posted by user: cdp || 4712 views || tracked by 5 users: [display]

IWSMR 2021 : 3rd International Workshop on Information Security Methodology and Replication

FacebookTwitterLinkedInGoogle

Link: https://www.ares-conference.eu/workshops/iwsmr-2021/
 
When Aug 17, 2021 - Aug 20, 2021
Where Vienna, Austria
Submission Deadline May 9, 2021
Notification Due May 31, 2021
Final Version Due Jun 13, 2021
Categories    security   computer science   networking   communications
 

Call For Papers

CALL FOR PAPERS

3rd International Workshop on Information Security Methodology and
Replication Studies (IWSMR 2021)

https://www.ares-conference.eu/workshops/iwsmr-2021/

to be held in conjunction with the 16th International Conference on
Availability, Reliability and Security (ARES).

August 17 – August 20, 2021

Submission Deadline May 23, 2021 **extended**
Author Notification May 31, 2021
Proceedings Version June 13, 2021
ARES Conference August 17 – August 20, 2021

In recent years, research started to focus on the scientific
fundamentals of information security. These fundamentals include several
important aspects such as the unified description of attacks and
countermeasures, the reproducibility of experiments and means to achieve
reproducibility, the sharing of research data and code, the discussion
of quality criteria for experiments and the design and implementation of
testbeds.

The related academic publications contributed to the advancement of
information security research, e.g. by making research contributions
easier to compare. Moreover, work on terminology and taxonomy addressed
redundancies and unified the understanding between different sub-domains
of information security.

This workshop desires to foster the progress in research on the
scientific methodology of information security, to improve the links
between sub-domains of information security research and to advance the
discussion on the scientific methodology in information security.
Moreover does this workshop welcome submissions that evaluate existing
research results by reproducing experiments.

Topics of interest include, but are not limited to

• Surveys of scientific methodology in information security.
• Fundamentals for a `science of security'.
• Discussion of links/similarities between scientific fundamentals of
information security and other research domains, such as Economics,
Psychology, Biology, Physics or Chemistry (but no papers specific to
non-security domains).
• Evaluation and extension of existing taxonomies and proposals for new
taxonomies in cyber security.
• Data collection and measurement.
• Work that unifies terminological inconsistencies in cyber security.
• Work that reproduces existing experiments, i.e. that
confirms/disproves experimental results or that shows how replication
platforms can be realized in information security.
• Work that discusses the underlying criteria for the design and
evaluation for cyber security research testbeds.
• Evaluation of the novelty of research contributions and handling of
scientific re-inventions.
• Methodology in network security, cryptography, information hiding, IoT
security, system security, digital forensics, and other sub-disciplines
of information security.
• Methodology for privacy, information sharing and collaborative work in
the context of information security.
• “Open science” for cyber security.
• History of information security.
• Scientometric analyses, e.g. citation behavior, in information security.
• Policy issues that influence cyber security research.


Workshop Chairs

Steffen Wendzel, Worms University of Applied Sciences, Germany
Luca Caviglione, Inst. Appl. Math. & Inf. Techn. (IMATI), National
Research Council (CNR), Italy
Alessandro Checco, University of Sheffield, United Kingdom
Aleksandra Mileva, University Goce Delcev, Macedonia
Jean-Francois Lalande, CentraleSupélec, France
Wojciech Mazurczyk, Warsaw University of Technology, Poland

The submission guidelines valid for the workshop are the same as for the
ARES conference. They can be found at
https://www.ares-conference.eu/conference/submission/.

Related Resources

IEEE COINS 2022   IEEE COINS 2022: Hybrid (3 days on-site | 2 days virtual)
NISecurity 2022   2022 International Conference on Network and Information Security (NISecurity 2022)
S&P 2022   IEEE Symposium on Security and Privacy (Third deadline)
JMC 2022   JOURNAL OF MATHEMATICAL CRYPTOLOGY
MoWiN 2022   11th International Conference on Mobile & Wireless Networks
ACM-EI/Scopus-ACAI 2021   2021 4th International Conference on Algorithms, Computing and Artificial Intelligence (ACAI 2021)
SECRYPT 2022   19th International Conference on Security and Cryptography
ISMR 2022   ITTI Special Issue on Information Security Methodology and Replication Studies
EMSA 2022   11th International Conference on Embedded Systems and Applications
IEEE COINS 2022   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems |