posted by user: aziza || 1387 views || tracked by 2 users: [display]

CSNet 2022 : 6th Cyber Security in Networking Conference

FacebookTwitterLinkedInGoogle

Link: https://csnet-conference.org/2022/
 
When Oct 24, 2022 - Oct 26, 2022
Where Rio de Janeiro, Brazil
Submission Deadline May 26, 2022
Notification Due Jul 4, 2022
Final Version Due Jul 22, 2022
Categories    communications   cyber security   netwoking   blockchain
 

Call For Papers

*********************************************************************
CALL FOR PAPERS, DEMO & WORK IN PROGRESS and TUTORIALS - CSNet 2022
6th Cyber Security in Networking Conference

24 - 26 October 2022 // Rio de Janeiro, Brazil

https://csnet-conference.org/2022


*********************************************************************

After the first successful edition of CSNet 2017 in Rio de Janeiro (Brazil), the second edition CSNet 2018 in Paris (France), the third edition CSNet 2019 in Quito (Ecuador), CSNet 2020 in Lausanne (Switzerland) (Online), CSNet 2021 in Abu Dhabi (UAE) (Hybrid), the sixth edition of CSNet conference will be held in Rio de Janeiro (Brazil) next October 24 - 26, 2022. We are seeking for full papers, short papers, demos & work in progress papers as well as tutorials in the cybersecurity domain.
The driving theme at CSNet 2022 is decentralized security in networking.
The technological disruption is generating an impact on society and leading to a new industrial revolution. This social and industrial change presents new technological environments constituted by ubiquitous systems and large amounts of information, which requires a change in the way how cybersecurity is applied. The use of big data, machine learning, data science, data mining, strengthens the cognitive skills of security analysts to face new forms of cybersecurity attacks.
The new trend on decentralized security poses new challenges for researchers and companies to seek proactive security proposals according to this technological change.

Areas of interest include, but are not limited to:
- Attacks on Virtualized Systems
- Balancing Trust and Control
- Blockchain
- Smart Phones privacy and security
- Cloud of Security
- Cognitive Security
- Concealing Malware (Trojan Horses-Root kits-Logic Bombs)
- Cyber-attacks Cloud-oriented vs Cyber defense Cloud-oriented
- Cyber Physical System (CPS) security
- Cybersecurity and human rights
- Data Center Network Control, Security and Optimization
- Decentralized Security
- Demilitarization Zone (DMZ)
- Designing a Security Policy
- Disaster recovery plan
- Enterprise Wireless Security
- Hardware-Based Attacks
- Host Network Intrusion Prevention Systems
- Industrial control system information security
- Infection Malware
- Integrated Network Security Hardware
- Internet Content Filters
- Internet Security issues
- Network and operating system administration for security purposes
- Network Attached Storage (NAS)
- Network Intrusion Detection Systems (NIDS)
- Network Security design
- Organizational Security Policies
- Secure Network through Network Design
- Security in Internet of Things
- Security in Fog/edge Computing
- Security, trust and privacy challenges
- Security for vehicular Networks
- Smart City Security
- Smart Grid Security
- Social networks security
- Software-Based Attacks
- System Security for wired and wireless networks
- Privacy and responsibility in digital age
- Usable Security


Submission Guidelines:

Submitted papers must represent original material that is not currently under review in any other conference or journal, and has not been previously published.

All submissions should be written in English (in Two-Column IEEE Conference Format).
Papers should be submitted through EDAS: https://edas.info/N29385

Full paper: 6 pages excluding references
Short: 3 pages excluding references
Demo & work in progress: 2 pages including references

Best papers will be considered for fast-track publication in the Annals of Telecommunications (Springer, ISI-indexed)

Tutorial call
Proposals for half/full day tutorials are also solicited based on the Conference topics. Tutorial proposals should identify the intended audience and outline the scope and the depth of material to be covered. Past experience and successes of the presenter should be given explicitly and will be considered positively.

All tutorials will be part of the main conference technical program.Teams of 2-3 presenters are encouraged, though single-presenter tutorials are possible.


Main track (Full and short papers): May 26th
Demo & work in progress deadline: May 30
Notification: July 4th
Camera ready: July 15th

Related Resources

CSNet 2023   7th Cyber Security in Networking Conference
IEEE COINS 2023   IEEE COINS 2023 - Berlin, Germany - July 23-25 - Hybrid (In-Person & Virtual)
CSW 2023   2023 International Workshop on Cyber Security (CSW 2023)
ACM-Ei/Scopus-CWCBD 2023   2023 4th International Conference on Wireless Communications and Big Data (CWCBD 2023) -EI Compendex
ML4CS 2023   5th International Conference on Machine Learning for Cyber Security
ACM-EI/Scopus-ITCC 2023   2023 3rd International Conference on Information Technology and Cloud Computing (ITCC 2023) -EI Compendex
ICNT 2023   2023 6th International Conference on Network Technology (ICNT 2023)
IEEE Xplore-Ei/Scopus-CCCAI 2023   2023 International Conference on Communications, Computing and Artificial Intelligence (CCCAI 2023) -EI Compendex
NISecurity 2023   2023 International Conference on Network and Information Security (NISecurity 2023)
ICBDB 2023   2023 5th International Conference on Big Data and Blockchain(ICBDB 2023)