<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
</head><body style="">
<div>
Apologies for cross-postings. Please send it to interested colleagues and students. Thanks!
<br />
<div>
<div>
<div>
<div>
<br />CALL FOR PAPERS, EXTENDED ABSTRACTS, POSTERS, WORKSHOPS, TUTORIALS AND SPECIAL TRACKS!
<br />
<br />********************************************************************
<br />World Congress on Internet Security (WorldCIS-2014)
</div>
<div>
Technical Co-Sponsored by IEEE UK/RI Computer Chapter
<br />December 8-10, 2014
<br />Venue: Heathrow Windsor Marriott Hotel
<br />London, UK
<br />www.worldcis.org
<br />*******************************************************************
<br />
<br />The WorldCIS-2014 is an international forum dedicated to the advancement of the theory and practical implementation of security
<br />on the Internet and Computer Networks. The inability to properly secure the Internet, computer networks, protecting the Internet
<br />against emerging threats and vulnerabilities, and sustaining privacy and trust has been a key focus of research. The WorldCIS aims to
<br />provide a highly professional and comparative academic research forum that promotes collaborative excellence between academia and
<br />industry.
<br />
<br />The objectives of the WorldCIS are to bridge the knowledge gap between academia and industry, promote research esteem
<br />and to fostering discussions on information technologies, information systems and global security applications.
<br />The WorldCIS-2014 invites speakers and researchers to submit papers that encompass conceptual analysis, design implementation
<br />and performance evaluation.
<br />
<br />Original papers are invited on recent advances in Internet, Computer Communications and Networking Security.
<br />
<br />The topics in WorldCIS-2014 include but are not confined  to the following areas:
<br />
<br />*Internet Security
<br />*Security, trust and privacy
<br />*Self-organizing networks
<br />*Sensor nets and embedded systems
<br />*Service overlays
<br />*Switches and switching
<br />*Topology characterization and inference
<br />*Traffic measurement and analysis
<br />*Traffic engineering and control
<br />*Trust and Data Security
<br />*Virtual and overlay networks
<br />*Web services and performance
<br />*Wireless mesh networks and protocols
<br />*Ad hoc mobile networks Security
<br />*Addressing and location management
<br />*Broadband access technologies
<br />*Blended Internet Security Methods
<br />*Biometrics
<br />*Boundary Issues of Internet Security
<br />*Capacity planning
<br />*Cellular and broadband wireless nets
<br />*Congestion control
<br />*Content distribution
<br />*Cryptography
<br />*Cross layer design and optimization
<br />*Cyber-physical computing/networking
<br />*Geographic information systems
<br />*Privacy Protection and Forensic in Ubi-com
<br />*Quality of Service Issues
<br />*Regulations
<br />*Secured Database Systems
<br />*Security in Data Mining
<br />*Security and Access Control
<br />*Semantic Web and Ontology
<br />*Data management for U-commerce
<br />*Software Architectures
<br />*Defence Systems
<br />*Delay/disruption tolerant networks
<br />*End Users
<br />*Enabling technologies for the Internet
<br />*Implementation and experimental testbeds
<br />*Future Internet Design and Applications
<br />*Middleware support for networking
<br />*Mobility models and systems
<br />*Multicast and anycast
<br />*Multimedia protocols and networking
<br />*Network applications and services
<br />*Network architectures Network control
<br />*Network management
<br />*Network simulation and emulation
<br />*Novel network architectures
<br />*Network and Protocol Architectures
<br />*Peer-to-peer communications
<br />*Performance evaluation
<br />*Power control and management
<br />*Pricing and billing
<br />*Protocols and Standards
<br />*Resource allocation and management
<br />*RFID
<br />*Optical networks
<br />*Routing protocols
<br />*Scheduling and buffer management
<br />*Virtual Reality
<br />
<br />
<br />IMPORTANT DATES:
<br />
<br />*Extended Abstract (Work in Progress) Submission Date: September 15, 2014
<br />*Notification of Extended Abstract Acceptance/Rejection: September 25, 2014
<br />*Full Paper Submission Date: September 20, 2014
<br />*Notification of Paper Acceptance/Rejection: October 10, 2014
<br />*Camera Ready Paper Due: November 01, 2014
<br />*Workshops and Tutorials Submission Date: September 15, 2014  
<br />*Notification of Workshop and Tutorial Acceptance: September 25, 2014  
<br />*Special Track Submission Date: September 20, 2014
<br />*Notification of Special Track Acceptance: October 01, 2014
<br />*Poster/Demo Submission Date: September 15, 2014
<br />*Notification of Poster/Demo Acceptance: September 30, 2014
<br />*Early Registration Deadline (Authors only): October 20, 2014
<br />*Late Registration Deadline (Authors only): October 21, 2014 - November 15, 2014
<br />*Participants Registration: May 01 to December 01, 2014
<br />*Conference Dates: December 08 - 10, 2014
<br />
<br />For further details, please visit conference website www.worldcis.org
</div>
</div>
<div>
<br /> 
</div>
</div>
<div>
<br /> 
</div>
</div>
<div>
<br /> 
</div>
</div>
<div>
<br /> 
</div>
</body></html>