Monday, May 2, 2016

dmanet Digest, Vol 99, Issue 1

Send dmanet mailing list submissions to
dmanet@zpr.uni-koeln.de

To subscribe or unsubscribe via the World Wide Web, visit
http://www.zaik.uni-koeln.de/mailman/listinfo/dmanet
or, via email, send a message with subject or body 'help' to
dmanet-request@zpr.uni-koeln.de

You can reach the person managing the list at
dmanet-owner@zpr.uni-koeln.de

When replying, please edit your Subject line so it is more specific
than "Re: Contents of dmanet digest..."


Today's Topics:

1. WABI 2016 - Final Call for Papers - Deadline extended to May
5 (Christian Storm Pedersen)
2. Copenhagen Summer School on Maritime Management, August 1-9
2016 (Line Blander Reinhardt)
3. Chapter Submission by 15 May 2016 - Security Solutions and
Applied Cryptography in Smart Grid Communications
(Mohamed Amine Ferrag)


----------------------------------------------------------------------

Message: 1
Date: Fri, 29 Apr 2016 13:50:52 +0000
From: Christian Storm Pedersen <cstorm@birc.au.dk>
To: "dmanet@zpr.uni-koeln.de" <dmanet@zpr.uni-koeln.de>
Subject: [DMANET] WABI 2016 - Final Call for Papers - Deadline
extended to May 5
Message-ID: <485267CA-F661-41AF-B18D-97E60E4C45C0@birc.au.dk>
Content-Type: text/plain; charset="utf-8"

==================================================================
WABI 2016 - Final Call for Papers - Deadline extended to May 5

16th Workshop on Algorithms in Bioinformatics

August 22-24, 2016. Aarhus, Denmark

===================================================================

Submission deadline extended to: May 5, 23:59, 2016 (any timezone)

http://conferences.au.dk/algo16/wabi
===================================================================

Scope:

All research in algorithmic work in bioinformatics, computational biology and systems biology. The emphasis is mainly on discrete algorithms and machine-learning methods that address important problems in molecular biology, that are founded on sound models, that are computationally efficient, and that have been implemented and tested in simulations and on real datasets. The goal is to present recent research results, including significant work-in-progress, and to identify and explore directions of future research.

Topics:

Original research papers (including significant work-in-progress) or state-of-the-art surveys are solicited in all aspects of algorithms in bioinformatics, computational biology and systems biology - including, but not limited to:

* Exact and approximate algorithms for sequence analysis, gene and signal recognition, alignment and assembly, molecular evolution, structure determination or prediction, gene expression, molecular pathways and networks, proteomics, functional and comparative genomics, and drug design.

* Methods, software, and data repositories for development and testing of such algorithms and their underlying models, as well as high-performance computing approaches to hard learning and optimization problems.

* Novel approaches to analyzing and modeling next-generation sequence data, including sequence assembly, population genomics, metagenomics, metatranscriptomics and small RNA sequencing.

Important Dates:

Submission deadline: May 5, 2016
Author notification: May 30, 2016
Final version due: June 13, 2016
Workshop: August 22-24, 2016

Keynote Speaker:

Kiyoshi Asai, University of Tokyo, Japan.

Details on submitting manuscripts:

See http://conferences.au.dk/algo16/wabi under 'Paper Submission' for details.

Proceedings:

Proceedings will be published in the Springer series Lecture Notes in
Bioinformatics, where accepted papers will be allotted 12 pages.
Selected papers will also be invited for an extended publication in a
thematic series in Algorithms for Molecular Biology (AMB).

Program Committee:

Tatsuya Akutsu, Kyoto University
Timothy L. Bailey, University of Queensland
Jan Baumbach, University of Southern Denmark
Anne Bergeron, Universite du Quebec a Montreal
Paola Bonizzoni, Universita di Milano-Bicocca
Alessandra Carbone, Universite Pierre et Marie Curie
Rita Casadio, University of Bologna
Nadia El-Mabrouk, University of Montreal
Martin Frith (co-chair), AIST
Anna Gambin, Warsaw University
Raffaele Giancarlo, Dipartimento di Matematica Universita di Palermo
Michiaki Hamada, Waseda University
Thomas Hamelryck, University of Copenhagen
Fereydoun Hormozdiari, University of California Davis
Katharina Huber, University of East Anglila
Carl Kingsford, Carnegie Mellon University
Hisanori Kiryu, The University of Tokyo
Gregory Kucherov, University Paris-Est Marne-la-Vallee
Timo Lassmann, Telethon Kids Institute
Ming Li, University of Waterloo
Zsuzsanna Liptak, University of Verona
Stefano Lonardi, University of California Riverside
Gerton Lunter, University of Oxford
Thomas Mailund, Aarhus University
Paul Medvedev, Pennsylvania State University
Daniel Merkle, University of Southern Denmark
Istvan Miklos, Rnyi Institute, Budapest
Bernard Moret, EPFL
Burkhard Morgenstern, University of Goettingen
Vincent Moulton, University of East Anglia
Veli Mäkinen, University of Helsinki
Luay Nakhleh, Rice University
William Noble, University of Washington
Christian Nørgaard Storm Pedersen (co-chair), Aarhus University
Nadia Pisanti, Universita di Pisa
Mihai Pop, University of Maryland
Teresa Przytycka, NIH
Sven Rahmann, University of Duisburg-Essen
Marie-France Sagot, INRIA
Kengo Sato, Keio University
Michael Schatz, Cold Spring Harbor Laboratory
Russell Schwartz, Carnegie Mellon University
Kana Shimizu, AIST
Anish Man Sing Shrestha, University of Tokyo
Peter F. Stadler, Leipzig University
Jens Stoye, Bielefeld University
Krister Swenson, Universite de Montpellier
Hélène Touzet, University of Lille
Lusheng Wang, City University of Hong Kong
Siu Ming Yiu, The University of Hong Kong
Louxin Zhang, National University of Singapore
Michal Ziv-Ukelson, Ben Gurion University of the Negev

--
Christian Nørgaard Storm Pedersen
Bioinformatics Research Center (BiRC), Aarhus University
http://www.birc.au.dk/~cstorm


------------------------------

Message: 2
Date: Fri, 29 Apr 2016 14:11:13 +0000
From: Line Blander Reinhardt <lbre@dtu.dk>
To: "dmanet@zpr.uni-koeln.de" <dmanet@zpr.uni-koeln.de>
Subject: [DMANET] Copenhagen Summer School on Maritime Management,
August 1-9 2016
Message-ID:
<9B56CF7D9A34AF49850305A5223AC0A3379EBE@ait-pex01mbx01.win.dtu.dk>
Content-Type: text/plain; charset="iso-8859-1"


Summer school:
Quantitative decision support in maritime shipping
at
Technical University of Denmark.
1st to 9th of August 2016


The focus of the course is on liner shipping and covers the areas Hinterland transport, pre-marshalling, berth scheduling, stowage, routing of containers, empty container repositioning, vessel repositioning, speed optimization, bunker purchasing and network design. The course will have presenters from Maersk and Optivation presenting their decision problems and decision support tools.

Presentation and exercises from the 1st of August to the 5th of August and the 8th and 9th of August. The course is finalized by a report by choice on a research article in the research area or on an assignment provided. The course is 5 ECTS and there is no registration fee. The course is limited to 15 participants.

Please contact Line Blander Reinhardt LBRE @ dtu.dk to sign up for the course.

------------------------------

Message: 3
Date: Fri, 29 Apr 2016 10:19:05 -0400
From: Mohamed Amine Ferrag <maferrag@lrs-annaba.net>
To: dmanet@zpr.uni-koeln.de
Subject: [DMANET] Chapter Submission by 15 May 2016 - Security
Solutions and Applied Cryptography in Smart Grid Communications
Message-ID: <13267d001a247c1c4f5f1aae25f3634a@lrs-annaba.net>
Content-Type: text/plain; charset=UTF-8; format=flowed

Dear Colleagues,

We could accommodate a few more chapters in our upcoming book on
Security Solutions and Applied Cryptography in Smart Grid
Communications. If you are interested, kindly directly submit your full
chapter by 15 May 2016 (the latest time in earth) at the following URL:

http://www.igi-global.com/submission/submit-chapter/?projectid=6423111c-4d60-4cdc-b4cf-9c9fdecf080c

The CFC (Call for Chapters) is mentioned below for your convenience.

Best Regards,
Mohamed Amine

=====================
[Apologies for multiple copies of the CFC]

"Security Solutions and Applied Cryptography in Smart Grid
Communications"

Edited by: Mohamed Amine Ferrag and Ahmed Ahmim
To be published by: IGI Global, USA

May 15, 2016: Full Chapter Submission

URL1 :
http://www.igi-global.com/publish/call-for-papers/call-details/2020
URL2
: https://sites.google.com/site/smartgridsigiglobal/

Editorial Advisory Board
Nacira Ghoualmi-Zine, Badji Mokhtar- Annaba University, Algeria
Jaime Lloret Mauri, Polytechnic University of Valencia, Spain
Pascal Lorenz, University of Haute Alsace, France
Djamel Djenouri, CERIST Research Center, Algeria
Albena Mihovska, Center for TeleInFrastructur, Aalborg University,
Aalborg, Denmark
Mehdi Nafa, Badji Mokhtar- Annaba University, Algeria
Al-Sakib Khan Pathan, UAP and SEU, Bangladesh/ Islamic University in
Madinah, KSA
Hui Hou, School of Automation, Wuhan University of Technology, China
Hidoussi Faouzi, University Hadj Lakhdar Batna, Algeria
Mubashir Husain Rehmani, COMSATS Institute of Information Technology,
Wah Cantt, Pakistan
Homero Toral Cruz, University of Quintana Roo, México
Makhlouf Derdour, University of Cheikh Laarbi, Tebessa, Algeria
Lynn M. Batten, Deakin University, Australia
Ram Chakka, RGMCET, RGM Group of Institutions, India
Cristina Alcaraz, University of Malaga, Spain
Sumanth Yenduri, Columbus State University, USA
Chi-Yuan Chen, National Ilan University, Taiwan
P. Venkata Krishna, VIT University, India
Alessio Merlo, University of Genova, Italy
Syed Faraz Hasan, Massey University, New Zealand
Farrokh Aminifar, University of Tehran, Iran
Hossein Akhavan-Hejazi, University of California, USA
Danda B. Rawat, Georgia Southern University, USA

Introduction
Electrical energy storage is a key factor for the future. The
consumption of electrical energy (i.e. the use of air conditioning,
audio and video devices or electric heating) is increasing every year
due; firstly to the increase of the population and secondly by the
appearance of new uses of consumption, such as electric cars. With this
increase consumption, how to ensure the balance between supply and
demand for electricity at all times? To address this problem, the idea
of placing the new generation of smart grids to control this energy has
appeared in recent literature in different flavors in order to provide
electric power supply secure, sustainable and competitive to consumers.
In addition, the revolution in smart grid involves a significant change
in side of the consumer where consumers will also become producer with
the ability of energy storage such as in the vehicle battery, or as a
local generation sources such as photovoltaic panels. However, the smart
grid develops modern solutions for the next-generation network and
digital communication in which many systems and subsystems are
interconnected to provide services from end-to-end network between
various actors and between intelligent devices that are deployed there.
Within each network, a hierarchical structure is composed of different
types of networks, such as the HANs (Home Area Networks), the BANs
(Building Area Networks), the IANs (Industrial Area Networks), the NANs
(Neighborhood Area Networks), the FANs (Field Area Networks), and the
WANs (Wide Area Networks). Currently, large societies propose the use of
cloud computing in smart grid applications connected with the electrical
control center. The main problem in the development of a smart grid is
not located at the physical medium but mainly in delivery of reliability
and security. The possibility of fitting with active or passive attacks
in smart grid network is great to divulge privacy and disrupt energy
(e.g. Wormhole Attack, False Data Injection Attack, Black Hole Attack,
Grey Hole Attack, DoS Attack, Physical Layer Attack, Colluding Adversary
Attack, Routing Table Overflow Attack etc.). Therefore, the security
requirements, including authentication, accountability, integrity,
non-repudiation, access control and confidentiality should be paid more
attention in the future for high performance smart grids. This book will
cover the current scope of various methodologies and mechanisms in the
theory and practice of security, privacy, intrusion detection, and
applied cryptography in smart grid communications in one place.

Objective
This comprehensive and timely publication aims to be an essential
reference source, building on the available literature in the field of
smart grid security in developing countries while providing for further
research opportunities in this dynamic field. It is hoped that this text
will provide the resources necessary for policy makers, technology
developers and managers to adopt and implement smart grid platforms in
developing nations across the globe.

Target Audience
Policy makers, academicians, researchers, advanced-level students,
technology developers, and government officials will find this book
useful in furthering their research exposure to pertinent topics in
smart grid security and assisting in furthering their own research
efforts in this field.

Recommended Topics
This book will include (but will not be limited to) the following
topics. Any other related topics in the area of smart grid security are
also welcome :

- Game theoretical models of smart grid security
- SCADA and legacy system security
- Security and Privacy in Mobile Cloud and Grid Computing
- Secure and resilient cyber-physical and communication architectures
- Intrusion Detection System (IDS)/Intrusion Prevention System (IPS)
- Machine learning for security
- Computer security visualization techniques
- Intrusion detection based on data mining techniques
- Online money laundering and underground economy
- Hardware vulnerabilities
- Binary analysis and reverse engineering
- Security risk assessment, measurement and management
- Network exfiltration
- Security, privacy, and resource management in Wireless Access Networks
(WPAN, WLAN, WLL, etc.)
- Security, Privacy, and Resource Management in Broadband Wireless
Technologies (HSDPA, HSUPA, LTE, WiMAX, WiRAN, etc.)
- Hardware security
- Quantum cryptography
- Privacy-preserving systems
- New attacks against computers and networks
- Denial-of-Service Attacks
- Insider attack detection
- Formal models, analysis, and standards
- Deception systems and honeypots
- Vulnerability analysis
- Secure software development
- Security and Privacy in Next Generation Mobile Networks
- Protocol security
- Network & active defenses
- Malware and botnet analysis, detection, and mitigation
- PHY/MAC/Routing/Transport/Application layer Protocols and Security
- Tamper-resistant device technologies
- Smartphone and other embedded systems security
- Fraudulent usage, prevention of traffic analysis
- Cryptography, key management, authorization and access control
- False data injection, detection and mitigation
- Performance evaluation, performance/security tradeoff analysis
- Modern infrastructure for cities(roads, power plants, water treatment
plants, sewage systems, transit systems)
- Energy Efficiency including non-conventional energy management
- Green Environment including E-Waste Management, Hospital Management
etc
- Electro-mobility
- Public key and conventional algorithms and their implementations
- Distributed systems security
- Cyber and Cross-Domain (power to cyber) security event detection,
analysis and response
- DoS/DDoS resiliency
- Cloud security
- Embedded systems security
- Security design and verification tools

Submission Procedure
Researchers and practitioners are invited to submit on or before March
5, 2016 (Extended), a 2-3 page chapter proposal clearly explaining the
mission and concerns of his or her proposed chapter. Authors of accepted
proposals will be notified by March 10, 2016 about the status of their
proposals and sent chapter guidelines. Full chapters are expected to be
submitted by May 15, 2016. All submitted chapters will be reviewed on a
double-blind review basis. Contributors may also be requested to serve
as reviewers for this project. Chapters with multiple authors are
welcome, even encouraged.

Propose a Chapter :
http://www.igi-global.com/publish/call-for-papers/submit/2020
Submit your full chapter:
http://www.igi-global.com/submission/submit-chapter/?projectid=6423111c-4d60-4cdc-b4cf-9c9fdecf080c


Publisher
This book is scheduled to be published by IGI Global (formerly Idea
Group Inc.), publisher of the "Information Science Reference" (formerly
Idea Group Reference), "Medical Information Science Reference,"
"Business Science Reference," and "Engineering Science Reference"
imprints. For additional information regarding the publisher, please
visit www.igi-global.com. This publication is anticipated to be released
in 2016.


Important Dates
March 5, 2016: Proposal Submission Deadline (Extended)
March 10, 2016: Notification of Acceptance
May 15, 2016: Full Chapter Submission
July 30, 2016: Review Results Returned
September 01, 2016: Final Acceptance Notification
September 15, 2016: Final Chapter Submission

Editors

Mohamed Amine Ferrag (Ph.D.)
Department of Computer Science
Faculty of Mathematics, Computer Science, and Material Science
Guelma University
BP 401 Guelma 24000 – Algeria
Tel.: +2137 96 96 14 53
E-mail: mohamed.amine.ferrag@gmail.com

Ahmed Ahmim (Ph.D.)
Department of Mathematics and Computer Science,
Faculty of Exact Sciences and Sciences of Nature and Life
University of Larbi Tebessi,
Route of Constantine, Tebessa 12000 – Algeria
Tel.: + 213 5 55 86 70 65
E-mail: a.ahmim@gmail.com

__________________________________________________
Dr. Mohamed Amine Ferrag
Assistant Professor
Department of Computer Science
Guelma University
BP 401 Guelma 24000, Algeria
Tel. : +213 796 961 453
E-mails: maferrag@outlook.fr / mohamed.amine.ferrag@gmail.com
maferrag@lrs-annaba.net
HomePage : https://sites.google.com/site/mohamedamineferrag/
____________________________________________________


------------------------------

Subject: Digest Footer

_______________________________________________
dmanet mailing list
dmanet@zpr.uni-koeln.de
http://www.zaik.uni-koeln.de/mailman/listinfo/dmanet


------------------------------

End of dmanet Digest, Vol 99, Issue 1
*************************************

No comments:

Post a Comment