| |||||||||||||||
IEEE DSC 2022 : The 2022 IEEE Conference on Dependable and Secure Computing | |||||||||||||||
Link: https://attend.ieee.org/dsc-2022/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
OVERVIEW
The IEEE Conference on Dependable and Secure Computing solicits papers, posters, practices, and experiences for presenting innovative research results, problem solutions, and new challenges in the field of dependable and secure computing. The whole spectrum of IT systems and application areas, including hardware design and software systems, with stringent relevance to dependability and security concerns, are of interest to DSC. Authors are invited to submit original works on research and practice of creating, validating, deploying, and maintaining dependable and secure systems. The scope of DSC includes, but is not limited to, the following topics. MAIN TRACK: Computer Systems, Networks, and Software/Hardware - Advanced Persistent Threat (APT) - Big Data Analysis - Botnet and Intrusion Detection - Cryptographic Methods and Toolkits - Cyber attacks - Data/Information Reliability - Database Security and Privacy - Embedded Systems and IoT Devices - Experimentation, Measurement, and Assessment - Mobile and Cloud Computing - Software vulnerabilities - Malware analysis - SDN and NFV - Security and Privacy for AI - Hardware security and reliability - CAD Algorithms and Tools - Electronic Circuits and Systems - Fault-Tolerant Architectures and Designs - Industrial Design Experiences - Noise-Aware Designs - Power-Aware Designs - Soft-Error Analysis and Models - Stochastic Circuits and Systems - Temperature-Aware Designs - Variable-Latency Designs - Security Circuits, Designs, and Detection EXPERIENCE and PRACTICE TRACK The DSC conference will also include a submission category for experience and practice papers on new findings in the aforementioned topics. The PC will evaluate a submission to the experience and practice track with the understanding that it predominantly contributes to design know-how or the extension of the community’s knowledge about how the security protection of known techniques fares in real-world operations. Authors have to submit a 2-page paper along with a supplemental 3-min video to demonstrate the implementation and/or the practicability of the work. Topics of interest include, but are not limited to: - Attacks on Information Systems and/or Digital Information Storage - CSIRTs, Incident Analysis, and Response - Honeypots/Honeynets - Malware Analysis and Reversing - Mobile Communications Security and Vulnerabilities - Newly discovered vulnerabilities in software and hardware - Offensive (and Counter-Offensive) Information Technology - Reverse Engineering, Forensics, and Anti-Forensics - Spyware, Phishing and Distributed Attacks - VLSI/CAD Design Knowhow - Data Security and Privacy Submission Instructions Papers must be written in English and should not exceed 8 pages (or 10 pages with over length charge) for regular papers and 2 pages for experience and practice papers, inclusive of figures, tables, references and appendix using IEEE Conference Proceedings Manuscripts style (two-columns, single-spaced, 10 fonts). In exceptional cases we will consider papers that can go beyond 10 pages. Please contact the TPC Co-Chair Yulei Wu (Y.L.Wu@exeter.ac.uk) to discuss such exceptional papers before submission. The materials presented in the papers should not be published or under submission/review elsewhere. All submitted papers will be peer-reviewed. Accepted papers will appear in the conference proceedings and will be eligible for submission to the IEEE Xplore Digital Library. At least one of the authors of any accepted paper is requested to register the paper at the conference. Paper templates can be downloaded from IEEE website. Electronic submission site: https://easychair.org/conferences/?conf=ieeedsc2022 Best Paper Awards - Best Paper Award (Main Track): £200 + certificate - Best Student Paper Award (Main Track): £100 + certificate - Best Paper Award (Experience and Practice Track): £50 + certificate These awards are sponsored by the Institute of Cyber Security for Society (iCSS), University of Kent. BCS-sponsored Conference Tickets BCS sponsors 5 tickets for Scottish attendees from Scottish universities, colleges, and non-profitable organisations to attend this 3-day conference, including the keynote speeches, all sections, refreshments and lunch. Organisation General Chairs Prof. Albert Zomaya, The University of Sydney, Australia Prof. Song Guo, Hong Kong Polytechnic University, China Dr Zhiyuan Tan, Edinburgh Napier University, United Kingdom (Contact Email address: z.tan@napier.ac.uk) Program Chairs (Main Track) Dr Yousra Aafer, University of Waterloo, Canada Prof. Shujun Li, University of Kent, United Kingdom Dr Yulei Wu, University of Exeter, United Kingdom (Experience and Practice Track) Dr Tiejun Ma, University of Edinburgh, United Kingdom Dr Aniello Castiglione, University of Naples Parthenope, Italy Dr Shancang Li, University of West of England, United Kingdom Journal Special Issues - Special Issue on “Advances in Computational Intelligence for Perception and Decision Making for Autonomous Systems”, ISA Transactions, ISSN: 0019-0578 (Impact Factor: 5.468) - Special issue on “Advances in Smart Environment for Healthy Living in Urban Cities”, Cities, ISSN: 0264-2751 (Impact Factor: 5.835) - Special Issue on “Artificial Intelligence-based Cyber Defence Microservices for Protecting Distributed Systems”, Journal of Parallel and Distributed Computing (Impact factor: 3.734) - Special Issue on “Future of Wireless Access Technologies and Frameworks for Internet of Things (IoT) Applications”, ETT Transactions on Emerging Telecommunications Technologies SCIE SI (Impact factor: 2.638) |
|