posted by organizer: vgkioulos || 5293 views || tracked by 3 users: [display]

EDCN 2017 : ESORICS Doctoral Consortium 2017 – COINS Nordic Ph.D. Workshop


When Sep 14, 2017 - Sep 15, 2017
Where Oslo, Norway
Submission Deadline Jul 9, 2017
Notification Due Aug 13, 2017
Final Version Due Aug 27, 2017
Categories    security   network security   cyber security   information security

Call For Papers

ESORICS Doctoral Consortium 2017 – COINS Nordic Ph.D. Workshop
Security of emerging network technologies and critical infrastructures

The doctoral consortium will be held in Oslo, Norway, in conjunction with the European Symposium on Research in Computer Security (ESORICS) in September 2017, and is sponsored by the Norwegian COINS Research School of Computer and Information Security.
The Doctoral consortium intends to bring together early stage researchers within the field of information security, providing them the opportunity to communicate and explore their research fields under the guidance of distinguished researchers.
The doctoral consortium seeks to:

Provide experience to an extended group of Ph.D. candidates on the processes involved in the organization of academic conferences. Including: quality assurance metrics and incentives in academic research, use of conference management systems, and formal paper review and evaluation criteria.
Provide a setting where Ph.D. candidates can formally communicate their research results and receive feedback, both from early stage and experienced researchers.
Promote the exchange of experiences and the development of collaborations within the field of information security. To facilitate this objective, the program will include both oral presentations (for selected accepted papers) and a poster session with open discussion (available for all participants)
Provide academic stimuli by accommodating keynote speeches, both on leading research topics and scientific processes.

Call for papers

The Doctoral consortium invites submissions that present novel research contributions and results related to the security of emerging network technologies and critical infrastructures. The topics of interest include (but are not limited) to:

Access control
Applied cryptography
Critical infrastructure resilience
Cyber security
Data integrity
Defense in depth
Digital forensics
Distributed systems security
Hardware Security
Information security management
Intrusion detection and visualization
Network security
Privacy and Anonymity
Real time monitoring and supervision
Risk analysis and management
Secure Firmware
Security architectures
Security models and metrics
Security policies
Secure communication protocols
Threat modeling
Trust management
Vulnerability assessment and metrics
Wireless security

Submitted papers must be original, unpublished, and not currently submitted to another conference or journal for consideration. Accepted papers will be presented at the doctoral consortium and included in the post-proceedings, that it is planned to be published by Springer in the Lecture Notes in Computer Science (LNCS) series.

The workshop aims to ensure high academic quality by restricting acceptance to 30-35% of submissions; based on discussions during the workshop, authors will be encouraged to incorporate additional findings and discussions in final revisions submitted for post-proceedings, subjected to a final review process by an editorial sub-committee of the programme committee.

All papers must be written in English.
The main author of the submitted paper must be a Ph.D. candidate, or former Ph.D. candidate graduating during 2017.
Submissions should be at most 18 pages long in total including references and appendices. (Program Committee members are not required to read the appendices, so the paper should be intelligible without them.)
Submission of short papers (minimum of five pages), with recent results, work in progress, and new ideas, is also encouraged.
Submissions should not be anonymized.
Authors must follow the Springer formatting instructions for the LNCS series.
The organizing committee will seek to maximize the number of total reviews for each submitted paper, including additional reviews by early-stage researchers.
At least one author of each accepted paper must register for the workshop and present the paper. The format of the presentation (oral/poster) will be announced after the notification of acceptance.
A best paper award will be presented to contributors that submitted the best paper appearing in the workshop proceedings, in accordance with the results of the review process.

Related Resources

KR-DC 2018   KR 2018 Doctoral Consortium Call for Applications
NECO 2018   7th International Conference of Networks and Communications
RuleML+RR-DC 2018   Call For Papers: RuleML+RR Doctoral Consortium 2018
ACISP 2019   The 24th Australasian Conference on Information Security and Privacy
ESORICS 2018   23rd European Symposium on Research in Computer Security
DSN 2019   Dependable Systems and Networks
ICLS 2018   International Conference for the Learning Sciences: Doctoral Consortium
ETRIJ Cyber Security & AI 2019   ETRI Journal Special issue on Cyber Security and AI
BCIOT for COINS 2019   Special Track on Blockchain and Internet of Things (IoT)
ICWL-SETE DC 2018   ICWL-SETE 2018 Doctoral Consortium