| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
All CFPs on WikiCFP | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Present CFP : 2019 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Scope
SecureComm seeks high-quality research contributions, which have not been previously published or in parallel submission to another conference or journal. Topics of interest encompass research advances in ALL areas of secure communications and networking. Topics in other areas (e.g., formal methods, database security, secure software, theoretical cryptography) will be considered only if a clear connection to private or secure communication/networking is demonstrated. *** Topics Topics of interest include, but are not limited to the following: Blockchain and Applications Cyber Threat Intelligence Network Intrusion Detection and Prevention, Firewalls, Packet Filters Malware Analysis and Detection including Advanced Persistent Threats (APTs) Web and Systems Security Distributed Denial of Service Attacks and Defenses Communication Privacy and Anonymity Circumvention and Anti-Censorship Technologies Cyber Forensics and Anti-Forensics Vulnerabilities Identification and Exploitation Authentication Systems: Public Key Infrastructures, Key Management, Credential Management Secure Routing, Naming/Addressing, Network Management Security & Privacy in Pervasive and Ubiquitous Computing, e.g., RFIDs Security & Privacy in Peer-to-Peer and Overlay Networks Security & Privacy for Emerging Technologies: VoIP, Internet-of-Things, Social Networks Security & Isolation in Cloud, Data Center and Software-Defined Networks Security & Privacy in Wired, Wireless, Mobile, Hybrid, Sensor, Ad Hoc networks Security & Privacy in Internet of Things (IoT) and Industrial IoT (IIoT) Security & Privacy in Cyber Physical Systems (CPS) *** Publication All registered papers will be published by Springer and made available through SpringerLink Digital Library. SecureComm proceedings are indexed in leading indexing services, including Ei Compendex, ISI Web of Science, Scopus, CrossRef, Google Scholar, DBLP, as well as EAI’s own EU Digital Library (EUDL). Authors of selected best accepted and presented papers will be invited to submit an extended version to: - Mobile Networks and Applications (MONET) Journal (IF=2.497) All accepted authors are eligible to submit an extended version in a fast track of: - EAI Endorsed Transactions on Security and Safety | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|