First IEEE Conf 2013 - First IEEE Conference on Communications and Network Security
Date2013-10-14 - 2013-10-16
Deadline2013-03-01
VenueWashington, USA - United States
Keywords
Websitehttps://www.ieee-cns.org/
Topics/Call fo Papers
IEEE CNS 2013
First IEEE Conference on Communications and Network Security
Washington D.C., USA
October 14 ~16, 2013
CALL FOR PAPERS [http://www.cnsr.ictas.vt.edu/IEEE-CNS/docs/IEEE-CN...]
Cyber security has become an important research and development area for academia, government, and industry in recent years. As government and industry investment in cyber security research continues to grow, there will be a dramatic increase in the amount of new results generated by the research community, which must be disseminated widely amongst the research community in order to provide the peer review feedback that is needed to ensure that high-quality solutions that address important and emerging security issues are developed.
As a leading professional society focusing on communications technologies, IEEE Communications Society (ComSoc) has identified the need for a high-quality security conference that would focus on communications-oriented aspects of security. IEEE ComSoc has thus decided to launch a new conference dedicated to Communications and Network Security. This new conference is positioned to be a core ComSoc conference (at a level comparable to IEEE INFOCOM) and will serve as a premier forum for cyber security researchers, practitioners, policy makers, and users to exchange ideas, techniques and tools, raise awareness, and share experience related to security and privacy.
IEEE CNS seeks original high-quality technical papers from academia, government, and industry. Topics of interest encompass all practical and theoretical aspects of communications and network security, all the way from the physical layer to the various network layers to the variety of applications reliant on a secure communication substrate. Submissions with main contribution in other areas, such as information security, software security, system security, or applied cryptography, will also be considered if a clear connection to secure communications/networking is demonstrated.
Particular topics of interest include, but are not limited to:
Security and Privacy in the Internet, peer-to-peer networks, overlay networks
Security and Privacy in Wi-Fi, Wi-Max, ad hoc, mesh, sensor, and RFID networks
Security and Privacy in emerging technologies: social networks, cognitive radio networks, disruption/delay tolerant networks, vehicular networks, cloud computing, smart grid
Cross-layer methods for enhancing security
Information-theoretic security
Anonymization and privacy in communication systems
Traffic analysis, location privacy and obfuscation of mobile device information
Physical layer security methods: confidentiality and authentication
Secure routing, network management
Intrusion detection
Computer and network forensics
Vulnerability, exploitation tools, Malware, Botnet, DDoS attacks
Key management and PKI
Security metrics and performance evaluation, traffic analysis techniques
Web, e-commerce, m-commerce, and e-mail security
Social, economic and policy issues of trust, security and privacy
Ensuring the availability of communications, survivability of networks in the presence of denial of service
Jamming and jamming-resistance
Multipath routing around network holes
First IEEE Conference on Communications and Network Security
Washington D.C., USA
October 14 ~16, 2013
CALL FOR PAPERS [http://www.cnsr.ictas.vt.edu/IEEE-CNS/docs/IEEE-CN...]
Cyber security has become an important research and development area for academia, government, and industry in recent years. As government and industry investment in cyber security research continues to grow, there will be a dramatic increase in the amount of new results generated by the research community, which must be disseminated widely amongst the research community in order to provide the peer review feedback that is needed to ensure that high-quality solutions that address important and emerging security issues are developed.
As a leading professional society focusing on communications technologies, IEEE Communications Society (ComSoc) has identified the need for a high-quality security conference that would focus on communications-oriented aspects of security. IEEE ComSoc has thus decided to launch a new conference dedicated to Communications and Network Security. This new conference is positioned to be a core ComSoc conference (at a level comparable to IEEE INFOCOM) and will serve as a premier forum for cyber security researchers, practitioners, policy makers, and users to exchange ideas, techniques and tools, raise awareness, and share experience related to security and privacy.
IEEE CNS seeks original high-quality technical papers from academia, government, and industry. Topics of interest encompass all practical and theoretical aspects of communications and network security, all the way from the physical layer to the various network layers to the variety of applications reliant on a secure communication substrate. Submissions with main contribution in other areas, such as information security, software security, system security, or applied cryptography, will also be considered if a clear connection to secure communications/networking is demonstrated.
Particular topics of interest include, but are not limited to:
Security and Privacy in the Internet, peer-to-peer networks, overlay networks
Security and Privacy in Wi-Fi, Wi-Max, ad hoc, mesh, sensor, and RFID networks
Security and Privacy in emerging technologies: social networks, cognitive radio networks, disruption/delay tolerant networks, vehicular networks, cloud computing, smart grid
Cross-layer methods for enhancing security
Information-theoretic security
Anonymization and privacy in communication systems
Traffic analysis, location privacy and obfuscation of mobile device information
Physical layer security methods: confidentiality and authentication
Secure routing, network management
Intrusion detection
Computer and network forensics
Vulnerability, exploitation tools, Malware, Botnet, DDoS attacks
Key management and PKI
Security metrics and performance evaluation, traffic analysis techniques
Web, e-commerce, m-commerce, and e-mail security
Social, economic and policy issues of trust, security and privacy
Ensuring the availability of communications, survivability of networks in the presence of denial of service
Jamming and jamming-resistance
Multipath routing around network holes
Other CFPs
- 9th International Symposium on Applied Reconfigurable Computing
- The SIAM Conference on Control and Its Applications (CT13)
- 14th International Conference on Product Focused Software Development and Process Improvement (PROFES 2013)
- International Workshop on Design, Analysis and Tools for Integrated Circuits and Systems-GPC 2013 (DATICS-GPC 2013)
- The 3rd International Workshop on Cloud and Grid Interoperability (Cloud&Grid-13)
Last modified: 2012-10-06 23:30:47