posted by organizer: simvrh || 16313 views || tracked by 7 users: [display]

EICC 2020 : European Interdisciplinary Cybersecurity Conference

FacebookTwitterLinkedInGoogle

Link: https://www.fvv.um.si/eicc2020/
 
When Nov 18, 2020 - Nov 19, 2020
Where Couvent des Jacobins, Rennes, France
Submission Deadline Jul 5, 2020
Notification Due Jul 29, 2020
Final Version Due Sep 20, 2020
Categories    security   cybersecurity   forensics
 

Call For Papers

The European Interdisciplinary Cybersecurity Conference – EICC 2020 aims at establishing a venue for the exchange of information on cybersecurity and its many aspects between academics and practitioners in Europe. EICC was formerly known as the Central European Cybersecurity Conference – CECC and has been rebranded to underscore the interdisciplinarity of the conference and broaden its reach. EICC 2020 encourages the dialogue between computer scientists and researchers in all other fields related to cybersecurity, such as behavioral sciences, sociology, criminology, investigations and law. Interdisciplinary contributions are especially welcome.

EICC 2020 is organized by National Institute for Research in Digital Science and Technology - Inria / CentraleSupélec and will be co-located with European Cyber Week 2020:
https://www.european-cyber-week.eu/?lang=en

== Deadline extension ==

*Submission deadline has been extended to 5 July 2020!*

== COVID-19 Update ==

The EICC 2020 steering committee is carefully watching the COVID-19 situation around the globe and will take all possible measures to ensure the safety of participants on one side and the success of the conference on the other:

* Authors that cannot present at the conference due to the pandemic will be allowed to present their work virtually.
* Conference proceedings will be published by ACM ICPS even if we have to switch to an all-virtual conference.

== Scope ==

The conference is devoted to exploring and presenting original innovative applications, scientific and technological advancements in the field of cybersecurity. Topics for this conference include, but are not limited to:

Cybersecurity and cyber resilience
Cyber insurance
Digital privacy
Digital currency, blockchains and cybercrime
Law, investigation, internet jurisdiction and ethics
Child safety in the cyberspace
Cyber forensics
Surveillance, interception, blocking and sovereignty
Cyber warfare
Network security
Critical infrastructure security
Embedded systems security
Business continuity and disaster recovery
Information security governance
Security management
Cloud security
Internet of things security
Big data and cybersecurity
Healthcare information security
Software development security

== Publication ==

EICC 2020 proceedings will be published by Association for Computer Machinery (ACM) in the ACM Digital Library within its International Conference Proceedings Series (ICPS).

Proceedings from the previous conferences are available here:

CECC 2019: https://dl.acm.org/doi/proceedings/10.1145/3360664
CECC 2018: https://dl.acm.org/doi/proceedings/10.1145/3277570
CECC 2017: https://press.um.si/index.php/ump/catalog/book/296

Authors of accepted papers will be invited to submit an extended version to the special issue on Multidisciplinary Solutions to Modern Cybersecurity Challenges of the Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA: https://jowua.com/) - Indexed in Sciverse, Scopus; SJR Q2.

http://jowua.com/cfp.php

== Submission guidelines ==

The official language of the conference is English. Papers are limited to 6 pages.

All papers must be original and not simultaneously submitted to another journal or conference. The following paper categories are welcome:

*Full papers* reporting on original research findings (5-6 pages)
*Short papers* reporting on original research findings (2-4 pages)
*Posters* (extended abstracts) reporting on original research findings (1-2 pages)

Papers submitted to EICC 2020 have to use the ACM SigConf template (https://www.acm.org/publications/proceedings-template). Please, read template instructions carefully before submitting the paper. The use of the Latex template is strongly encouraged. Non-proficient Latex users are encouraged to use the Overleaf online collaborative Latex platform (ACM Latex template on Overleaf: https://www.overleaf.com/gallery/tagged/acm-official#.WOuOk2e1taQ).

Authors of accepted posters should prepare A1 sized posters (portrait or landscape) for the poster exhibition. Other designs may be considered.

The quality of the research papers will be assessed based on its originality, significance and clarity.

All submitted research papers will undergo a double-blind reviewing process. Please, make sure that submitted papers do not contain author names or obvious self-references. Please note that the page limit applies to papers with authors and not the submitted anonymized version.

Each paper will be reviewed by 2-3 reviewers. Afterwards, a discussion will be held by the chairs and reviewers to determine the outcomes of the peer-review.

Submission of a paper implies that at least one of the authors will register and present the paper at the conference if the paper is accepted. If an author has more than one accepted paper, each additional accepted paper costs the same fee as the first.

Submit papers using the EICC 2020 submission system:

https://easychair.org/conferences/?conf=eicc2020

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ESORICS 2025   European Symposium on Research in Computer Security (round 2)
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
EuroS&P 2025   10th IEEE European Symposium on Security and Privacy
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
FLAIRS 2025   Florida Artificial Intelligence Research Society
ESORICS 2025   European Symposium on Research in Computer Security (round 1)
Applied Sciences (MDPI) SI:Cybersecurity 2024   Applied Sciences (MDPI) Special Issue - Cybersecurity: Advances in Security and Privacy Enhancing Technology
ITNG 2024   The 21st Int'l Conf. on Information Technology: New Generations ITNG 2024
BDBS 2025   6th International Conference on Big Data, Blockchain and Security