36bPj8W1dFKRRyUKwpRmkRcVTM8mZgyGxuC38vq?= =?us-ascii?q?cUpl63UQ4FD/sB5F1uNxKhS6Xmqaqh2hbDw5DpaFaFJd5wRGokPUKtC27+RpHi?= =?us-ascii?q?ge8Ifl5AeEL2jebgJOCnwPUUGsBlb5P7Do68OEu82eC/b2KvLPZbSIpqRaVuyU?= =?us-ascii?q?jcaB941r4x6ON96EO3BjC7sy0QxeXiY9U/zDnB4IcGQSniPJbsiU7BO94TE/+t?= =?us-ascii?q?il9//sQyrt5JCEDrJTNZNm8FargvHHf8++oW5CCBkQ05oNwX7Ox/Ab3UUOw3Vv?= =?us-ascii?q?eTy2ELsovjWLUKnc3K5aWVpTWQ1UDvZtp6c13w1MP8GTjtLuyvYsnPAyEUpAfV?= =?us-ascii?q?7ggcqsbM0OZWi2ck7EUgLDHZXDHhLm+On1YLi3TLRRiKNdvFutunLTKG7MBR2l?= =?us-ascii?q?u3zNfxurMO9CnWeGNwcYvZy7NB1kTSDoV9+jYROjGNRsgHst3bMkwHjDcSYZID?= =?us-ascii?q?N1f0ZlrrqM6CpZhrN0HGkSwGBiKLy/sgGk1NL1DN49kdZKIQROsN96x0lyn6Bc?= =?us-ascii?q?6zxfX/Fz3iDSo99to0uhj+mI1xJ9XRZFozoNg5iE6xYxcZ7F/4VNDC6XtCkG6n?= =?us-ascii?q?+dXlFT/4M8V4/f/ptIw92Kr5rdbTdP99WOoJkZDsnQbdOYaT8vb0qvFznTAw8I?= =?us-ascii?q?CzWsMDOH3hAPoLSp7nSQ66MChN30gpNXEO1BWVA+H/9cDV5qToRbccVHGwg8mL?= =?us-ascii?q?vet/YmoH+3rR3fXsJf58qVTP+eCvzjbjGDgusfag=3D=3D?= X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0BQBwDKi/5cdEShVdFQFg6EQkKBBCiDV?= =?us-ascii?q?UCBHZFWhRePVockA1QJAQMBDBgBDAoBAYMJcUaCdhsMBS8TAQMBAQQBAQIBAQM?= =?us-ascii?q?BEwEKCwwHJyUMgjopAYJoBgEKEQYdAQESDAYCBQ0YDTcCAiISAQUBIQEBGhODC?= =?us-ascii?q?IIKD4wnkA48ii9xgTGCeQEBBYEFAYRigT0JEoEiiRSCSYFXP4ERhFSBRA4LAQI?= =?us-ascii?q?BGIEFG1SCXYJYi1sjnR8OBwIfgXIDW4VmjH4bgw6DEpB7jROBFIV/i1iCF4FRD?= =?us-ascii?q?yGBHCllgRR9QzEGgjUJgQ5UPINYM4RhhQQEOEEwAY1QglIBAQ?= X-IPAS-Result: =?us-ascii?q?A0BQBwDKi/5cdEShVdFQFg6EQkKBBCiDVUCBHZFWhRePVoc?= =?us-ascii?q?kA1QJAQMBDBgBDAoBAYMJcUaCdhsMBS8TAQMBAQQBAQIBAQMBEwEKCwwHJyUMg?= =?us-ascii?q?jopAYJoBgEKEQYdAQESDAYCBQ0YDTcCAiISAQUBIQEBGhODCIIKD4wnkA48ii9?= =?us-ascii?q?xgTGCeQEBBYEFAYRigT0JEoEiiRSCSYFXP4ERhFSBRA4LAQIBGIEFG1SCXYJYi?= =?us-ascii?q?1sjnR8OBwIfgXIDW4VmjH4bgw6DEpB7jROBFIV/i1iCF4FRDyGBHCllgRR9QzE?= =?us-ascii?q?GgjUJgQ5UPINYM4RhhQQEOEEwAY1QglIBAQ?= X-IronPort-AV: E=Sophos;i="5.63,576,1557180000"; d="scan'208,217";a="386742502" X-MGA-submission: =?us-ascii?q?MDEAoFkD4KNJhgfGhCV1oiMZ8X/RfRHDP8rGAW?= =?us-ascii?q?LevjHtU4xcMKN67HLUGkRGxhdNgm6UofYTYWwE3vSkGbuIMnro+lzarx?= =?us-ascii?q?09uqtcN1zOuedYIdnwoPZHQhxq0bybrB7zFBnMA8BEXgEV+GxrIOPTmm?= =?us-ascii?q?WIRPM6T53e46DMhnyGvqmSsQ=3D=3D?= Received: from mail-yw1-f68.google.com ([209.85.161.68]) by mail2-smtp-roc.national.inria.fr with ESMTP/TLS/AES128-GCM-SHA256; 10 Jun 2019 19:02:52 +0200 Received: by mail-yw1-f68.google.com with SMTP id k8so4072411ywh.0 for ; Mon, 10 Jun 2019 10:02:52 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redcad-org.20150623.gappssmtp.com; s=20150623; h=mime-version:from:date:message-id:subject:to; bh=VWPsFVMNQO1jSG1ZCmECTnJFHXkXvTz2bbVzK5lcPKQ=; b=mvUy2h6DrN6fGG8as8NVufNqGCeq+S54DTpjinPf7zl0rZML515TgrAVgqXJRZCVE8 Tyouq+6Z8dXqj1KQB/WFg1bgUv6ixBDB1h/8+MBzd6u8ntx3GfyKb02iGgrgo6uQFdqW vRUQP1mWyJrSMIoYj20cBkUP3tM5Nl53g0oHcK7W7CAMYUu7PF+js0BjHJukwChtiE55 o1wQPot9sN7zMQZhVBh8V/A+/ybZD8nGq4PIKJUPWvFOM7fS4npYIWuMEQwPX8qHTvmx U45MwyiEIB3VwkJQbaZLnPMHk+9mcpDCpmHe/SKStNFdWEy/0rQBV2K4Nh8u5e8ziKEV XyzA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=VWPsFVMNQO1jSG1ZCmECTnJFHXkXvTz2bbVzK5lcPKQ=; b=sJRyIdV1Fk7tpaOSuIz124KIep9T/RbBa6tjvWy7iWm7ihNifJdek+lw6Xt2D+vA2V awMQdvQWGTMLqFSdGZX6xR7uzUpYgGHRNl12WgxG1vsJ+VLudWr+ipq9aDewDsKAuS1g U0LiaNyjJbMpKd2HPk8L9Rk5ExMXdFea9Rf0ZLRn29RTFeaRq0ORMaZC/PBuo345LV1W xnWc13mSuVVuInfKpDpmMJz5vR9r2ebQRXddaaUWK5wELnoHYJ9WIw/hizQrpOmiD8D2 wb6fIrQ5t5tW0vSdDrm3lGt8QhQY2NxCaDlKIqIQTbvBx02HGHNuWub6gfnRyEHZz9Bu HO1Q== X-Gm-Message-State: APjAAAUWBmqwgx/o4ZCJsY3cxwSOba5Rx5+1aVZlrPk6cQrbyQNUBIXN SO01DRvsrB4o3mnrX3mO1G7q5WocG03USfWYKjAIDQ== X-Google-Smtp-Source: APXvYqx/qoZm1HW5WBzAbRJuusE0IaUM3lvpBateyc4I7I1YQwKpwhwpH0Z8JAvJuInwcSv026+G5/xI1E9WcQSJ5Pk= X-Received: by 2002:a81:6082:: with SMTP id u124mr27393444ywb.241.1560186170909; Mon, 10 Jun 2019 10:02:50 -0700 (PDT) MIME-Version: 1.0 From: SAOUSSEN CHEIKHROUHOU Date: Mon, 10 Jun 2019 18:03:29 +0100 Message-ID: To: games@lists.rwth-aachen.de, cfp@ibr.cs.tu-bs.de, podc-related@listserv.acm.org, CHI-ANNOUNCEMENTS@listserv.acm.org, easst-members@lists.le.ac.uk, mycolleagues@mailman.ufsc.br, rsd-forum@cines.fr, seworld@sigsoft.org, dbworld@cs.wisc.edu, agents@cs.umbc.edu, cscw-all@jiscmail.ac.uk, haskell@haskell.org, N2Women , multiagent@yahoogroups.com, computational.science@lists.iccsa.org, FME events , bull-i3@irit.fr, gratra@lists.uni-paderborn.de, chi-jobs@acm.org, petrinet@informatik.uni-hamburg.de, cl-isabelle-users@lists.cam.ac.uk, irma-list@irma-international.org, concurrency@listserver.tue.nl, mvd@lists.cs.illinois.edu, prog-lang@cs.uiuc.edu, deducteam-seminar@inria.fr, sma@loria.fr, authors@mailman.ufsc.br, pvs@csl.sri.com, appsem@lists.tcs.ifi.lmu.de, clean-list@science.ru.nl, sage-announce@mailman.sage.org, latincolleagues@mailman.ufsc.br, Vki-list@dfki.de, "facs-events@jiscmail.ac.uk" , announce@informatics-europe.org, asr@cines.fr, prog-lang@lists.illinois.edu, gdr.gpl@imag.fr, annonces@societe-informatique-de-france.fr, caml-list@inria.fr, caml-announce@inria.fr, Mnet mailing list , ProCoS mailing list , IFM SIG mailing list , ZFORUM mailing list , AI-SGES@jiscmail.ac.uk, SIGSAND-L@cliffy.ucs.mun.ca, cse-cfp@cse.stfx.ca, mycadm@hotmail.com Content-Type: multipart/alternative; boundary="000000000000805d14058afb26e5" Subject: [Caml-list] Deadline extension |CFP CRiSIS 2019 |Hammamet Tunisia --000000000000805d14058afb26e5 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Call for papers The 14th International Conference on Risks and Security of Internet and Systems (CRiSIS) 29-31 October 2019, Hammamet, Tunisia http://crisis2019.redcad.org The International Conference on Risks and Security of Internet and Systems 2019 will be the 14th in a series dedicated to security issues in Internet-related applications, networks and systems. Internet has become essential for the exchange of information between user groups and organizations from different backgrounds and with different needs and objectives. These users are exposed to increasing risks regarding security and privacy, due to the development of more and more sophisticated online attacks, the growth of Cyber Crime, etc. Attackers nowadays do not lack motivation and they are more and more experienced. To make matters worse, for performing attacks have become easily accessible. Moreover, the increasing complexity as well as the immaturity of new technologies such as pervasive, mobile and wireless devices and networks, raise new security challenges. In this context, new security mechanisms and techniques should be deployed to achieve an assurance level acceptable for critical domains such as energy, transportation, health, defence, banking, critical infrastructures, embedded systems and networks, avionics systems, etc. The CRiSIS conference offers a remarkable forum for computer and network security actors from industry, academia and government to meet, exchange ideas and present recent advances on Internet-related security threats and vulnerabilities, and on the solutions that are needed to counter them. =3D=3D=3D IMPORTANT DATES =3D=3D=3D - Submission deadline: June 21, 2019 (Extended) - Notification to authors: July 20, 2019 - Camera-ready versions: September 22, 2019 - Conference dates: October 29-31, 2019 =3D=3D=3D Special issue =3D=3D=3D Selected papers relevant to business, human and organisational aspects of cybersecurity will be invited to submit extended versions for publication in Information and Computer Security http://emeraldgrouppublishing.com/products/journals/journals.htm?id=3Dics =3D=3D=3D TOPICS =3D=3D=3D The topics addressed by CRiSIS range from the analysis of risks, attacks to networks and system survivability, to security models, security mechanisms and privacy enhancing technologies. The authors are invited to submit research results as well as practical experiment or deployment reports. Industrial papers about applications or case studies are also welcomed in different domains (e.g., telemedicine, banking, e-government, e-learning, e-commerce, critical infrastructures, mobile networks, embedded applications, etc.). The list of topics includes but is not limited to: - Analysis and management of risk - Attacks and defenses - Attack data acquisition and network monitoring - Cryptography, biometrics, watermarking - Dependability and fault tolerance of Internet applications - Distributed systems security and safety - Embedded system security and safety - Empirical methods for security and risk evaluation - Hardware-based security and physical security - Intrusion detection and prevention systems - Organizational, ethical and legal issues - Privacy protection and anonymization - Risk-aware access and usage control - Security and risk assessment - Security and risks metrics - Security and dependability of operating systems - Security and safety of critical infrastructures - Security and privacy of peer-to-peer system - Security and privacy of wireless networks - Security models and security policies - Security of new generation networks, security of VoIP and multimedia - Security of e-commerce, electronic voting and database systems - Security of social networks - Security of industrial control systems - Smartphone security and privacy - Traceability, metrology and forensics - Trust management - Use of smart cards and personal devices for Internet applications - Web and cloud security =3D=3D=3D PAPER SUBMISSION =3D=3D=3D Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be written in English and must be submitted electronically in PDF format. The papers that will be selected for presentation at the conference will be included in post-proceedings published by Springer in the Lecture Notes in Computer Science (LNCS) series (prior to publication the papers should be revised according to the review comments). Pre-proceedings will appear at the time of the conference. Maximum paper length will be 16 printed pages for full papers or 6 pages for short papers, in LNCS style ( http://www.springer.de/comp/lncs/authors.html). Authors of accepted papers must guarantee that their papers will be presented at the conference. All paper submissions will be handled through the EasyChair conference management system: https://easychair.org/conferences/?conf=3Dcrisis2019 =3D=3D=3D Proceedings =3D=3D=3D The proceedings will be published as a volume of Springer's LNCS series. =3D=3D=3D GENERAL CHAIRS =3D=3D=3D Nora Cuppens, IMT Atlantique, France Ahmed Hadj Kacem, University of Sfax, Tunisia =3D=3D=3D PC CHAIRS =3D=3D=3D Fr=C3=A9d=C3=A9ric Cuppens, IMT Atlantique, France Slim Kallel, University of Sfax, Tunisia =3D=3D=3D PUBLICATION CHAIRS =3D=3D=3D Nora Cuppens, IMT Atlantique, France Mohamed Mosbah, Bordeaux INP, France =3D=3D=3D PUBLICITY CHAIRS =3D=3D=3D Saoussen Cheikhrouhou, University of Sfax, Tunisia Reda Yaich, IRT SystemX, France =3D=3D=3D LOCAL ORGANISATION COMMITTEE=3D=3D=3D Nesrine Khabou, University of Sfax, Tunisia Fairouz Fakhfekh, University of Sfax, Tunisia Riadh Ben Halima, University of Sfax, Tunisia Ismail Bouassida, University of Sfax, Tunisia Hatem Hadj Kacem, University of Sfax, Tunisia =3D=3D=3D PROGRAM COMMITTEE =3D=3D=3D Takoua Abdellatif, University of Carthage, Tunisia Esma Aimeur, University of Montreal, Canada Abderrahim Ait Wakrime, IRT Railenium, France Jocelyn Aubert, University of Luxembourg, Luxembourg Anis Bkakria, University of Bretagne Loire, France Nora Cuppens-Boulahia, University of Bretagne Loire, France Fr=C3=A9d=C3=A9ric Cuppens, University of Bretagne Loire, France Bogdan Groza, Politehnica University of Timisoara, Romania Wided Guedria, Luxembourg Institute of Science and Technology, Luxembourg Brahim Hamid, University of Toulouse, France Christos Kalloniatis, University of the Aegean, Greece Sokratis Katsikas, Norwegian University of Science and Technology, Norway Kais Klai, University of Paris 13, France Igor Kotenko, St. Petersburg Institute for Informatics and Automation, Russia Marc Lacoste, Orange labs, France Jean-Louis Lanet, LHS Rennes, France Mohamed Mosbah, University of Bordeaux, France Raja Natarajan, Tata Institute of Fundamental Research, India Roberto Di Pietro, Hamad Bin Khalifa University, Qatar Kai Rannenberg, Goethe University Frankfurt, Germany Michael Rusinowitch, Lorraine University, France Ketil Stoelen, University of Oslo, Norway Akka Zemmari, Universit=C3=A9 of Bordeaux, France Lingyu Wang, Concordia University, Canada --000000000000805d14058afb26e5 Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable
Call for papers

The 14th International Conference o= n Risks and Security of Internet and Systems (CRiSIS)
29-31 October 2019= , Hammamet, Tunisia

http://crisis2019.redcad.org

The International Confe= rence on Risks and Security of Internet and Systems 2019 will be the 14th i= n a series dedicated to security issues in Internet-related applications, n= etworks and systems. Internet has become essential for the exchange of info= rmation between user groups and organizations from different backgrounds an= d with different needs and objectives. These users are exposed to increasin= g risks regarding security and privacy, due to the development of more and = more sophisticated online attacks, the growth of Cyber Crime, etc. Attacker= s nowadays do not lack motivation and they are more and more experienced. T= o make matters worse, for performing attacks have become easily accessible.= Moreover, the increasing complexity as well as the immaturity of new techn= ologies such as pervasive, mobile and wireless devices and networks, raise = new security challenges.

In this context, new security mechanisms an= d techniques should be deployed to achieve an assurance level acceptable fo= r critical domains such as energy, transportation, health, defence, banking= , critical infrastructures, embedded systems and networks, avionics systems= , etc. The CRiSIS conference offers a remarkable forum for computer and net= work security actors from industry, academia and government to meet, exchan= ge ideas and present recent advances on Internet-related security threats a= nd vulnerabilities, and on the solutions that are needed to counter them.

=3D=3D=3D IMPORTANT DATES =3D=3D=3D=C2=A0
- Submission deadlin= e: June 21, 2019 (Extended)
- Notification to authors: July 20, 2019
= - Camera-ready versions: September 22, 2019
- Conference dates: October = 29-31, 2019

=3D=3D=3D Special issue =3D=3D=3D
Selected papers rel= evant to business, human and organisational aspects of cybersecurity will b= e invited to submit extended versions for publication in Information and Co= mputer Security
http://emeraldgrouppublishi= ng.com/products/journals/journals.htm?id=3Dics


=3D=3D=3D TOP= ICS =3D=3D=3D
The topics addressed by CRiSIS range from the analysis of = risks, attacks to networks and system survivability, to security models, se= curity mechanisms and privacy enhancing technologies. The authors are invit= ed to submit research results as well as practical experiment or deployment= reports. Industrial papers about applications or case studies are also wel= comed in different domains (e.g., telemedicine, banking, e-government, e-le= arning, e-commerce, critical infrastructures, mobile networks, embedded app= lications, etc.). The list of topics includes but is not limited to:=C2=A0<= br>- Analysis and management of risk
- Attacks and defenses
- Attack = data acquisition and network monitoring
- Cryptography, biometrics, wate= rmarking
- Dependability and fault tolerance of Internet applications- Distributed systems security and safety
- Embedded system security an= d safety
- Empirical methods for security and risk evaluation
- Hardw= are-based security and physical security
- Intrusion detection and preve= ntion systems
- Organizational, ethical and legal issues
- Privacy pr= otection and anonymization
- Risk-aware access and usage control
- Se= curity and risk assessment
- Security and risks metrics
- Security an= d dependability of operating systems
- Security and safety of critical i= nfrastructures
- Security and privacy of peer-to-peer system
- Securi= ty and privacy of wireless networks
- Security models and security polic= ies
- Security of new generation networks, security of VoIP and multimed= ia
- Security of e-commerce, electronic voting and database systems
-= Security of social networks
- Security of industrial control systems- Smartphone security and privacy
- Traceability, metrology and forensi= cs
- Trust management
- Use of smart cards and personal devices for I= nternet applications
- Web and cloud security


=3D=3D=3D PAPER= SUBMISSION =3D=3D=3D=C2=A0
Submitted papers must not substantially over= lap with papers that have been published or that are simultaneously submitt= ed to a journal or a conference with proceedings. Papers must be written in= English and must be submitted electronically in PDF format.

The pap= ers that will be selected for presentation at the conference will be includ= ed in post-proceedings published by Springer in the Lecture Notes in Comput= er Science (LNCS) series (prior to publication the papers should be revised= according to the review comments). Pre-proceedings will appear at the time= of the conference.=C2=A0

Maximum paper length will be 16 printed pa= ges for full papers or 6 pages for short papers, in LNCS style (http://www= .springer.de/comp/lncs/authors.html). Authors of accepted papers must g= uarantee that their papers will be presented at the conference. All paper s= ubmissions will be handled through the EasyChair conference management syst= em:=C2=A0https://easychair.org/conferences/?conf=3Dcrisis2019
=3D=3D=3D Proceedings =3D=3D=3D=C2=A0
The proceedings will be publ= ished as a volume of Springer's LNCS series.


=3D=3D=3D GENER= AL CHAIRS =3D=3D=3D
Nora Cuppens, IMT Atlantique, France =C2=A0
Ahmed= Hadj Kacem, University of Sfax, Tunisia

=3D=3D=3D PC CHAIRS =3D=3D= =3D=C2=A0
Fr=C3=A9d=C3=A9ric Cuppens, IMT Atlantique, France
Slim Kal= lel, University of Sfax, Tunisia=C2=A0

=3D=3D=3D PUBLICATION CHAIRS = =3D=3D=3D =C2=A0
Nora Cuppens, IMT Atlantique, France
Mohamed Mosbah,= Bordeaux INP, France

=3D=3D=3D PUBLICITY CHAIRS =3D=3D=3D =C2=A0Saoussen Cheikhrouhou, University of Sfax, Tunisia
Reda Yaich, IRT Syst= emX, France

=3D=3D=3D LOCAL ORGANISATION COMMITTEE=3D=3D=3D =C2=A0Nesrine Khabou, University of Sfax, Tunisia=C2=A0
Fairouz Fakhfekh, Un= iversity of Sfax, Tunisia=C2=A0
Riadh Ben Halima, University of Sfax, Tu= nisia=C2=A0
Ismail Bouassida, University of Sfax, Tunisia
Hatem Hadj = Kacem, University of Sfax, Tunisia

=3D=3D=3D PROGRAM COMMITTEE =3D= =3D=3D =C2=A0
Takoua Abdellatif, University of Carthage, Tunisia
Esma= Aimeur, University of Montreal, Canada=C2=A0
Abderrahim Ait Wakrime, IR= T Railenium, France=C2=A0
Jocelyn Aubert, University of Luxembourg, Luxe= mbourg=C2=A0
Anis Bkakria, University of Bretagne Loire, France=C2=A0Nora Cuppens-Boulahia, University of Bretagne Loire, France=C2=A0
Fr=C3= =A9d=C3=A9ric Cuppens, University of Bretagne Loire, France=C2=A0
Bogdan= Groza, Politehnica University of Timisoara, Romania=C2=A0
Wided Guedria= , Luxembourg Institute of Science and Technology, Luxembourg=C2=A0
Brahi= m Hamid, University of Toulouse, France
Christos Kalloniatis, University= of the Aegean, Greece=C2=A0
Sokratis Katsikas, Norwegian University of = Science and Technology, Norway=C2=A0
Kais Klai, University of Paris 13, = France
Igor Kotenko, St. Petersburg Institute for Informatics and Automa= tion, Russia=C2=A0
Marc Lacoste, Orange labs, France=C2=A0
Jean-Louis= Lanet, LHS Rennes, France=C2=A0
Mohamed Mosbah, University of Bordeaux,= France=C2=A0
Raja Natarajan, Tata Institute of Fundamental Research, In= dia=C2=A0
Roberto Di Pietro, Hamad Bin Khalifa University, Qatar=C2=A0Kai Rannenberg, Goethe University Frankfurt, Germany=C2=A0
Michael Rus= inowitch, Lorraine University, France=C2=A0
Ketil Stoelen, University of= Oslo, Norway=C2=A0
Akka Zemmari, Universit=C3=A9 of Bordeaux, France=C2= =A0
Lingyu Wang, Concordia University, Canada=C2=A0
--000000000000805d14058afb26e5--