Papers, special sessions, tutorials, and workshops addressing all aspects of security in information and networks are being sought. Researchers and industrial practitioners working on the following and related subjects are especially encouraged: development and realization of cryptographic solutions, security schemes, new algorithms; critical analysis of existing approaches; secure information systems, especially distributed control and processing applications, and security in networks; interoperability, service levels and quality issues in such systems; information assurance, security, and public policy; detection and prevention of cybercrimes such as fraud and phishing; next generation network architectures, protocols, systems and applications; industrial experiences and challenges of the above. Doctoral students are encouraged to propose papers on ongoing research. 

Original papers will be considered; submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any other conference or workshop that has proceedings. All submitted papers will be reviewed by at least three members of the program committee judging its originality, significance, correctness, presentation and relevance. Authors are also encouraged to propose position papers on practical studies and experiments, critique of existing work, emerging issues, and novel ideas under development.  

Enterprises and research centers developing, implementing, or using security tools and frameworks are encouraged to propose application / tool demo.  

Proposals of half-day tutorials on fundamental to advanced subjects covering practical implementation aspects of security are welcome. 

Proposals of special session(s) to be held in the main conference are welcome. 

Proposals are invited for workshops to be held in conjunction with SIN 2015 Conference. The workshop proposal theme should be closely related to the conference topics. 

Broad areas of interest in security theory, technology and applications will include, but are not limited to, the following:  

  • Access control and intrusion detection
  • Security of cyber-physical systems
  • Autonomous and adaptive security
  • Security tools and development platforms
  • Computational intelligence techniques in security
  • Security ontology, models, protocols & policies
  • Computer network defense
  • Standards, guidelines and certification
  • Cryptographic techniques and key management
  • Security-aware software engineering
  • Industrial applications of security
  • Trust and privacy
  • Information assurance
  • Next generation network architectures
  • Malware analysis
  • Network security and protocols
  • Security challenges in Mobile/Embedded Systems
  • Cloud security
  • Security Awareness and Education



Papers must be submitted electronically via the SIN 2015 Submission Site at Title, author's name(s), affiliation, mailing address, telephone, fax and email of the principal author should be included. Maximum length for the proceedings is 8 pages for full paper, 4 pages for short paper, 2 pages for fast abstract and position statement, and 2 pages for demo and tutorial proposals. Extra page charges apply. All papers should be written according to double-column ACM conference format (  

If you would like to submit a paper to one of the special sessions, please use the same Submission Site, choose "Main Conference" as a track of your paper, and then select the subject area of your paper as either "[Special Session] Detecting and Preventing Fraud with Data Analytics" or "[Special Session] Cybersecurity of Large-Scale and Distributed Systems".

All proposals for organizing workshops, tutorials, demos, and special sessions are expected at the conference e-mail This email address is being protected from spambots. You need JavaScript enabled to view it.

All accepted papers will be published by ACM Press in a conference proceedings and placed into ACM Digital Library. Extended versions of selected papers will be invited for possible publication in a special issue of the International Journal of Information Security and Privacy (IJISP) by IGI Global ( Each accepted paper must be registered to be included in the proceedings. Papers not presented during the conference may be removed from the online proceedings.