Annual Symposium on Information Assurance >> ASIA
Navigation Menu ASIA Main Page Call for Papers Organizing Committee Symposium Proceedings Best Paper Awards Keynote Speakers Author/Presenter Information Reviewers NYS Cyber Security Conference Directions & Parking Accomodations OCS Website UAlbany Business Website Pictures Contact Us Want to Sponsor? End of Menu Facebook Twitter

Please see the Call for Papers section for submission deadlines and guidelines. All authors will be asked to submit their papers to the chair via email.

You will be alerted when you can read reviews and final acceptance decisions via emails to corresponding authors. You should receive confirmation of your paper submission. If you are unsure that your paper was submitted, please send an email to iasymposium@gmail.com.

Accepted paper final submissions should be in IEEE two-column format. We advise using the template files for Word (use of font styles is highly encouraged) underneath the "Template for all Transactions (except IEEE Transactions on Magnetics)" section at the IEEE Digital Author Toolbox.

WARNING! Please DO NOT include page numbers or biographies within the final papers. Biographies for each author should be included AS A SEPARATE ATTACHMENT during the final submission process and will be placed in a separate section of the proceedings. Also, make sure all references are cited and all cited text has a corresponding reference.

Quotes

I personally like to think of the internet as a parallel universe, a cyber-world as opposed to teh real-world. In cyber-world, people do much the same things as in the real world, such as chat, work, or go shopping. And, as in the real-world, there are dangers.

In the real-world, we spend years as children learning about the world and all its dangers before we can safetly go out on our own. This is not the case in cyber-world. People wander into cyber-world as cyber-toddlers or even cyber-infants.

How can these people be expected to look after themselves in this strange new world? I believe that education must be the first step to computer security. Cyber-world is too complex and dangerous to jump into without understanding the dangers.

- Jimi Loo