The 6th International Doctoral Symposium on Applied Computation and Security Systems (ACSS-2019) is to be held during March 12-13, 2019 in Kolkata, India. ACSS 2019 is aimed at offering a qualified opportunity for presentation and discussion of the research outcomes by PhD scholars enrolled with Universities and Research Institutes around the world. While the emphasis of the workshop is on Security Systems, we solicit research outcomes on other relevant areas pertaining to advancement of computing.
Department of Computer Science & Engineering
A. K. Choudhury School of Information Technology
University of Calcutta, India
|Category||From India||From Abroad|
|Author (Oral Presentation)||INR 8000||400 US Dollar|
|Listener||INR 2000||100 US Dollar|
|Industry||INR 10,000||500 US Dollar|
The ACSS-2019 International Doctoral Symposium aims to facilitate PhD scholars to present and discuss their doctoral research with senior researchers in a constructive and friendly atmosphere. Each contributed paper must have at least one enrolled PhD student as the first author of the submission and his/her supervisor(s) as co-author(s).
Paper Submission Date : October 31, 2018
Author Notification : January 15, 2019
Camera Ready Submission & Author Registration : January 25, 2019
Symposium : March 12-13, 2019
We welcome all such authors to submit research papers to 6th International Doctoral Symposium on Applied Computation and Security Systems (ACSS-2019). Any work that is not presented in ACSS-2019 shall not be included in the post-conference book. This symposium would be best suited for scholars who already have a plan outlined for their dissertation in one of the following broad areas:
The submission draft for full papers should be limited to 10-12 pages. The authors of selected papers shall be required to submit an extended version for publication as a book chapter in the post-symposium book. All papers will be carefully reviewed by the program committee and a balanced program will be selected based on relevance and technical soundness. Each paper will receive at least two blind reviews. Please note that author names, affiliations, etc. are not to be included in any form in the manuscript, failing which, the paper will be rejected. The selected and presented works for ACSS 2019 are to be published by Springer after the symposium as an edited book in the series,
When the ARPAnet originated in the 2nd half of the 60s of the previous century security wasn't one of its cornerstones. Since then, many things have changed: we now use levels of firewalls, intrusion detection mechanisms, a limited number of server facilities, and active system maintenance. Our current tools for achieving IT Security are extremely advanced but, interestingly, in the end, their underlying philosophy hasn't changed much since the late middle ages. Even so, our society more and more depends on IT: train and plane reservations, almost our complete infra-structure (energy, traffic control, hospitals, communication) depends on properly functioning IT facilities. The IT systems of these essential societal components may cause those components to grind to a complete halt if their security is compromised.
Despite the fact that many great books have been published about software engineering, software frequently is based on horrible design, showing many presentation flaws, making it sheer impossible to understand and maintain it. Good software should be well designed, following a clear description model, and should be developed `bottom-up'. The Stealth program was designed that way and its characteristics are covered during the conference. However, technology is a tool, and attaining an acceptable level of IT security cannot be reached by merely using that tool. Over the years the Internet has grown from a medium used by friendly colleagues to an technology mirroring what's happening in the physical world, including addictions and crime. Adversaries may be 20,000 km away, but they can reach our computers in seconds. Few computer users understand this, and use, e.g., e-mail as though they are sending a letter using the postal service, not realizing that they're essentially making potentially confidential information available to unknown and possibly criminal third parties.
Real steps forward in the field of information security cannot be achieved by IT alone. In science major steps ahead are often achieved by joining forces of at first sight completely different scientific disciplines. `Looking over de fence' research often results in dissertations rewarded with cum-laudes. How do we `look over the fence' in the field of IT, aiming at improving Information Security? The area to join forces with is Psychology: many IT users assume Information Security is not their responsibility or they think they do not run real risks of falling victim to cyber threats. Promising approach lines are found in behavior change models in which behavior, e.g., cyber security compliance depends on human factors such as attitudes, social norms and perceived behavioral control towards Cyber Security (cf. the Theory of Planned Behavior). According to this theory, which has received an enormous amount of empirical suppport, behavior (and thus security awareness) changes as a result of changing social norms, affecting personal attitudes and users' behavior once they realize they are in control. Here clear information about the real risks of irresponsible behavior in the area of IT helps people to change their attitudes. From learning theories we know that incentives in particular help to change behavior (while punishment doesn't). Joining forces with Psychology results in developing software not only securing our computers, but more importantly: in software that offers users with on-the-spot guidelines on how to act when confronted with potentially threatening events. We can't do it all by ourselves. When IT Security is important we must realize that technology, although very important, is not enough. The time has come to reach out to other scientific disciplines and to join forces.
By providing an elegant and theoretically-founded framework to model complex scenarios, Game Theory has found a variety of applications not only in Economics and Social Sciences, but also in different ﬁelds of Engineering and Information Technologies. In fact, recent literature comprises many effective techniques addressing problems in Computer Vision, Pattern Recognition and Machine Learning from a Game-Theoretical perspective. Moreover, with the recent development of Algorithmic Game Theory, the interest in these communities around Game-Theoretical models and algorithms is growing at a fast pace. The goal of this keynote is to give an introduction to the general setting and to describe the most successful efforts to foster the adoption of such methods to solve a wide range of Pattern Recognition problems. In particular, when dealing with tasks involving the discovery of sparse groups of inliers within a mostly noisy dataset. We shall assume no pre-existing knowledge of game theory by the audience, thereby making the lecture self-contained and understandable by a non
The importance of research publishing can be defined by a simple quote of Gerard Piel, which says “Without publication, science is dead.” The first scientific journal was published in 1665 and we have travelled more than 350 years since then. In the last 20 years, science and reporting of science have undergone revolutionary changes. Computerization and Internet have changed the traditional ways of reading and writing. Hence, it is very important for scientists and students of the sciences in all disciplines to understand the complete process of writing and publishing of scientific paper in good journals. There is also a downside of digital publishing. The principal challenge for publishers is to handle ethical issues and it is of utmost importance for the authors to understand the ethical practices involved in the process. The question is what is right or what is wrong; what is acceptable and what is non-acceptable; what is an error and what are serious scientific fraud. There is no single solution or answer to these questions. There are several government agencies, professional associations and universities have adopted specific codes, rules, and policies relating to research ethics. The talk is designed to highlight different ethical problems, provide information on codes and policies, and also on how to make use of various author services for publishing a genuine work.
Recent research trends in the areas of computational intelligence, communications, data mining, and computational models aim to achieve a multi-disciplinary balance between research advances in the fields of collective intelligence, data science, human-centric computing, knowledge management, and network science. The purpose of the lecture is to give their perspective on the challenges and opportunities that Deep learning presents to Advanced Computing and Systems for Security. Deep learning discovers an intricate structure in large data sets by using complex or compressed attributes. These methods have dramatically improved the state-of-the-art in visual object recognition, object detection, network science and many other domains such as drug discovery and genomics. This talk will discuss some unifying approach for text, image and network data. Then, this talk will provide some real-life Deep learning applications.
The ACSS 2019 authors shall be asked to submit an extended version of their work based on the discussions during the symposium. This extended version will be published as a book-chapter in the bi-volume post-symposium book to be published by Springer. The ACSS book volume(s) are indexed by Thomson Reuters (ISI Proceedings), EI-Compendex, DBLP, SCOPUS and others. Extension of some of the selected papers will also be published in a, Special Issues on Transactions on Computational Science.
Nabendu Chaki, University of Calcutta, Kolkata, India
Khalid Saeed, Warsaw University, Warsaw, Poland
Agostino Cortesi, Ca' Foscari University, Venice, Italy
Rituparna Chaki, University of Calcutta, Kolkata, India
Sankhayan Choudhury, University of Calcutta, Kolkata, India
Amlan Chakrabarti, University of Calcutta, Kolkata, India
Ca' Foscari University, Venice, Italy
Bialystok University of Technology, Poland
Novarun Deb, Ca' Foscari University, Italy
Ayan Dey, University of Calcutta, India
Souvick Das, University of Calcutta, India
Jayadratha Mondal, University of Calcutta, India