From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail2-relais-roc.national.inria.fr (mail2-relais-roc.national.inria.fr [192.134.164.83]) by c5ff346549e7 (Postfix) with ESMTP id 1BCD62DF6 for ; Sun, 16 Jun 2019 17:39:00 +0000 (UTC) X-IronPort-AV: E=Sophos;i="5.63,382,1557180000"; d="scan'208,217";a="387643527" Received: from sympa.inria.fr ([193.51.193.213]) by mail2-relais-roc.national.inria.fr with ESMTP; 16 Jun 2019 19:38:56 +0200 Received: by sympa.inria.fr (Postfix, from userid 20132) id 7F79B826E6; Sun, 16 Jun 2019 19:38:56 +0200 (CEST) Received: from mail3-relais-sop.national.inria.fr (mail3-relais-sop.national.inria.fr [192.134.164.104]) by sympa.inria.fr (Postfix) with ESMTPS id A4DCF8247D for ; Sun, 16 Jun 2019 19:38:42 +0200 (CEST) Authentication-Results: mail3-smtp-sop.national.inria.fr; spf=None smtp.pra=saoussen.cheikhrouhou@redcad.org; spf=SoftFail smtp.mailfrom=saoussen.cheikhrouhou@redcad.org; spf=None smtp.helo=postmaster@mail-yw1-f68.google.com IronPort-PHdr: =?us-ascii?q?9a23=3A9KHKyxet2A6beCEeNaNcXvAplGMj4u6mDksu8pMi?= =?us-ascii?q?zoh2WeGdxcW9bR7h7PlgxGXEQZ/co6odzbaP6ua5BzFLuM/f+Fk5M7V0Hycfjs?= =?us-ascii?q?sXmwFySOWkMmbcaMDQUiohAc5ZX0Vk9XzoeWJcGcL5ekGA6ibqtW1aFRrwLxd6?= =?us-ascii?q?KfroEYDOkcu3y/qy+5rOaAlUmTaxe7x/IAiroQnLq8UbgItvJqksxhfUo3ZDZv?= =?us-ascii?q?hby35vKV+PhRj3+92+/IRk8yReuvIh89BPXKDndKkmTrJWESorPXkt6MLkqRfM?= =?us-ascii?q?Qw2P5mABUmoNiRpHHxLF7BDhUZjvtCbxq/dw1zObPc3ySrA0RCii4qJ2QxLmlC?= =?us-ascii?q?sLKzg0+3zQhcxtiqJUvROhpwdjzI7QZ4GVL+Rxcb7Adt8eSmdNQsNdWipcCY2+?= =?us-ascii?q?coQPFfIMMulYoYfzpFUAsAexCBS3Cez11jNFnGX70bEm3+kjFwzNwQwuH8gJsH?= =?us-ascii?q?TRtNj7KbsfX/m7w6fV0DvNYOtY0irj5YbKfR4vovSCU7Bsf8TIx0YhFRrLgVuN?= =?us-ascii?q?ooHiJDOazOMNs3WA7+p7S+2vjXQrpB1xojexx8csiYnJhpgSylDZ9SV5x5s1KM?= =?us-ascii?q?aiSEFlfNGrDIFfuDyAO4txWMMiTHhltSAnwbMIvp67eTIFyJUhxxPHcfyIbZWH?= =?us-ascii?q?7Q75W+mMOzt4g2hleL2nixms60eg0e39WdW00FlQrypFiMPAtncX1xzc8sSIVP?= =?us-ascii?q?598Vm72TmV0wDc9+5EIVozlarGM54h2qMwmYEXsUTCBS/2mET2jKmZdkk+5ueo?= =?us-ascii?q?7OHnbq39pp+ELY90iwf+MqswlcylG+g3LxYBUm6G8uq/zL3u5VP1TKlOg/Eska?= =?us-ascii?q?TUsIrWKdkaq6KkGQNY04Uu5hCiBDm8ytsYh2MILFdddRKHkYfpP1bOLej9Dfil?= =?us-ascii?q?glSslC5nxvDIP7H8G5nNIHnOnbT7cbZy7E5czwUzzdRB6J5OFr4BJ/fzVlfwtN?= =?us-ascii?q?zeEBA5LxS5z/j7BNh5zI8TWmKCDrWEPK7TrFOE/OMiLuqUaI8Qojn9Kvwl5/D0?= =?us-ascii?q?jX8+nF8QZbKp0oEQaHClBfRmOFuWYXz2jtgdEWcFoAs+TO/qiF2YVj5TenayX6?= =?us-ascii?q?Uh5jwgEoKpE5rMSZy3j7Ocxiu7GYdWZm9eBlCWDXjob5mEW+sLaC+KPsBuiDkE?= =?us-ascii?q?Vby4R48l1BGurxP6xqF8LuvU/y0YrYjs2MJ05+3VjxEy9CZ7A96T02GXHClImT?= =?us-ascii?q?YVQTM3x6t7pldwxhKZ3KN5m/1VE8BItaAafB09MMvn5stHMOvffErqXvqoa3ac?= =?us-ascii?q?ZeiGJgx5Gsk4xMIVeEt7Xd6igxHA3zCtHr8SipSRCZA/+66a2GL+cZUug03a3b?= =?us-ascii?q?Us2gF1CvBEMner0/InrlSBN8vyi0yc0p2SW+EExieUrjWZwGaFtU0eVxR/A/2c?= =?us-ascii?q?ACIvI3DOpNG83XvsCr+jDbN9b1lEwM+Gb7pVM5jn0wUAS/DkN9DTJWm2njXoXE?= =?us-ascii?q?fa9va3dIPvPl4l8mDYAUkAnRoU+C/cZxIzCiyoryTZFjM8Tl8=3D?= X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AqBQBLfgZdekShVdFQFoRQQoEEKINWQ?= =?us-ascii?q?IEdgi2PK4UXj1kBhyQDVAkBAwEMJQoBAYN6RoJOGwwFLxMBAwEBBAEBAgEBAwE?= =?us-ascii?q?TAQEJCwwHKSMLAYI6DBqCYhsRBh0BAR4GAgUNGA03AiQSAQUBKAEnQIJHAYIKD?= =?us-ascii?q?4o+kA48ii9xgTGCeQEBBYVkgT0JEoEiiRWCSYFXP4ERhhgOCwECARiBBRtUgl0?= =?us-ascii?q?UgkSLbSOdQQ4HAh+Bc16Fao0KG3eCGYMUkQsBhA2KJ4YLi3CCGYFRDyGBHCplg?= =?us-ascii?q?RR9QzEGZwqBRAmBDoRoM4RhhUBBMAGNDoJSAQE?= X-IPAS-Result: =?us-ascii?q?A0AqBQBLfgZdekShVdFQFoRQQoEEKINWQIEdgi2PK4UXj1k?= =?us-ascii?q?BhyQDVAkBAwEMJQoBAYN6RoJOGwwFLxMBAwEBBAEBAgEBAwETAQEJCwwHKSMLA?= =?us-ascii?q?YI6DBqCYhsRBh0BAR4GAgUNGA03AiQSAQUBKAEnQIJHAYIKD4o+kA48ii9xgTG?= =?us-ascii?q?CeQEBBYVkgT0JEoEiiRWCSYFXP4ERhhgOCwECARiBBRtUgl0UgkSLbSOdQQ4HA?= =?us-ascii?q?h+Bc16Fao0KG3eCGYMUkQsBhA2KJ4YLi3CCGYFRDyGBHCplgRR9QzEGZwqBRAm?= =?us-ascii?q?BDoRoM4RhhUBBMAGNDoJSAQE?= X-IronPort-AV: E=Sophos;i="5.63,382,1557180000"; d="scan'208,217";a="309416424" X-MGA-submission: =?us-ascii?q?MDEBA7H3tqwZZeAPOvnFBnGlmRguMawIdjuvO3?= =?us-ascii?q?mFBCv/XvLGLFS57Xk2hD8pgmDidc/QoTKlRIOYY6hWOH5jgfp12ZmEoZ?= =?us-ascii?q?x2Y/9mbW6UC0ek/X3Ya8jTA30OjbW5tnryXYadFQKxeCRA/0EXsCus7b?= =?us-ascii?q?Zipi+M/z/UtiwX3WofZSWT7Q=3D=3D?= Received: from mail-yw1-f68.google.com ([209.85.161.68]) by mail3-smtp-sop.national.inria.fr with ESMTP/TLS/AES128-GCM-SHA256; 16 Jun 2019 19:38:40 +0200 Received: by mail-yw1-f68.google.com with SMTP id b143so3881298ywb.7 for ; Sun, 16 Jun 2019 10:38:40 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redcad-org.20150623.gappssmtp.com; s=20150623; h=mime-version:from:date:message-id:subject:to; bh=KihAVJA08OM9Y725m8Ioo9JHn8nJJsHxdmeovihB3f0=; b=OEzymm1fLGu+syt9mpYX+n9T5C4r3pwdbikpAaYQAyzHG33r6laBEvdeXsCZs7apdZ Ypw5ToiK1Aq/o5T5BRIf03WTMLpmLER16PiX9pg7Exu6my90ulkSe2Tya91cy2XcAv0X RmuQJEhLt+tCNzA1DP1c4a7XJtxY7XvevozISkMm29L0fE2lHp9Zbo8Ci8N7M6S5rAPB M7/AMeODyQ+pXRIIcIe9R7MWsd/UtIyRhkCyKcdXgsnJ2dn+2mzTNqIpJ6n3ekYiTIPJ rQpoJRZ5ImjL+bc1Q9GJN5+uUH+n0faNzJG+wyhtbNXxX0AOjs4X38pf+SsYsF3TloF1 IvsA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=KihAVJA08OM9Y725m8Ioo9JHn8nJJsHxdmeovihB3f0=; b=PhaBTmIZhAIiNDhx6RG1puKb6Eim3A2OoggzlzSDPEIa9VYi9fwC9fJwkRCprmPF2J laWS7vHS63I5sTCzUk+wkTu3IHgnwWVlOegtOVFGMOxe1ToIxlP3Bnj3Fjal7T2Bvokl L8j80LvfVvWuPKo8UdtL4oXQLp4Fpxgp5IB+0RRcQycK8qVJpt+sJFefCf49ENZqKnBZ o1hqgFNC5tYJgCCAqjo8YmNF/sPaCfX+tsSdsWW6yWK9zTGtJRT3DLMLNz+owD9YJeNZ /4iaqJhV1lutnmpi1Mhagx9FgOaKrYmDK/CeSjSQJD/gQ6XpZTJ7gOacYmfHKJxQkf5i DDEA== X-Gm-Message-State: APjAAAUhiFxPP+Mv0rcsSTpXzqtExIC/3vlIMr3Wqd7Q2iqk7tJLOKS4 cAYVjyBZ9B0LG73CX0lGkUd6275wQQC6OlR1wlJsyg== X-Google-Smtp-Source: APXvYqxOTvKINSKZYrOqWjg7UlfTlvdhf6NXgxdWQjwQGVAjYIZElXhLrNO6f8qa2dkpedAudmRhtt2hK+mVzRKGSe4= X-Received: by 2002:a81:6082:: with SMTP id u124mr49893165ywb.241.1560706719192; Sun, 16 Jun 2019 10:38:39 -0700 (PDT) MIME-Version: 1.0 From: SAOUSSEN CHEIKHROUHOU Date: Sun, 16 Jun 2019 18:39:38 +0100 Message-ID: To: undisclosed-recipients:; Content-Type: multipart/alternative; boundary="00000000000098b37f058b74592d" Subject: [Caml-list] CFP - CRISiS 2019 - Deadline extension and Special issue Reply-To: SAOUSSEN CHEIKHROUHOU X-Loop: caml-list@inria.fr X-Sequence: 17621 Errors-to: caml-list-owner@inria.fr Precedence: list Precedence: bulk Sender: caml-list-request@inria.fr X-no-archive: yes List-Id: List-Archive: List-Help: List-Owner: List-Post: List-Subscribe: List-Unsubscribe: --00000000000098b37f058b74592d Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Call for papers The 14th International Conference on Risks and Security of Internet and Systems (CRiSIS) 29-31 October 2019, Hammamet, Tunisia http://crisis2019.redcad.org The International Conference on Risks and Security of Internet and Systems 2019 will be the 14th in a series dedicated to security issues in Internet-related applications, networks and systems. Internet has become essential for the exchange of information between user groups and organizations from different backgrounds and with different needs and objectives. These users are exposed to increasing risks regarding security and privacy, due to the development of more and more sophisticated online attacks, the growth of Cyber Crime, etc. Attackers nowadays do not lack motivation and they are more and more experienced. To make matters worse, for performing attacks have become easily accessible. Moreover, the increasing complexity as well as the immaturity of new technologies such as pervasive, mobile and wireless devices and networks, raise new security challenges. In this context, new security mechanisms and techniques should be deployed to achieve an assurance level acceptable for critical domains such as energy, transportation, health, defence, banking, critical infrastructures, embedded systems and networks, avionics systems, etc. The CRiSIS conference offers a remarkable forum for computer and network security actors from industry, academia and government to meet, exchange ideas and present recent advances on Internet-related security threats and vulnerabilities, and on the solutions that are needed to counter them. =3D=3D=3D IMPORTANT DATES =3D=3D=3D - Submission deadline: June 21, 2019 (Extended) - Notification to authors: July 20, 2019 - Camera-ready versions: September 22, 2019 - Conference dates: October 29-31, 2019 =3D=3D=3D SPECIAL ISSUE =3D=3D=3D Selected papers relevant to business, human and organisational aspects of cybersecurity will be invited to submit extended versions for publication in Information and Computer Security Journal http://emeraldgrouppublishing.com/products/journals/journals.htm?id=3Dics =3D=3D=3D TOPICS =3D=3D=3D The topics addressed by CRiSIS range from the analysis of risks, attacks to networks and system survivability, to security models, security mechanisms and privacy enhancing technologies. The authors are invited to submit research results as well as practical experiment or deployment reports. Industrial papers about applications or case studies are also welcomed in different domains (e.g., telemedicine, banking, e-government, e-learning, e-commerce, critical infrastructures, mobile networks, embedded applications, etc.). The list of topics includes but is not limited to: - Analysis and management of risk - Attacks and defenses - Attack data acquisition and network monitoring - Cryptography, biometrics, watermarking - Dependability and fault tolerance of Internet applications - Distributed systems security and safety - Embedded system security and safety - Empirical methods for security and risk evaluation - Hardware-based security and physical security - Intrusion detection and prevention systems - Organizational, ethical and legal issues - Privacy protection and anonymization - Risk-aware access and usage control - Security and risk assessment - Security and risks metrics - Security and dependability of operating systems - Security and safety of critical infrastructures - Security and privacy of peer-to-peer system - Security and privacy of wireless networks - Security models and security policies - Security of new generation networks, security of VoIP and multimedia - Security of e-commerce, electronic voting and database systems - Security of social networks - Security of industrial control systems - Smartphone security and privacy - Traceability, metrology and forensics - Trust management - Use of smart cards and personal devices for Internet applications - Web and cloud security =3D=3D=3D PAPER SUBMISSION =3D=3D=3D Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be written in English and must be submitted electronically in PDF format. The papers that will be selected for presentation at the conference will be included in post-proceedings published by Springer in the Lecture Notes in Computer Science (LNCS) series (prior to publication the papers should be revised according to the review comments). Pre-proceedings will appear at the time of the conference. Maximum paper length will be 16 printed pages for full papers or 6 pages for short papers, in LNCS style ( http://www.springer.de/comp/lncs/authors.html). Authors of accepted papers must guarantee that their papers will be presented at the conference. All paper submissions will be handled through the EasyChair conference management system: https://easychair.org/conferences/?conf=3Dcrisis2019 =3D=3D=3D Proceedings =3D=3D=3D The proceedings will be published as a volume of Springer's LNCS series. =3D=3D=3D GENERAL CHAIRS =3D=3D=3D Nora Cuppens, IMT Atlantique, France Ahmed Hadj Kacem, University of Sfax, Tunisia =3D=3D=3D PC CHAIRS =3D=3D=3D Fr=C3=A9d=C3=A9ric Cuppens, IMT Atlantique, France Slim Kallel, University of Sfax, Tunisia =3D=3D=3D PUBLICATION CHAIRS =3D=3D=3D Nora Cuppens, IMT Atlantique, France Mohamed Mosbah, Bordeaux INP, France =3D=3D=3D PUBLICITY CHAIRS =3D=3D=3D Saoussen Cheikhrouhou, University of Sfax, Tunisia Reda Yaich, IRT SystemX, France =3D=3D=3D LOCAL ORGANISATION COMMITTEE=3D=3D=3D Nesrine Khabou, University of Sfax, Tunisia Fairouz Fakhfekh, University of Sfax, Tunisia Riadh Ben Halima, University of Sfax, Tunisia Ismail Bouassida, University of Sfax, Tunisia Hatem Hadj Kacem, University of Sfax, Tunisia =3D=3D=3D PROGRAM COMMITTEE =3D=3D=3D Takoua Abdellatif, University of Carthage, Tunisia Esma Aimeur, University of Montreal, Canada Abderrahim Ait Wakrime, IRT Railenium, France Jocelyn Aubert, University of Luxembourg, Luxembourg Anis Bkakria, University of Bretagne Loire, France Nora Cuppens-Boulahia, University of Bretagne Loire, France Fr=C3=A9d=C3=A9ric Cuppens, University of Bretagne Loire, France Bogdan Groza, Politehnica University of Timisoara, Romania Wided Guedria, Luxembourg Institute of Science and Technology, Luxembourg Brahim Hamid, University of Toulouse, France Christos Kalloniatis, University of the Aegean, Greece Sokratis Katsikas, Norwegian University of Science and Technology, Norway Kais Klai, University of Paris 13, France Igor Kotenko, St. Petersburg Institute for Informatics and Automation, Russia Marc Lacoste, Orange labs, France Jean-Louis Lanet, LHS Rennes, France Mohamed Mosbah, University of Bordeaux, France Raja Natarajan, Tata Institute of Fundamental Research, India Roberto Di Pietro, Hamad Bin Khalifa University, Qatar Kai Rannenberg, Goethe University Frankfurt, Germany Michael Rusinowitch, Lorraine University, France Ketil Stoelen, University of Oslo, Norway Akka Zemmari, Universit=C3=A9 of Bordeaux, France Lingyu Wang, Concordia University, Canada --00000000000098b37f058b74592d Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable
Call for papers

The 14th International Conference o= n Risks and Security of Internet and Systems (CRiSIS)
29-31 October 2019= , Hammamet, Tunisia

http://= crisis2019.redcad.org

The International Conference on Risks and = Security of Internet and Systems 2019 will be the 14th in a series dedicate= d to security issues in Internet-related applications, networks and systems= . Internet has become essential for the exchange of information between use= r groups and organizations from different backgrounds and with different ne= eds and objectives. These users are exposed to increasing risks regarding s= ecurity and privacy, due to the development of more and more sophisticated = online attacks, the growth of Cyber Crime, etc. Attackers nowadays do not l= ack motivation and they are more and more experienced. To make matters wors= e, for performing attacks have become easily accessible. Moreover, the incr= easing complexity as well as the immaturity of new technologies such as per= vasive, mobile and wireless devices and networks, raise new security challe= nges.

In this context, new security mechanisms and techniques should= be deployed to achieve an assurance level acceptable for critical domains = such as energy, transportation, health, defence, banking, critical infrastr= uctures, embedded systems and networks, avionics systems, etc. The CRiSIS c= onference offers a remarkable forum for computer and network security actor= s from industry, academia and government to meet, exchange ideas and presen= t recent advances on Internet-related security threats and vulnerabilities,= and on the solutions that are needed to counter them.


=3D=3D=3D= IMPORTANT DATES =3D=3D=3D
- Submission deadline: June 21, 2019 (Extend= ed)
- Notification to authors: July 20, 2019
- Camera-ready versions:= September 22, 2019
- Conference dates: October 29-31, 2019

=3D= =3D=3D SPECIAL ISSUE =3D=3D=3D
Selected papers relevant to business, hum= an and organisational aspects of cybersecurity will be invited to submit ex= tended versions for publication in Information and Computer Security Journa= l
http://emeraldgrouppublishing.com/products/journals/journal= s.htm?id=3Dics


=3D=3D=3D TOPICS =3D=3D=3D
The topics addr= essed by CRiSIS range from the analysis of risks, attacks to networks and s= ystem survivability, to security models, security mechanisms and privacy en= hancing technologies. The authors are invited to submit research results as= well as practical experiment or deployment reports. Industrial papers abou= t applications or case studies are also welcomed in different domains (e.g.= , telemedicine, banking, e-government, e-learning, e-commerce, critical inf= rastructures, mobile networks, embedded applications, etc.). The list of to= pics includes but is not limited to:
- Analysis and management of risk<= br>- Attacks and defenses
- Attack data acquisition and network monitori= ng
- Cryptography, biometrics, watermarking
- Dependability and fault= tolerance of Internet applications
- Distributed systems security and s= afety
- Embedded system security and safety
- Empirical methods for s= ecurity and risk evaluation
- Hardware-based security and physical secur= ity
- Intrusion detection and prevention systems
- Organizational, et= hical and legal issues
- Privacy protection and anonymization
- Risk-= aware access and usage control
- Security and risk assessment
- Secur= ity and risks metrics
- Security and dependability of operating systems<= br>- Security and safety of critical infrastructures
- Security and priv= acy of peer-to-peer system
- Security and privacy of wireless networks- Security models and security policies
- Security of new generation n= etworks, security of VoIP and multimedia
- Security of e-commerce, elect= ronic voting and database systems
- Security of social networks
- Sec= urity of industrial control systems
- Smartphone security and privacy- Traceability, metrology and forensics
- Trust management
- Use of = smart cards and personal devices for Internet applications
- Web and clo= ud security


=3D=3D=3D PAPER SUBMISSION =3D=3D=3D
Submitted p= apers must not substantially overlap with papers that have been published o= r that are simultaneously submitted to a journal or a conference with proce= edings. Papers must be written in English and must be submitted electronica= lly in PDF format.

The papers that will be selected for presentation= at the conference will be included in post-proceedings published by Spring= er in the Lecture Notes in Computer Science (LNCS) series (prior to publica= tion the papers should be revised according to the review comments). Pre-pr= oceedings will appear at the time of the conference.

Maximum paper = length will be 16 printed pages for full papers or 6 pages for short papers= , in LNCS style (= http://www.springer.de/comp/lncs/authors.html). Authors of accepted pap= ers must guarantee that their papers will be presented at the conference. A= ll paper submissions will be handled through the EasyChair conference manag= ement system: https://easychair.org/conferences/?conf=3Dcrisis2019

=3D=3D= =3D Proceedings =3D=3D=3D
The proceedings will be published as a volume= of Springer's LNCS series.


=3D=3D=3D GENERAL CHAIRS =3D=3D= =3D
Nora Cuppens, IMT Atlantique, France =C2=A0
Ahmed Hadj Kacem, Uni= versity of Sfax, Tunisia

=3D=3D=3D PC CHAIRS =3D=3D=3D
Fr=C3=A9d= =C3=A9ric Cuppens, IMT Atlantique, France
Slim Kallel, University of Sfa= x, Tunisia

=3D=3D=3D PUBLICATION CHAIRS =3D=3D=3D =C2=A0
Nora Cu= ppens, IMT Atlantique, France
Mohamed Mosbah, Bordeaux INP, France
=3D=3D=3D PUBLICITY CHAIRS =3D=3D=3D =C2=A0
Saoussen Cheikhrouhou, Uni= versity of Sfax, Tunisia
Reda Yaich, IRT SystemX, France

=3D=3D= =3D LOCAL ORGANISATION COMMITTEE=3D=3D=3D =C2=A0
Nesrine Khabou, Univers= ity of Sfax, Tunisia
Fairouz Fakhfekh, University of Sfax, Tunisia
= Riadh Ben Halima, University of Sfax, Tunisia
Ismail Bouassida, Univers= ity of Sfax, Tunisia
Hatem Hadj Kacem, University of Sfax, Tunisia
=3D=3D=3D PROGRAM COMMITTEE =3D=3D=3D =C2=A0
Takoua Abdellatif, Univer= sity of Carthage, Tunisia
Esma Aimeur, University of Montreal, Canada Abderrahim Ait Wakrime, IRT Railenium, France
Jocelyn Aubert, Univers= ity of Luxembourg, Luxembourg
Anis Bkakria, University of Bretagne Loir= e, France
Nora Cuppens-Boulahia, University of Bretagne Loire, France <= br>Fr=C3=A9d=C3=A9ric Cuppens, University of Bretagne Loire, France
Bog= dan Groza, Politehnica University of Timisoara, Romania
Wided Guedria, = Luxembourg Institute of Science and Technology, Luxembourg
Brahim Hamid= , University of Toulouse, France
Christos Kalloniatis, University of the= Aegean, Greece
Sokratis Katsikas, Norwegian University of Science and = Technology, Norway
Kais Klai, University of Paris 13, France
Igor Ko= tenko, St. Petersburg Institute for Informatics and Automation, Russia
= Marc Lacoste, Orange labs, France
Jean-Louis Lanet, LHS Rennes, France =
Mohamed Mosbah, University of Bordeaux, France
Raja Natarajan, Tata= Institute of Fundamental Research, India
Roberto Di Pietro, Hamad Bin = Khalifa University, Qatar
Kai Rannenberg, Goethe University Frankfurt, = Germany
Michael Rusinowitch, Lorraine University, France
Ketil Stoe= len, University of Oslo, Norway
Akka Zemmari, Universit=C3=A9 of Bordea= ux, France
Lingyu Wang, Concordia University, Canada=C2=A0
--00000000000098b37f058b74592d--