<html><head><meta http-equiv="Content-Type" content="text/html charset=utf-8"></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" class="">[Apologies for multiple postings]<br class=""><br class="">DEADLINE EXTENDED (FIRM): July 27, 2018<br class=""><br class="">13th International Conference on Risks and Security of Internet and Systems : CRiSIS 2018<br class=""><br class="">16th-18st October 2018, Arcachon, France<br class=""><br class=""><a href="http://crisis2018.labri.fr" class="">http://crisis2018.labri.fr</a><br class=""><br class=""><br class="">Call for Papers<br class=""><br class="">The International Conference on Risks and Security of Internet and Systems 2018 will be the 13th in a series dedicated to security issues in Internet-related applications, networks and systems. Internet has become essential for the exchange of information between user groups and organizations from different backgrounds and with different needs and objectives. These users are exposed to increasing risks regarding security and privacy, due to the development of more and more sophisticated online attacks, the growth of Cyber Crime, etc. Attackers nowadays do not lack motivation and they are more and more experienced. To make matters worse, for performing attacks have become easily accessible. Moreover, the increasing complexity as well as the immaturity of new technologies such as pervasive, mobile and wireless devices and networks, raise new security challenges.<br class="">In this context, new security mechanisms and techniques should be deployed to achieve an assurance level acceptable for critical domains such as energy, transportation, health, defence, banking, critical infrastructures, embedded systems and networks, avionics systems, etc. The CRiSIS conference offers a remarkable forum for computer and network security actors from industry, academia and government to meet, exchange ideas and present recent advances on Internet-related security threats and vulnerabilities, and on the solutions that are needed to counter them.<br class=""><br class="">Topics<br class=""><br class="">The topics addressed by CRiSIS range from the analysis of risks, attacks to networks and system survivability, to security models, security mechanisms and privacy enhancing technologies. The authors are invited to submit research results as well as practical experiment or deployment reports. Industrial papers about applications or case studies are also welcomed in different domains (e.g., telemedicine, banking, e-government, e-learning, e-commerce, critical infrastructures, mobile networks, embedded applications, etc.). The list of topics includes but is not limited to:<br class=""><br class="">-<span class="Apple-tab-span" style="white-space: pre;"> </span>Analysis and management of risk<br class="">-<span class="Apple-tab-span" style="white-space: pre;"> </span> Attacks and defenses<br class="">-<span class="Apple-tab-span" style="white-space: pre;"> </span>Attack data acquisition and network monitoring<br class="">-<span class="Apple-tab-span" style="white-space: pre;"> </span>Cryptography, biometrics, watermarking<br class="">-<span class="Apple-tab-span" style="white-space: pre;"> </span>Dependability and fault tolerance of Internet applications<br class="">-<span class="Apple-tab-span" style="white-space: pre;"> </span>Distributed systems security and safety<br class="">-<span class="Apple-tab-span" style="white-space: pre;"> </span>Embedded system security and safety<br class="">-<span class="Apple-tab-span" style="white-space: pre;"> </span>Empirical methods for security and risk evaluation<br class="">-<span class="Apple-tab-span" style="white-space: pre;"> </span>Hardware-based security and physical security<br class="">-<span class="Apple-tab-span" style="white-space: pre;"> </span>Intrusion detection and prevention systems<br class="">-<span class="Apple-tab-span" style="white-space: pre;"> </span>Organizational, ethical and legal issues<br class="">-<span class="Apple-tab-span" style="white-space: pre;"> </span>Privacy protection and anonymization<br class="">-<span class="Apple-tab-span" style="white-space: pre;"> </span>Risk-aware access and usage control<br class="">-<span class="Apple-tab-span" style="white-space: pre;"> </span>Security and risk assessment<br class="">-<span class="Apple-tab-span" style="white-space: pre;"> </span>Security and risks metrics<br class="">-<span class="Apple-tab-span" style="white-space: pre;"> </span>Security and dependability of operating systems<br class="">-<span class="Apple-tab-span" style="white-space: pre;"> </span>Security and safety of critical infrastructures<br class="">-<span class="Apple-tab-span" style="white-space: pre;"> </span>Security and privacy of peer-to-peer system<br class="">-<span class="Apple-tab-span" style="white-space: pre;"> </span>Security and privacy of wireless networks<br class="">-<span class="Apple-tab-span" style="white-space: pre;"> </span>Security models and security policies<br class="">-<span class="Apple-tab-span" style="white-space: pre;"> </span>Security of new generation networks, security of VoIP and multimedia<br class="">-<span class="Apple-tab-span" style="white-space: pre;"> </span>Security of e-commerce, electronic voting and database systems<br class="">-<span class="Apple-tab-span" style="white-space: pre;"> </span>Security of social networks<br class="">-<span class="Apple-tab-span" style="white-space: pre;"> </span>Security of industrial control systems<br class="">-<span class="Apple-tab-span" style="white-space: pre;"> </span>Smartphone security and privacy<br class="">-<span class="Apple-tab-span" style="white-space: pre;"> </span>Traceability, metrology and forensics<br class="">-<span class="Apple-tab-span" style="white-space: pre;"> </span>Trust management<br class="">-<span class="Apple-tab-span" style="white-space: pre;"> </span>Use of smart cards and personal devices for Internet applications<br class="">-<span class="Apple-tab-span" style="white-space: pre;"> </span>Web and cloud security<br class=""><br class="">Paper submission<br class=""><br class="">Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be written in English and must be submitted electronically in PDF format. <br class=""><br class="">The papers that will be selected for presentation at the conference will be included in post-proceedings published by Springer in the Lecture Notes in Computer Science (LNCS) series (prior to publication the papers should be revised according to the review comments). Pre-proceedings will appear at the time of the conference. <br class=""><br class="">Maximum paper length will be 16 printed pages for full papers or 6 pages for short papers, in LNCS style (<a href="http://www.springer.de/comp/lncs/authors.html" class="">http://www.springer.de/comp/lncs/authors.html</a>). Authors of accepted papers must guarantee that their papers will be presented at the conference. All paper submissions will be handled through the Easy Chair conference management system: <a href="https://easychair.org/conferences/?conf=crisis2018" class="">https://easychair.org/conferences/?conf=crisis2018</a>.<br class=""><br class=""><br class="">IMPORTANT DATES:<br class="">* Submission deadline: <strike class="">July 6th, 2018, </strike>EXTENDED (FIRM): July 27, 2018<br class="">* Notification to authors: August 17th, 2018<br class="">* Camera-ready versions: September 7th, 2018<br class="">* Conference dates: October 16th-18th, 2018<br class=""><br class=""><br class="">General Chairs<br class=""><br class="">- Jean Louis Lanet, LHS Rennes, France<br class="">- Mohamed Mosbah, LaBRI, Bordeaux INP, France<br class=""><br class="">PC Chairs<br class=""><br class="">- Nora Cuppens, IMT Atlantique, France<br class="">- Akka Zemmari, LaBRI , Univ. Bordeaux, France<br class=""><br class="">Publicity Chairs <br class=""><br class="">- Mohamed Mosbah, Bordeaux INP, France<br class="">- Reda Yaich, IMT Atlantique, France<br class=""><br class="">Sponsor and Publication Chairs<br class=""><br class="">- Frédéric Cuppens, IMT Atlantique, France<br class="">- Axel Legay, INRIA, France<br class=""><br class="">Local Organization<br class=""><br class="">- Auriane DANTES, LaBRI, France<br class="">- Mohamed Mosbah, LaBRI, France (co-chair)<br class="">- Sofian Maabout, LaBRI, France<br class="">- Akka Zemmari, LaBRI, France (co-chair)<br class="">- Nadia Chaabouni, LaBRI, France<br class="">- Charazed Ksouri, LaBRI, France<br class="">- Ghislaine Le Gall, IMT Atlantique, France<br class=""><br class="">Program Committee <br class=""><br class="">- Esma Aimer, University of Montreal<br class="">- Luca Allodi ,University of Torento<br class="">- Jocelyn Aubert, Luxembourg Institute of Science and Technology<br class="">- Fabrizio Biondi, IRISA/INRIA Rennes<br class="">- Anis Bkakria, IMT Atlantique<br class="">- Yu Chen, State University of New York Binghamton<br class="">- Nora Cuppens-Boulahia,IMT Atlantique, France (Co-chair)<br class="">- Frédéric Cuppens, IMT Atlantique, France<br class="">- Imen Jemili, Faculté des Sciences, Bizerte, Tunisia<br class="">- Jose M. Fernandez, Ecole Polytechnique de Montreal<br class="">- Manoj Singh Gaur, IIT Jammu, India<br class="">- Bogdan Groza, Politehnica University of Timisoara<br class="">- Ruan He, Orange<br class="">- Christos Kalloniatis, University of the Aegean<br class="">- Sokratis Katsikas, Center for Cyber and Information Security, NTNU<br class="">- Nizar Kheir, Thales Group<br class="">- Igor Kotenko, St. Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences (SPIIRA)<br class="">- Marc Lacoste, Orange<br class="">- Kostas Lambrinoudakis, University of Piraeus<br class="">- Jean-Louis Lanet, LHS Rennes, France<br class="">- Mohamed Mosbah, LaBRI, Bordeaux INP, France<br class="">- Raja Natarajan, TIFR, India<br class="">- Stephen Neville, University of Victoria<br class="">- Roberto Di Pietro, Bell Labs<br class="">- Kai Rannenberg, Goethe University Frankfurt <br class="">- Michael Rusinowitch, LORIA INRIA Nancy<br class="">- Ketil Stoelen, SINTEF<br class="">- Nadia Tawbi, Université de Laval<br class="">- Akka Zemmari, LaBRI - Université de Bordeaux (Co-chair)<br class="">- Lingyu Wang, Concordia University<br class=""></body></html>