Instructions for Authors of Accepted Papers
Please revise your paper carefully according to the comments of the reviewers. Papers must be formatted according to the guidelines of Springer Communications in Computer and Information Science (CCIS) Series. Failure to do so may result in the exclusion of your paper from the proceedings. Please read the authors' instructions carefully before preparing your papers.
Each paper is allowed to have 15 pages in the final camera-ready copy. However extra page charges will be applicable for papers exceeding 9 pages.
Before uploading your camera ready paper, please:
- Check that title and abstract in EDAS match your camera-ready paper exactly.
- Use only Title Case for the paper title, i.e. capitalising all main words.
- Do not use academic titles such as Dr., Professor, HoD, Director etc...in your final paper.
- Compare all author names in EDAS with the author list in your paper. They MUST BE identical and in the same order.This is very important because we will be using the information provided in EDAS to generate the final conference program and the table of contents for Springer Proceedings.
- The abstract and title should be readable stand-alone and not contain any references or unexplained acronyms.
- You are allowed to modify abstract and author list yourself. You cannot modify the title for the paper, please send a mail to sscc2014.icacci@gmail.com if that is necessary and give a valid reason.
Important Steps
1.Complete your registration.
The instructions for completing your registration are posted at http://icacci-conference.org/sscc2014/registration.html
2. Login to EDAS and choose your paper.
3. Enter Registration Code Printed on the Receipt.
4. Upload your Camera ready paper (Final Manuscript) in PDF format on EDAS.
5. Upload the source files of your camera ready paper (WORD or Latex) on EDAS. All Latex files should be submitted as a single zipped file.

The camera ready paper should be formatted according to the Springer template. This template can be downloaded here:
6. Submit the copyright form in PDF or image formats from the "Copyright" column in the My papers table or the individual paper page of EDAS.
Each contribution must be accompanied by a Springer copyright form. One author may sign on behalf of all of the authors of a particular paper. In this case, the author signs for and accepts responsibility for releasing the material on behalf of any and all co-authors.
Please make sure that you have entered the following details in the copyright form:
- Title of the Book/Volume/Conference: International Symposium on Security in Computing and Communications (SSCC’14)
- Volume Editors: Jaime Lloret Mauri, S M Thampi, Di Jin, and Danda B. Rawat
- Title of Contribution: (Your Paper Title)
- Author(s) name(s):
- Corresponding Author's name, address, affiliation and e-mail:
- Signature of Corresponding Author:
- International Journal of Trust Management in Computing and Communications (IJTMCC)
ISSN (Online): 2048-8386 - ISSN (Print): 2048-8378, Inder Science Publishers, Switzerland
Call for Papers
Call for Papers
The program committee solicits previously unpublished papers offering novel research contributions in any aspect of security in computing and communications. Papers without a clear application to security, however, will be considered out of scope and may be rejected without full review. Simultaneous submission of the same paper to another venue with proceedings or a journal is not allowed and will be grounds for automatic rejection.
Authors should submit their papers online. We use EDAS system for managing submissions and review process. Unregistered authors should first create an account on EDAS to log on. Detailed usage instruction on EDAS can be found here. Submissions must be in Portable Document Format (.pdf). All submissions should be written in English with a maximum paper length of FIFTEEN (15). Authors should pay special attention to unusual fonts, images, and figures that might create problems for reviewers. Please compare all author names in EDAS with the author list in your paper. They must be identical and in the same order.
SSCC-2014 accepts regular and work-in-progress papers. Regular papers should present novel perspectives within the general scope of the conference. Short papers (Work-in-Progress) are an opportunity to present preliminary or interim results.
Manuscript Template - Word Latex
The topics of interests include, but are not limited to:
Anti-Forensics Techniques Application Security Authentication and Access Control Systems Critical Infrastructure Protection Cyber Warfare Trends and Approaches Denial-of-Service Attacks and Countermeasures Digital Forensics Digital Rights Management Distributed and Pervasive Systems Security Embedded Systems Security Enterprise Systems Security Executable Content and Content Filtering File and Files System Security Fraud Management Hardware Security Human-Computer Interaction and Security Identity Management Intellectual Property Protection Key Distribution and Management Mobile System Security Multimedia and Document Security Network Infrastructure Security Operating Systems and Database Security Peer-to-Peer Security Secure Communications and Information Flow Secure Sensor Networks Security for Grid Computing Security in Cloud Computing/Social Networks Security in e-services Security of Web-Based Applications Surveillance Systems VOIP, Wireless Network Security |
Accountability Analysis of Network and Security Protocols Anonymity Authorship Analysis Biometrics Standards and Standardization Border Security Business Continuity & Disaster Recovery Planning Crowd Management Emergency Response and Management Encryption and Cryptography Forecasting Terrorism Incident Handling and Penetration Testing Information Hiding Intrusion and Anomaly Detection and Prevention Investigation of Insider Attacks Language-Based Security Malware Forensics and Anti-Malware Techniques Protocol Security Secure Software Development Security Architectures Security Metrics Self-Protecting and Self-Healing Systems Social Engineering Social Network Analysis Template Protection and Liveliness Detection Threats, Vulnerabilities, and Risk Management Economics of Security Laws and Regulations/Legal Issues Security Policies and Trust Management Security Education and Training New Threats and Non-Traditional Approaches Theories, Methods and Tools in Managing Security |
The organizers regard plagiarism as a serious professional misconduct. All submissions will be screened for plagiarism and when identified, the submissions by the same author will be rejected.
Submitted papers will undergo a peer review process, coordinated by the Program Committee. Each manuscript will be reviewed by a minimum of three reviewers. Acceptance of papers will be communicated to authors by email. The accepted regular and work-in-progress papers will be published in the conference proceedings.
To be published in the SSCC-2014 Conference Proceedings, an author of an accepted paper is required to register for the conference at the full rate. Both regular and work-in-progress papers will be scheduled for oral presentation. A submission SHOULD NOT be intended to get reviews from the Program Committee for the sole purpose of improving on the quality of the paper. A submission implies that the author intends to ultimately register the paper upon a favorable response from the conference organizers. The conference doesn’t encourage withdrawals after the paper is accepted
The symposium proceedings will be published by Springer in Communications in Computer and Information Science Series(CCIS), ISSN: 1865:0929. CCIS is abstracted/indexed in DBLP, Google Scholar, EI-Compendex, Mathematical Reviews, SCImago and Scopus. CCIS volumes are also submitted for the inclusion in ISI Proceedings. Authors publishing in CCIS have to sign the Springer CCIS copyright transfer form, however, they are free to use their material published in CCIS for substantially changed, more elaborate subsequent publications elsewhere. For the preparation of the camera-ready papers/files, authors have to strictly adhere to the Springer CCIS Authors' Instructions.
Journal Special Issues
Authors of selected outstanding papers will be invited to submit extended versions of their papers for consideration of publication in the following Journal(s):
Important Dates
Full Paper Submission Ends | May 15, 2014 (Firm) |
Acceptance Notification | June 18, 2014 |
Final Paper Deadline | July 16, 2014 |
Author Registration Closes | July 15, 2014 |
Contact Us
Email: sscc2014.icacci@gmail.com
Hosted By