posted by organizer: vgkioulos || 6099 views || tracked by 3 users: [display]

EDCN 2017 : ESORICS Doctoral Consortium 2017 – COINS Nordic Ph.D. Workshop


When Sep 14, 2017 - Sep 15, 2017
Where Oslo, Norway
Submission Deadline Jul 9, 2017
Notification Due Aug 13, 2017
Final Version Due Aug 27, 2017
Categories    security   network security   cyber security   information security

Call For Papers

ESORICS Doctoral Consortium 2017 – COINS Nordic Ph.D. Workshop
Security of emerging network technologies and critical infrastructures

The doctoral consortium will be held in Oslo, Norway, in conjunction with the European Symposium on Research in Computer Security (ESORICS) in September 2017, and is sponsored by the Norwegian COINS Research School of Computer and Information Security.
The Doctoral consortium intends to bring together early stage researchers within the field of information security, providing them the opportunity to communicate and explore their research fields under the guidance of distinguished researchers.
The doctoral consortium seeks to:

Provide experience to an extended group of Ph.D. candidates on the processes involved in the organization of academic conferences. Including: quality assurance metrics and incentives in academic research, use of conference management systems, and formal paper review and evaluation criteria.
Provide a setting where Ph.D. candidates can formally communicate their research results and receive feedback, both from early stage and experienced researchers.
Promote the exchange of experiences and the development of collaborations within the field of information security. To facilitate this objective, the program will include both oral presentations (for selected accepted papers) and a poster session with open discussion (available for all participants)
Provide academic stimuli by accommodating keynote speeches, both on leading research topics and scientific processes.

Call for papers

The Doctoral consortium invites submissions that present novel research contributions and results related to the security of emerging network technologies and critical infrastructures. The topics of interest include (but are not limited) to:

Access control
Applied cryptography
Critical infrastructure resilience
Cyber security
Data integrity
Defense in depth
Digital forensics
Distributed systems security
Hardware Security
Information security management
Intrusion detection and visualization
Network security
Privacy and Anonymity
Real time monitoring and supervision
Risk analysis and management
Secure Firmware
Security architectures
Security models and metrics
Security policies
Secure communication protocols
Threat modeling
Trust management
Vulnerability assessment and metrics
Wireless security

Submitted papers must be original, unpublished, and not currently submitted to another conference or journal for consideration. Accepted papers will be presented at the doctoral consortium and included in the post-proceedings, that it is planned to be published by Springer in the Lecture Notes in Computer Science (LNCS) series.

The workshop aims to ensure high academic quality by restricting acceptance to 30-35% of submissions; based on discussions during the workshop, authors will be encouraged to incorporate additional findings and discussions in final revisions submitted for post-proceedings, subjected to a final review process by an editorial sub-committee of the programme committee.

All papers must be written in English.
The main author of the submitted paper must be a Ph.D. candidate, or former Ph.D. candidate graduating during 2017.
Submissions should be at most 18 pages long in total including references and appendices. (Program Committee members are not required to read the appendices, so the paper should be intelligible without them.)
Submission of short papers (minimum of five pages), with recent results, work in progress, and new ideas, is also encouraged.
Submissions should not be anonymized.
Authors must follow the Springer formatting instructions for the LNCS series.
The organizing committee will seek to maximize the number of total reviews for each submitted paper, including additional reviews by early-stage researchers.
At least one author of each accepted paper must register for the workshop and present the paper. The format of the presentation (oral/poster) will be announced after the notification of acceptance.
A best paper award will be presented to contributors that submitted the best paper appearing in the workshop proceedings, in accordance with the results of the review process.

Related Resources

ESORICS 2019   The 24th European Symposium on Research in Computer Security
SP 2020   IEEE Symposium on Security and Privacy
ACM-FAT-DC 2020   ACM Conference on Fairness, Accountability and Transparency - Doctoral Consortium
ICISSP 2020   6th International Conference on Information Systems Security and Privacy
ISWC (Research, In-use, Recource, DC)) 2019   18th International Semantic Web Conference - Call for Research, In-use, Resource and Doctoral Consortium papers
IEEE COINS 2020   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems | Circuit and Systems | WSN | 5G
SCAI 2019   8th International Conference On Soft Computing, Artificial Intelligence And Applications
ASIACCS 2020   ACM ASIACCS 2020 : The 15th ACM ASIA Conference on Computer and Communications Security
AIKE DC Award 2019   IEEE AIKE Doctoral Consortium and Young Researchers Travel Awards
ICSS 2019   5th International Conference on Software Security