Evolution of SIN Conferences Over the Years

Slide Note
Embed
Share

Explore the journey of the *SIN Conferences from past to present, showcasing international events held in various countries like Russia, UK, India, and more. The conferences focus on Security of Information and Networks, featuring keynote speakers, paper submissions, and full paper acceptance ratios. Join the evolving landscape of cybersecurity discussions and advancements.


Uploaded on Sep 28, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. *SIN Conferences- Then and Now Atilla ELCI Aksaray University, Turkey

  2. * International Conference on Security of Information and Networks: * 12-15 September 2019, Marins Park Hotel, Sochi, Russia (SIN 2019) * 10-12 September 2018, Cardiff University, Cardiff, Wales, UK (SIN 2018) * 13-15 October 2017, Manipal Univ. Jaipur, Jaipur, Rajasthan, India (SIN 2017) * 20-22 July 2016, Rutgers University, New Jersey, USA(SIN 2016). * 8-10 September 2015, Sochi, Russia (SIN 2015). * 9-11 September 2014, Glasgow, United Kingdom (SIN 2014). * 26-28 November 2013, Aksaray, Turkey (SIN 2013). * 22-27 October 2012, Jaipur, India (SIN 2012). * 14-19 November 2011, Sydney, Australia (SIN 2011). * 7-11 September 2010, Taganrog, Rostov Region, Russia (SIN 2010). * 6-10 October 2009, Gazimagusa, TRNC, North Cyprus (SIN 2009). * 8-10 May 2007, Gazimagusa, TRNC, North Cyprus (SIN 2007). *SIN Conferences- past

  3. *Procs at ACM Digital Library Proceedings of the International Conferences on Security of Information and Networks: * SIN 19: pending ACM DL upload * SIN 18 * SIN 17 * SIN '16 * SIN '15 * SIN '14 * SIN '13 * SIN '12 * SIN '11 * SIN '10 * SIN '09 * SIN 07 @Trafford Publishing * Proceedings of all SIN Conferences are also listed in DBLP.

  4. *12thInternational Conference on Security of Information and Networks *Submission Reviewed: 53 *Full Papers: 17 *Short Papers: 12 *Extended Abstract: - *Full paper acceptance ratio: < 32 % *SIN 2019- Submissions

  5. *Sddka Berna rs Yaln: *System on Chip Design for Secure Internet of Things *Igor V. Kotenko: *Situational Awareness for Cyber Defense: security analysis, attack modeling, and selection of countermeasures *Keynote Speakers- 2019

  6. *11thInternational Conference on Security of Information and Networks *Submission Reviewed: 42 *Full Papers: 15 *Short Papers: 9 *Extended Abstract: 7 *Full paper acceptance ratio: < 36 % *SIN 2018- Submissions

  7. *Edgar Weippl: *Distributed Ledger Technology, Blockchain & Crypto Currencies Hype & an Opportunity for Interdisciplinary Research *Dr. Surya Nepal: *Building Trustworthy IoT-Cloud Data Lifecycle *Atilla El i: *Unavoidable Rise of Blockchain- Yet, How Far? *Keynote Speakers- 2018

  8. *10thInternational Conference on Security of Information and Networks *Submission Reviewed: 143 *Full Papers: 25 *Short Papers: 16 *Extended Abstract: 12 *Full paper acceptance ratio: < 18 % *SIN 2017- Submissions

  9. *Dr. KD Nayak: * India's Cyber Security Challenges and Opportunities *Prof. Bimal Kumar Roy: * Selected Sharing and Matroids *Prof. Suraj C. Kothari: * Software Security Headaches: Analgesic or Hospital? *Dr. Akka Zemmari: * Android Malware: Will machine learning be help in hand? *Keynote Speakers- 2017 1/2

  10. * Prof. Mohamed Mosbah: * Models and Approaches for the Safety and the Security of Distributed Systems * Dr. Priyadarsi Nanda: * Software Defined Perimeter : "A new way to protect Network Systems against Cyber Threats" * Dr. Mauro Conti: * Can't You Hear Me Knocking: Novel Security and Privacy Threats to Mobile Users * Sushmita Ruj: * Blockchains for Secure Data Storage *Keynote Speakers- SIN 2017 2/2

  11. *Bhavani Thuraisingham: *Science of Data Security *Eugene H. Spafford: *Stepping Back From Cyber Security *Keynote Speakers- SIN 2016

  12. * Ron Poet: * The Use of Mobile Devices in Authentication * Ramki Thurimella: * Some new results in keyless jam resistance communication (Joint work with Hamid Hanifi and Leemon Baird) * Alexander Barabanov, Alexey Markov: * Modern trends in the regulatory framework of the information security conformity assessment in Russia based on Common Criteria * Alexey Zhukov: * Lightweight cryptography: modern development paradigms *Keynote Speakers- SIN 2015

  13. * Chris Johnson: * Improving the Cyber-security of Safety-Critical Systems * Chris Hankin: * Games and Industrial Control Systems * Bill Buchanan: * Complete Anatomy of Heartbleed, TrueCrypt and Large-scale Vulnerabilities * Jaideep Vaidya: * Preserving Privacy in Collaborative Optimization * Bill Hargenrader: * Advances In Continuous Monitoring As an Integrated Component of Cybersecurity Management * Atilla Elci: * Isn t the time ripe for a standard ontology on security of information and networks? *Keynote Speakers- SIN 2014

  14. * Georges Ataya: * Information Security and Risk Governance and Management Frameworks. An Overview of COBIT 5 * Ludmila Babenko: * Analysis of GOST 28147-89 Security: Methods and Algorithms * Bart Preneel: * The SHA-3 Competition: Lessons Learned * Erkay Sava : * Attacks on implementation of Cryptographic Algorithms: Fault and Side-Channel Attacks * Ali Ayd n Sel uk: * Trusting SSL in Practice * Rudrapatna Shyamasundar: * Security and Protection of SCADA: A Bigdata Algorithmic Approach * Edgar Weippl: * Social Engineering Attacks on the Knowledge Worker and the Digital Native *Keynote Speakers- SIN 2013

  15. * T. A. Gonsalves: * Innovation for a Better India * R.K.Shyamasundar: * Security and Privacy in Smart Grids: An Overview * Raghu Iyer: * Network Managment and Security Challenges faced by Organizations adopting BYOD * Debrata Nayak: * Security Issues and Its Implication in Cloud Computing * V. Kamakoti: * Secure Systems Engineering * Rakesh Kharwal: * Building Resilient Cyber Defense *Keynote Speakers- SIN 2012 1/2

  16. * Alex Liu: * High Speed Regular Expression Matching using Small TCAMS * Anish Mathuria: * Malicious Insiders in Group Key Exchange Protocols and its Implications in Cloud Computing * Pierangela Samarati: * Privacy and Data Protection in Cloud Scenarios * Vincenzo Piuri: * Biometrics Privacy: Technology and Applications * Oleg Makarevich: * Scientific, Methodological and Infrastructural Support of Lifelong IT-Security Education at SFedU * Christian W. Probst: * From Organizational Models to Attacks *Keynote Speakers- SIN 2012 2/2

  17. *Vijay Varadharajan: *Rethinking Cyber Security *Kevin Kwiat: *Fault Tolerance for Fight-Through: A Basis for Strategic Survival *Keynote Speakers- SIN 2011

  18. *Josef Pieprzyk: *Evolution of Cryptographic Hashing *Alexander Tereshkin: *Evil Maid Goes After PGP Whole Disk Encryption *Keynote Speakers- SIN 2010

  19. * Vijay VARADHARAJAN: * Evolution and Challenges in Trust and Security in Information System Infrastructures * Elisa BERTINO: * Assured Information Sharing - Concepts and Research Issues * Erdal CAYIRCI: * Deployed Sensor Networks and Their Security Challenges in Practice * Sorin Alexander HUSS: * Embedded Systems for IT Security Applications: Properties and Design Considerations *Keynote Speakers- SIN 2009

  20. * Bart Preneel: * Research Challenges in Cryptology * Marc Joye: * White-box cryptography * Elisabeth Oswald: * Power Analysis Attacks A Very Brief Introduction * etin Kaya KO : * Micro-Architectural Side-Channel Attacks & Branch Prediction Attack * Mehmet Ufuk A LAYAN: * Secure Routing in Ad Hoc Networks and Model Checking * Karthik BHARGAWAN: * Web Services Security: Protocols, Implementations, and Proofs *Keynote Speakers- SIN 2007

  21. *Questions? *Thank you for listening

Related


More Related Content