posted by user: icstcfp || 11347 views || tracked by 31 users: [display]

Securecomm 2015 : International Conference on Security and Privacy in Communication Networks

FacebookTwitterLinkedInGoogle


Conference Series : Security and Privacy in Communication Networks
 
Link: http://securecomm.org/2015/show/home
 
When Oct 26, 2015 - Oct 29, 2015
Where dallas
Submission Deadline Jun 20, 2015
Notification Due Aug 12, 2015
Final Version Due Sep 2, 2015
Categories    secure communications   web and systems security   malware analysis   secure routing
 

Call For Papers

SCOPE
SecureComm seeks high-quality research contributions in the form of well-developed papers. Topics of interest encompass research advances in ALL areas of secure communications and networking. Topics in other areas (e.g., formal methods, database security, secure software, theoretical cryptography) will be considered only if a clear connection to private or secure communication/networking is demonstrated.
TOPIC
Topics of interest include, but are not limited to the following:
Security & Privacy in Wired, Wireless, Mobile, Hybrid, Sensor, Ad Hoc networks
Network Intrusion Detection and Prevention, Firewalls, Packet Filters
Malware Analysis and Detection including Botnets, Trojans and APTs
Web and Systems Security
Distributed Denial of Service Attacks and Defenses
Communication Privacy and Anonymity
Circumvention and Anti-Censorship Technologies
Network and Internet Forensics Techniques
Authentication Systems: Public Key Infrastructures, Key Management, Credential Management
Secure Routing, Naming/Addressing, Network Management
Security & Privacy in Pervasive and Ubiquitous Computing, e.g., RFIDs
Security & Privacy in Peer-to-Peer and Overlay Networks
Security & Privacy for Emerging Technologies: VoIP, Internet-of-Things, Social Networks
Security & Isolation in Cloud, Data Center and Software-Defined Networks
Publications
Accepted papers will be published in Springer's LNICST series and will appear in the SpringerLink, one of the largest digital libraries online that covers a variety of scientific disciplines, as well as in the ICST's own EU Digital Library (EUDL). LNICST volumes are submitted for inclusion to leading indexing services, including DBLP, Google Scholar, ACM Digital Library, ISI Proceedings, EI Engineering Index, CrossRef, Scopus. See this link for more information about indexing.
Submission Instructions
Paper formatting instructions and submission guidelines are posted at: http://securecomm.org/2015/show/initial-submission

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CSP--EI 2025   2025 9th International Conference on Cryptography, Security and Privacy (CSP 2025)
Applied Sciences (MDPI) SI:Cybersecurity 2024   Applied Sciences (MDPI) Special Issue - Cybersecurity: Advances in Security and Privacy Enhancing Technology
ICISPP--Ei 2025   2025 6th International Conference on Information Security and Privacy Protection (ICISPP 2025)
CSF 2025   38th IEEE Computer Security Foundations Symposium - deadline 3
CSP 2025   2025 9th International Conference on Cryptography, Security and Privacy (CSP 2025)
ICISPP 2025   2025 6th International Conference on Information Security and Privacy Protection (ICISPP 2025)
ICN 2025   The Twenty-Fourth International Conference on Networks
PERSUASIVE 2025   20th International Conference on Persuasive Technology
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2