The scope of the conference is listed but not limited below.
  3G/4G networks evolution |
  A Formal Immune Network and Its Implementation for Online Intrusion Detection |
  A Generic Model for Analyzing Security Protocols |
  A Modal Logic for RoleBased Access Control |
  A New Scheme for the Location Information Protection in Mobile Communication Environments |
  A Passive External Web Surveillance Technique for Private Networks |
  A Probabilistic PropertySpecific Approach to Information Flow |
  A Secure Way to Combine IPsec, NAT & DHCP |
  A Temporal LogicBased Model for Forensic Investigation in Networked System Security |
  A Theoretical Model for the Average Impact of Attacks on Billing Infrastructures |
  An Efficient Access Control Model Utilized the Attribute Certificate Structuring |
  An OntologyBased Approach to Information Systems Security Management |
  An XMLSeamless Policy Based Management Framework |
  Analyzing Vulnerabilities and Measuring Security Level at Design and Exploitation Stages of Computer Network Life Cycle |
  Asynchronous Alert Correlation in Multiagent Intrusion Detection Systems |
  Authentication, Authorization and Access Control |
  BehaviorBased Model of Detection and Prevention of Intrusions in Computer Networks |
  Calibrating Entropy Functions Applied to Computer Networks |
  Cognitive networks |
  Computer Network and Wireless Network Security |
  Convergence/Integration in networks |
  Critical Information Assurance Challenges for Modern LargeScale Infrastructures |
  Cryptographic protocols |
  Detection of Illegal Information Flow |
  Developing an Insider Threat Model Using Functional Decomposition |
  Digital rights management |
  Distributed systems |
  Encoding Private Key in Fingerprint |
  Generalized Abstract Noninterference: Abstract Secure InformationFlow Analysis for Automata |
  Identity theft and phishing in mobile networks |
  Information Flow Analysis, Covert Channels and Trust Management |
  Intrusion Detection and Prevention |
  Intrusion Detection Hybrid Intrusion Detection Model Based on Ordered Sequences |
  Key Escrow with TreeBased Access Structure |
  Key management in wireless Networks |
  MANETs & sensor networks |
  Massive Data Mining for Polymorphic Code Detection |
  Mathematical Models, Architectures and Protocols for Computer Network Security |
  Mobile, Ad Hoc and Sensor Network Security |
  Models and Analysis of Active Worm Defense |
  Multimedia communication |
  Naming and addressing vulnerabilities |
  Network management and performance |
  Network security |
  Network Security Applications |
  Network testbeds |
  Network traffic engineering |
  Networks, Markov Lie Monoids, and Generalized Entropy |
  Next generation networks |
  Optical networks |
  Prevention of Information Attacks by RunTime Detection of Selfreplication in Computer Codes |
  Region Protection/Restoration Scheme in Survivable Networks |
  RuleBased Topological Vulnerability Analysis |
  Safety Problems in Access Control with Temporal Constraints |
  Satellite networks |
  Secure Protected Password Change Scheme |
  Secure system architectures, Security policy, Security protocols Digital rights management |
  Security Checker Architecture for PolicyBased Security Management |
  Security Policy and Operating System Security PolicyDriven Routing Management Using CIM |
  Security threats: DDoS, MiM, Session Hijacking |
  Short Papers Foundation for a Time Interval Access Control Model |
  Software defined radio |
  Statistical Covert Channels Through PROXY Server |
  Threat Modeling, Vulnerability Assessment and Network Forensics |
  Towards More Controllable and Practical Delegation |
  Trust by Workflow in Autonomic Communication |
  Trust establishment |
  Unique UserGenerated Digital Pseudonyms |
  User privacy, location privacy |
  Vulnerabilities Detection in the Configurations of MS Windows Operating System |
  Wireless and mobile networks |
  Wireless and wireline network integration |