posted by user: meshekah || 7630 views || tracked by 99 users: [display]

CCS 2015 : 22nd ACM Conference on Computer and Communications Security


Conference Series : Computer and Communications Security
When Oct 12, 2015 - Oct 16, 2015
Where Denver, Colorado, US
Submission Deadline May 15, 2015
Notification Due Jul 22, 2015
Final Version Due Aug 12, 2015
Categories    security   privacy

Call For Papers

Call for Papers
Paper Submission Information

The conference seeks submissions from academia, government, and industry presenting novel research results in all practical and theoretical aspects of computer and communications security. Papers should be related to the construction, evaluation, application, or operation of secure systems. Theoretical papers must make a convincing argument for the relevance of the results to secure systems. All topic areas related to computer and communications security are of interest and in scope. Accepted papers will be published by ACM Press in the conference proceedings. Further concrete instructions and submissions rules and regulations will be published in the Call for Papers which will be accessible via the conference web page.
Paper Submission Process

Submissions must be made by the deadline of Friday, May 15, 2015 23:59 (UTC – 11), through ## . The review process will be carried out in two phases and authors will have an opportunity to comment on the first-phase reviews.

Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal, conference or workshop. Simultaneous submission of the same work is not allowed. Note that submitted papers cannot be withdrawn from the process after the first phase reviews are received by authors. Authors of accepted papers must guarantee that their papers will be presented at the conference.
Paper Format

Submissions must be at most 10 pages in double-column ACM format ( proceedings-templates) excluding the bibliography and well-marked appendices, and at most 12 pages overall. Submissions must be anonymized and avoid obvious self-references. Only PDF files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits.
Dates – Papers
Paper Submission Due May 15, 2015 23:59 (UTC – 11)
First round reviews sent to authors June 30, 2015
Author comments due on July 7, 2015 10:59 (UTC)
Acceptance Notification July 22, 2015
Camera Ready Papers Due August 12, 2015

Related Resources

ICMWT 2017   4th International Conference on Mobile and Wireless Technology
AsiaCCS 2017   Call for paper: ACM Asia Conference on Computer and Communications Security
ICISSP 2017   3rd International Conference on Information Systems Security and Privacy
SIGIR 2017   The 40th International ACM SIGIR Conference on Research and Development in Information Retrieval
IEEE TDSC Journal SI 2016   IEEE TDSC Special Issue on Data-Driven Dependability and Security
ACM CCS 2016   23rd ACM Conference on Computer and Communications Security
IJMSA 2016   International Journal of Modelling, Simulation and Applications
CTI 2017   Cyber Threat Intelligence - Springer Book Chapter
ANCS 2017   The 13th ACM/IEEE Symposium on Architectures for Networking and Communications Systems
Future_Internet-SI 2016   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks