posted by user: icstcfp || 2780 views || tracked by 32 users: [display]

Securecomm 2015 : International Conference on Security and Privacy in Communication Networks


Conference Series : Security and Privacy in Communication Networks
When Oct 26, 2015 - Oct 29, 2015
Where dallas
Submission Deadline Jun 20, 2015
Notification Due Aug 12, 2015
Final Version Due Sep 2, 2015
Categories    secure communications   web and systems security   malware analysis   secure routing

Call For Papers

SecureComm seeks high-quality research contributions in the form of well-developed papers. Topics of interest encompass research advances in ALL areas of secure communications and networking. Topics in other areas (e.g., formal methods, database security, secure software, theoretical cryptography) will be considered only if a clear connection to private or secure communication/networking is demonstrated.
Topics of interest include, but are not limited to the following:
Security & Privacy in Wired, Wireless, Mobile, Hybrid, Sensor, Ad Hoc networks
Network Intrusion Detection and Prevention, Firewalls, Packet Filters
Malware Analysis and Detection including Botnets, Trojans and APTs
Web and Systems Security
Distributed Denial of Service Attacks and Defenses
Communication Privacy and Anonymity
Circumvention and Anti-Censorship Technologies
Network and Internet Forensics Techniques
Authentication Systems: Public Key Infrastructures, Key Management, Credential Management
Secure Routing, Naming/Addressing, Network Management
Security & Privacy in Pervasive and Ubiquitous Computing, e.g., RFIDs
Security & Privacy in Peer-to-Peer and Overlay Networks
Security & Privacy for Emerging Technologies: VoIP, Internet-of-Things, Social Networks
Security & Isolation in Cloud, Data Center and Software-Defined Networks
Accepted papers will be published in Springer's LNICST series and will appear in the SpringerLink, one of the largest digital libraries online that covers a variety of scientific disciplines, as well as in the ICST's own EU Digital Library (EUDL). LNICST volumes are submitted for inclusion to leading indexing services, including DBLP, Google Scholar, ACM Digital Library, ISI Proceedings, EI Engineering Index, CrossRef, Scopus. See this link for more information about indexing.
Submission Instructions
Paper formatting instructions and submission guidelines are posted at:

Related Resources

ACISP 2017   Australasian Conference on Information Security and Privacy
MobiSec 2017   IEEE INFOCOM - The International Workshop on The Security, Privacy, and Digital Forensics of Mobile Systems and Networks
ICCSN 2017   9th IEEE International Conference on Communication Software and Networks (ICCSN 2017)-JA, Ei and IEEE Xplore
SecureComm 2016   12th EAI International Conference on Security and Privacy in Communication Networks
IJISS 2016   International Journal of Information Security Science (IJISS)
Future_Internet-SI 2016   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
ICCCN 2017   International Conference on Computer Communication and Networks
SMGSSP 2017   Smart Micro-Grid Systems Security and Privacy
ICCT-IEEE 2017   17th IEEE International Conference on Communication Technology(ICCT 2017)
WICSPIT 2017   IoTBDS/SMARTGREENS Workshop -- Innovative CyberSecurity and Privacy for Internet of Things: Strategies, Technologies, and Implementations