• EAI SecureComm 2022: CALL FOR PAPERS

    From Richard Lee@hustliwenqiang@gmail.com to comp.security.misc on Wed Feb 23 16:46:29 2022
    From Newsgroup: comp.security.misc

    [Please accept our apologies if you receive multiple copies] ===========================================================
    *EAI SecureComm 2022: CALL FOR PAPERS*
    The 18th EAI International Conference on Security and Privacy in Communication Networks
    https://securecomm.eai-conferences.org/2022/call-for-papers/ ===========================================================
    Scope
    SecureComm is a conference in EAI core conference portfolio focusing on cybersecurity. The aim of SecureComm is to bring together researchers and practitioners in academic, industry, and government in security, networking, communication and other related communities to explore important research directions in the field. The 18th SecureComm conference seeks submissions of high-quality research contributions. Topics of interest encompass ALL areas of secure communications and networking. Topics in less related areas will be considered if a clear connection to secure communication and networking is demonstrated. Topics addressing interdisciplinary challenges in different application domains are welcome.
    EAI SecureComm 2022 will be held as an on-site conference and if needed, Accepted Authors who are unable to attend the event in person will be given an option to present remotely.
    ---------------------------------------------------------
    Topics
    Topics of interest include, but are not limited to the following:
    Security and privacy in computer networks (e.g., wired, wireless, mobile, hybrid, sensor, vehicular, satellite, 5G, 6G, ad hoc, peer-to-peer, and software-defined networks)
    Security and privacy in systems with a strong secure communication and networking element (e.g., security in cloud, IoT, cyber-physical systems, edge and fog computing, and teleconferencing)
    Physical layer security (e.g., jamming, GPS spoofing)
    Web and mobile security and privacy
    Security protocols at all network layers and for different applications (e.g., for secure routing, naming/addressing, network management, remote authentication and attestation)
    Network attacks (e.g., DDoS, MitM, malware, botnets, side-channel attacks, phishing/pharming, cybersquatting) and defenses (e.g., network intrusion detection and prevention, firewalls, packet filters, moving target defence)
    Network, internet and cloud forensics
    Cybercrime investigation and attribution
    Cyber threat intelligence and cyber incident responses
    Anonymous and privacy-aware communications (e.g., Tor, darknet)
    Internet censorship and circumvention
    Secure communication and networking applications (e.g., industry 4.0, energy, transportation, smart cities)
    Quantum key distribution and other quantum-based secure communications Visualization of secure communications and networking
    Privacy-preserving computing in secure communication and networking (e.g., privacy-preserving machine learning)
    Distributed ledger technologies (e.g., blockchain and cryptocurrencies) Resilience of computer networks and critical infrastructures
    Defending false information online (e.g., mis-, dis- and mal-information) Socio-technical aspects of secure communications and networking (e.g., usability, human behaviours, legal issues, cybercrime, economics)
    Security and privacy of contact tracing and other COVID-19 related digital interventions with a core element on telecommunications or networking
    ---------------------------------------------------------
    Publication
    All registered papers will be submitted for publishing by Springer and made available through SpringerLink Digital Library: SecureComm Conference Proceedings.
    SecureComm proceedings are indexed in leading indexing services, such as Web of Science, Compendex, Scopus, DBLP, EU Digital Library, Google Scholar, IO-Port, MathSciNet, Inspec, and Zentralblatt MATH.
    Authors of selected papers will be invited to submit an extended version to: Springer Wireless Networks Journal (WINET) [IF: 2.602 (2020)]
    All accepted authors are eligible to submit an extended version in a fast track of:
    EAI Endorsed Transactions on Industrial Networks and Intelligent Systems (Open Access) ¨C recently accepted for inclusion in Scopus
    EAI Endorsed Transactions on Security and Safety (Open Access)
    Additional publication opportunities:
    EAI/Springer Innovations in Communications and Computing Book Series
    (titles in this series are indexed in Ei Compendex, Web of Science & Scopus) ---------------------------------------------------------
    Paper submission
    Papers should be submitted through EAI 'Confy+' system, and have to comply with the Springer format (see Author's kit section).
    All conference papers undergo a thorough peer review process prior to the final decision and publication. This process is facilitated by experts in the Technical Program Committee during a dedicated conference period. Standard peer review is enhanced by EAI Community Review which allows EAI members to bid to review specific papers. All review assignments are ultimately decided by the responsible Technical Program Committee Members while the Technical Program Committee Chair is responsible for the final acceptance selection. You can learn more about Community Review here.
    ---------------------------------------------------------
    Important dates
    Full Paper Submission deadline
    3 April 2022
    Notification deadline
    19 June 2022
    Camera-ready deadline
    7 August 2022
    Start of Conference
    17 October 2022
    End of Conference
    19 October 2022
    ===========================================================
    *EAI SecureComm 2022: CALL FOR WORKSHOP PROPOSALS*
    The 18th EAI International Conference on Security and Privacy in Communication Networks
    https://securecomm.eai-conferences.org/2022/call-workshop-proposals/ ===========================================================
    The Conference Organizing Committee invites submissions from individuals or groups to organise Workshops at the SecureComm 2022.
    Proposals are solicited for one-day or half-day workshops to be held as part of the SecureComm 2022 conference (October 17-19, 2022). Workshops bridging security and communications, or presenting new perspectives in security areas are particularly welcome. A full list of current topics of interest can be found in the SecureComm Call For Papers (https://securecomm.eai-conferences.org/2022/call-for-papers/).
    SecureComm workshops provide a platform for presenting novel ideas in a less formal environment than the main conference itself. The submission format of each workshop will be determined by the workshop organizers.
    Accepted workshop papers will be published in the SecureComm workshop proceedings by Springer, together with the main SecureComm proceedings. Thus, the timeline to print proceedings are planned according to the SecureComm proceedings schedule.
    ---------------------------------------------------------
    Deadline for Workshop Proposals
    Proposals Due: May 15, 2022
    Notification of Workshop Proposal Acceptance: May 30, 2022
    The dates for papers due, notification of acceptance, and camera ready will be determined by the workshop organizers and may change.
    Individual Workshop Papers Due: June 15, 2022
    Notification of Acceptance: July 30, 2022
    Camera Ready: August 7, 2022 ---------------------------------------------------------
    Proposal content
    * Workshop title
    * Abstract (less than 200 words)
    * Name, affiliation, and e-mail address for each organizer along with the specification of the primary contact person(s)
    * Background and Motivation: What is the overall topic of the workshop? Why is this topic of particular interest at this time? If the workshop has been organized in the past at SecureComm or other conferences, please give details of previous instances (venue, URL) and describe why it should be held again and how it will extend and build upon previous ones.
    * Topics and scope: These should be within or close to the scope covered by the main conference, as mentioned above.
    * Format: Give a description of the proposed workshop format, including the target number of participants, planned activities (such as introductions, invited talks, breakout group activities, general discussion), as well as how these activities address the workshop objectives.
    * Soliciting Submissions: Indicate how you plan to attract submissions and/or participants. Tactics may include circulating a call to relevant mailing lists (indicate these please as well), publicizing your workshop at other relevant venues, and more.
    * Selecting Participants: Indicate how you plan to select participants and contributions to the workshop. Indicate a program committee to help with the organization/review process.
    * Organizers: Give short descriptions of each of the organizers?background and interests related to security and privacy in communication networks and the specific workshop topic.
    ---------------------------------------------------------
    Workshop selection
    We aim to select a diverse set of workshops and avoid having multiple workshops on overlapping themes. Organizers of the selected workshops will be asked to produce a Call for Papers to describe the workshop to potential participants and solicit submissions. In order to promote vivid discussions with more participants to the workshops, EAI will provide Workshop Organizers with one free registration to the Workshop for each 10 papers submitted to their workshop.
    The criteria for assessment will include:
    - Relevance to conference vision/topics and attendees
    - Potential to bring in participants to the conference from different audiences - Overall quality of contribution
    - Provides a hands-on, collaborative, and/or active learning environment for attendees
    ---------------------------------------------------------
    Workshop publication
    Accepted and presented papers will be published alongside the main conference proceedings as a sub-section/chapter. Paper formats should, therefore, correspond to the templates of the publisher of the main conference.
    Workshop chairs are invited to engage with the journals and further publication opportunities.
    ---------------------------------------------------------
    Proposal submission
    Workshop proposals should be submitted in a maximum of 4 pages in PDF format, single-spaced.
    Please email your workshop proposals to Workshop chairs: Dr. Lannan Lisa Luo and Dr. Fatih Turkmen.
    --- Synchronet 3.19c-Linux NewsLink 1.113