Conference Information
AIMS 2018: International Conference on Autonomous Infrastructure, Management and Security
http://www.aims-conference.org/2018/Submission Date: |
2018-04-01 Extended |
Notification Date: |
2018-05-04 |
Conference Date: |
2018-06-04 |
Location: |
Munich, Germany |
Years: |
12 |
QUALIS: b4 Viewed: 19398 Tracked: 2 Attend: 0
Call For Papers
Authors are invited to submit original contributions with the following topics or other topics related to the conference scope:
Autonomic or intent-based networking
Data-driven network management
Orchestration of network services
High-speed or ubiquitous monitoring
Data filtering and refinement
Situational awareness
Visualization and virtual reality
Machine learning for network management and security
Proactive and predictive security solutions
Network models, formal verification
Privacy preservation
Proceedings
All accepted papers will be published in the proceedings of AIMS 2018, an IFIP sponsored event. We plan to publish the proceedings as a part of Springer LNCS series.
Conference Paper Submission
The paper submission is handled by the JEMS system, which will be accessible from the AIMS 2018 Web page. Authors can submit two types of papers:
Full papers are expected to report substantial research results relevant for the subjects listed in the conference topics. The first author of the submitted paper must be a junior researcher or Ph.D. student. Only original and full papers that have not been published or submitted for publication else-where can be submitted. Each submission must be written in English and are limited to 14 pages, including all references and figures/tables, in the LNCS paper format. Papers exceeding 14 pages, multiple submissions, and self-plagiarized papers will be rejected without further review.
Ph.D. Research Proposals are short papers describing the current state of the student’s research. The paper needs to include a clear description of the research problem and the chosen approach, argue why the problem is hard and the approach novel, and it has to outline the results achieved to date. Specific, low-level technical details are to be avoided. Papers should have no more than two (in exceptional cases three) authors: the student and one or two advisors. Each submission must be written in English and has to be limited to 5 pages, including all references and figures/tables, in the LNCS paper format.
Best Paper Award
The program committee will select one paper for the Best Paper Award (all regular papers are eligible). The winner will be presented at the conference.
Last updated by Dou Sun in 2018-03-28
Acceptance Ratio
| Year | Submitted | Accepted | Accepted(%) |
|---|---|---|---|
| 2017 | 24 | 8 | 33.3% |
| 2016 | 22 | 7 | 31.8% |
| 2015 | 22 | 7 | 31.8% |
| 2014 | 29 | 9 | 31% |
| 2013 | 32 | 11 | 34.4% |
| 2012 | 23 | 10 | 43.5% |
| 2011 | 37 | 12 | 32.4% |
| 2010 | 27 | 9 | 33.3% |
| 2009 | 28 | 12 | 42.9% |
| 2008 | 33 | 13 | 39.4% |
| 2007 | 54 | 13 | 24.1% |
Related Conferences
| Short | Full Name | Conference |
|---|---|---|
| MINES | International Conference on Multimedia Information Networking and Security | 2013-11-01 |
| WAIM | International Conference on Web-Age Information Management | 2016-06-03 |
| ICDIM | International Conference on Digital Information Management | 2020-11-02 |
| WETICE | International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises | 2020-06-10 |
| AAMAS | International Joint Conference on Autonomous Agents and Multi-agent Systems | 2026-05-25 |
| CIS | International Conference on Computational Intelligence and Security | 2020-11-27 |
| NDSS | Annual Network & Distributed System Security Symposium | 2026-02-23 |
| ICUIMC | International Conference on Ubiquitous Information Management and Communication | 2016-01-04 |
| CRITIS | International Conference on Critical Information Infrastructures Security | 2018-09-24 |
| AIMS | International Conference on Autonomous Infrastructure, Management and Security | 2018-06-04 |
Related Journals
| CCF | Full Name | Impact Factor | Publisher | ISSN |
|---|---|---|---|---|
| c | Information Management & Computer Security | Emerald | 0968-5227 | |
| b | Autonomous Agents and Multi-Agent Systems | 2.000 | Springer | 1387-2532 |
| International Journal of Critical Infrastructure Protection | 4.100 | Elsevier | 1874-5482 | |
| Computer-Aided Civil and Infrastructure Engineering | 9.1 | Wiley-Blackwell | 1093-9687 | |
| Computational Management Science | 1.300 | Springer | 1619-697X | |
| Journal of Global Information Management | 4.700 | IGI Global | 1062-7375 | |
| Journal of Enterprise Information Management | 6.4 | Emerald | 1741-0398 | |
| c | Information & Management | 8.2 | Elsevier | 0378-7206 |
| International Journal of Information Management | 27.0 | Elsevier | 0268-4012 | |
| Information Systems Management | 3.000 | Taylor & Francis | 1058-0530 |
| Full Name | Impact Factor | Publisher |
|---|---|---|
| Information Management & Computer Security | Emerald | |
| Autonomous Agents and Multi-Agent Systems | 2.000 | Springer |
| International Journal of Critical Infrastructure Protection | 4.100 | Elsevier |
| Computer-Aided Civil and Infrastructure Engineering | 9.1 | Wiley-Blackwell |
| Computational Management Science | 1.300 | Springer |
| Journal of Global Information Management | 4.700 | IGI Global |
| Journal of Enterprise Information Management | 6.4 | Emerald |
| Information & Management | 8.2 | Elsevier |
| International Journal of Information Management | 27.0 | Elsevier |
| Information Systems Management | 3.000 | Taylor & Francis |