Google Groups no longer supports new Usenet posts or subscriptions. Historical content remains viewable.
Dismiss

[CFP - Late Track Opened] EAI SecureComm 2022: CALL FOR PAPERS

7 views
Skip to first unread message

Steins H

unread,
May 16, 2022, 12:05:35 AM5/16/22
to

[Please accept our apologies if you receive multiple copies]
===========================================================
Late Track is open and the full paper submission deadline is now Jun. 26!

===========================================================

*EAI SecureComm 2022: CALL FOR PAPERS*
The 18th EAI International Conference on Security and Privacy in Communication Networks
https://securecomm.eai-conferences.org/2022/call-for-papers/

===========================================================
Scope
SecureComm is a conference in EAI core conference portfolio focusing on cybersecurity. The aim of SecureComm is to bring together researchers and practitioners in academic, industry, and government in security, networking, communication and other related communities to explore important research directions in the field. The 18th SecureComm conference seeks submissions of high-quality research contributions. Topics of interest encompass ALL areas of secure communications and networking. Topics in less related areas will be considered if a clear connection to secure communication and networking is demonstrated. Topics addressing interdisciplinary challenges in different application domains are welcome.

EAI SecureComm 2022 will be held as an on-site conference and if needed, Accepted Authors who are unable to attend the event in person will be given an option to present remotely.
---------------------------------------------------------
Topics
Topics of interest include, but are not limited to the following:

Security and privacy in computer networks (e.g., wired, wireless, mobile, hybrid, sensor, vehicular, satellite, 5G, 6G, ad hoc, peer-to-peer, and software-defined networks)
Security and privacy in systems with a strong secure communication and networking element (e.g., security in cloud, IoT, cyber-physical systems, edge and fog computing, and teleconferencing)
Physical layer security (e.g., jamming, GPS spoofing)
Web and mobile security and privacy
Security protocols at all network layers and for different applications (e.g., for secure routing, naming/addressing, network management, remote authentication and attestation)
Network attacks (e.g., DDoS, MitM, malware, botnets, side-channel attacks, phishing/pharming, cybersquatting) and defenses (e.g., network intrusion detection and prevention, firewalls, packet filters, moving target defence)
Network, internet and cloud forensics
Cybercrime investigation and attribution
Cyber threat intelligence and cyber incident responses
Anonymous and privacy-aware communications (e.g., Tor, darknet)
Internet censorship and circumvention
Secure communication and networking applications (e.g., industry 4.0, energy, transportation, smart cities)
Quantum key distribution and other quantum-based secure communications
Visualization of secure communications and networking
Privacy-preserving computing in secure communication and networking (e.g., privacy-preserving machine learning)
Distributed ledger technologies (e.g., blockchain and cryptocurrencies)
Resilience of computer networks and critical infrastructures
Defending false information online (e.g., mis-, dis- and mal-information)
Socio-technical aspects of secure communications and networking (e.g., usability, human behaviours, legal issues, cybercrime, economics)
Security and privacy of contact tracing and other COVID-19 related digital interventions with a core element on telecommunications or networking

---------------------------------------------------------
Publication
All registered papers will be submitted for publishing by Springer and made available through SpringerLink Digital Library: SecureComm Conference Proceedings.

SecureComm proceedings are indexed in leading indexing services, such as Web of Science, Compendex, Scopus, DBLP, EU Digital Library, Google Scholar, IO-Port, MathSciNet, Inspec, and Zentralblatt MATH.

Authors of selected papers will be invited to submit an extended version to:
Springer Wireless Networks Journal (WINET) [IF: 2.602 (2020)]

All accepted authors are eligible to submit an extended version in a fast track of:
EAI Endorsed Transactions on Industrial Networks and Intelligent Systems (Open Access) �C recently accepted for inclusion in Scopus
EAI Endorsed Transactions on Security and Safety (Open Access)

Additional publication opportunities:
EAI/Springer Innovations in Communications and Computing Book Series
(titles in this series are indexed in Ei Compendex, Web of Science & Scopus)

---------------------------------------------------------
Paper submission
Papers should be submitted through EAI 'Confy+' system, and have to comply with the Springer format (see Author's kit section).

All conference papers undergo a thorough peer review process prior to the final decision and publication. This process is facilitated by experts in the Technical Program Committee during a dedicated conference period. Standard peer review is enhanced by EAI Community Review which allows EAI members to bid to review specific papers. All review assignments are ultimately decided by the responsible Technical Program Committee Members while the Technical Program Committee Chair is responsible for the final acceptance selection. You can learn more about Community Review here.

---------------------------------------------------------
Important dates

Full Paper Submission deadline
17 April 2022
Notification deadline
19 June 2022
Camera-ready deadline
7 August 2022

Late Track
Full Paper Submission deadline
26 June 2022
Notification deadline
1 August 2022
Camera-ready deadline
7 August 2022

Start of Conference
17 October 2022
End of Conference
19 October 2022

===========================================================

*EAI SecureComm 2022: CALL FOR WORKSHOP PROPOSALS*
The 18th EAI International Conference on Security and Privacy in Communication Networks
https://securecomm.eai-conferences.org/2022/call-workshop-proposals/

===========================================================

The Conference Organizing Committee invites submissions from individuals or groups to organise Workshops at the SecureComm 2022.

Proposals are solicited for one-day or half-day workshops to be held as part of the SecureComm 2022 conference (October 17-19, 2022). Workshops bridging security and communications, or presenting new perspectives in security areas are particularly welcome. A full list of current topics of interest can be found in the SecureComm Call For Papers (https://securecomm.eai-conferences.org/2022/call-for-papers/).

SecureComm workshops provide a platform for presenting novel ideas in a less formal environment than the main conference itself. The submission format of each workshop will be determined by the workshop organizers.

Accepted workshop papers will be published in the SecureComm workshop proceedings by Springer, together with the main SecureComm proceedings. Thus, the timeline to print proceedings are planned according to the SecureComm proceedings schedule.

---------------------------------------------------------

Deadline for Workshop Proposals

Proposals Due: May 15, 2022

Notification of Workshop Proposal Acceptance: May 30, 2022

The dates for papers due, notification of acceptance, and camera ready will be determined by the workshop organizers and may change.

Individual Workshop Papers Due: June 15, 2022

Notification of Acceptance: July 30, 2022

Camera Ready: August 7, 2022

---------------------------------------------------------

Proposal content

* Workshop title
* Abstract (less than 200 words)
* Name, affiliation, and e-mail address for each organizer along with the specification of the primary contact person(s)
* Background and Motivation: What is the overall topic of the workshop? Why is this topic of particular interest at this time? If the workshop has been organized in the past at SecureComm or other conferences, please give details of previous instances (venue, URL) and describe why it should be held again and how it will extend and build upon previous ones.
* Topics and scope: These should be within or close to the scope covered by the main conference, as mentioned above.
* Format: Give a description of the proposed workshop format, including the target number of participants, planned activities (such as introductions, invited talks, breakout group activities, general discussion), as well as how these activities address the workshop objectives.
* Soliciting Submissions: Indicate how you plan to attract submissions and/or participants. Tactics may include circulating a call to relevant mailing lists (indicate these please as well), publicizing your workshop at other relevant venues, and more.
* Selecting Participants: Indicate how you plan to select participants and contributions to the workshop. Indicate a program committee to help with the organization/review process.
* Organizers: Give short descriptions of each of the organizers?background and interests related to security and privacy in communication networks and the specific workshop topic.

---------------------------------------------------------

Workshop selection

We aim to select a diverse set of workshops and avoid having multiple workshops on overlapping themes. Organizers of the selected workshops will be asked to produce a Call for Papers to describe the workshop to potential participants and solicit submissions. In order to promote vivid discussions with more participants to the workshops, EAI will provide Workshop Organizers with one free registration to the Workshop for each 10 papers submitted to their workshop.

The criteria for assessment will include:
- Relevance to conference vision/topics and attendees
- Potential to bring in participants to the conference from different audiences
- Overall quality of contribution
- Provides a hands-on, collaborative, and/or active learning environment for attendees

---------------------------------------------------------

Workshop publication

Accepted and presented papers will be published alongside the main conference proceedings as a sub-section/chapter. Paper formats should, therefore, correspond to the templates of the publisher of the main conference.

Workshop chairs are invited to engage with the journals and further publication opportunities.

---------------------------------------------------------

Proposal submission

Workshop proposals should be submitted in a maximum of 4 pages in PDF format, single-spaced.

Please email your workshop proposals to Workshop chairs: Dr. Lannan Lisa Luo and Dr. Fatih Turkmen.

0 new messages