CNS 2015 - 3rd IEEE Conference on Communications and Network Security
Date2015-09-28 - 2015-09-30
Deadline2015-07-20
VenueFlorence, Italy
Keywords
Websitehttps://cns2015.ieee-cns.org
Topics/Call fo Papers
3rd IEEE Conference on Communications and Network Security
Florence, Italy -- September 28-30, 2015
http://cns2015.ieee-cns.org/
===
IMPORTANT DATES
2-page Abstract Due by: July 20, 2015 11:59:pm American Samoa time [extended]
Notification of Acceptance: July 30, 2015
Final Abstract Due: August 10, 2015
***
A BEST POSTER AWARD Award will be given based on the poster's novelty and potentials in
research. The quality of presentation and the interaction during the session will also
be important criteria. The award will be announced in a plenary session of the main
conference.
***
SCOPE
IEEE CNS is a new conference series in IEEE Communications Society (ComSoc) core
conference portfolio and the only ComSoc conference focusing solely on cyber security.
IEEE CNS is a spin-off of IEEE INFOCOM, the premier ComSoc conference on networking.
The goal of CNS is to provide an outstanding forum for cyber security researchers,
practitioners, policy makers, and users to exchange ideas, techniques and tools,
raise awareness, and share experience related to all practical and theoretical
aspects of communications and network security.
Building on the success of the past two years' conferences, IEEE CNS 2015 welcomes
poster submissions to be presented during the conference. A poster submission should
be a 2-page abstract, which summarizes the key merits of proposed ideas, presents
initial results, and identifies challenges to develop a complete solution. Abstracts
will be evaluated by the Posters Session committee based on the novelty and the
potential to stimulate discussions and promote collaborations. Poster abstracts
should be submitted via EDAS at http://edas.info/N20343. Please follow the same
template for regular conference papers available on http://www.ieee-cns.org. Sample
topics of interest include but are not limited to:
- Anonymization and privacy in communication systems
- Biometric authentication and identity management
- Computer and network forensics
- Data and application security
- Data protection and integrity
- Availability of communications, survivability of networks in the presence of
attacks
- Key management and PKI for networks
- Information-theoretic security
- Intrusion detection and prevention
- Location privacy
- Mobile security
- Outsourcing of network and data communication services
- Physical layer security methods, cross-layer methods for enhancing security
- Secure routing, network management
- Security for critical infrastructures
- Security metrics and performance evaluation
- Security and privacy for big data
- Security and privacy in body area networks
- Security and privacy in content delivery network
- Security and privacy in cloud computing and federated cloud
- Security and privacy in crowdsourcing
- Security and privacy in the Internet of Things
- Security and privacy in multihop wireless networks: ad hoc, mesh, sensor,
vehicular and RFID networks
- Security and privacy in peer-to-peer networks and overlay networks
- Security and privacy in single-hop wireless networks: Wi-Fi, Wi-Max
- Security and privacy in smart grid, cognitive radio networks, and
disruption/delay tolerant networks
- Security and privacy in social networks
- Security and privacy in pervasive and ubiquitous computing
- Social, economic and policy issues of trust, security and privacy
- Traffic analysis
- Usable security for networked computer systems
- Vulnerability, exploitation tools, malware, botnet, DDoS attacks
- Web, e-commerce, m-commerce, and e-mail security
The conference will arrange the poster session in a room where the posters can be
displayed. An accepted poster must be presented by an author in the poster session
to interested attendees. The abstract of the accepted posters will appear in the
conference proceeding and be submitted to IEEE Xplore. Each accepted poster requires
an author to register for the conference at the appropriate rate based on the membership
level. Each author registration can cover up to three posters or papers of the conference,
but each poster must have a dedicated presenter at the session.
A Best Poster Award will be given based on the poster's novelty and potentials in
research. The quality of presentation and the interaction during the session will also
be important criteria. The award will be announced in a plenary session of the main
conference.
Florence, Italy -- September 28-30, 2015
http://cns2015.ieee-cns.org/
===
IMPORTANT DATES
2-page Abstract Due by: July 20, 2015 11:59:pm American Samoa time [extended]
Notification of Acceptance: July 30, 2015
Final Abstract Due: August 10, 2015
***
A BEST POSTER AWARD Award will be given based on the poster's novelty and potentials in
research. The quality of presentation and the interaction during the session will also
be important criteria. The award will be announced in a plenary session of the main
conference.
***
SCOPE
IEEE CNS is a new conference series in IEEE Communications Society (ComSoc) core
conference portfolio and the only ComSoc conference focusing solely on cyber security.
IEEE CNS is a spin-off of IEEE INFOCOM, the premier ComSoc conference on networking.
The goal of CNS is to provide an outstanding forum for cyber security researchers,
practitioners, policy makers, and users to exchange ideas, techniques and tools,
raise awareness, and share experience related to all practical and theoretical
aspects of communications and network security.
Building on the success of the past two years' conferences, IEEE CNS 2015 welcomes
poster submissions to be presented during the conference. A poster submission should
be a 2-page abstract, which summarizes the key merits of proposed ideas, presents
initial results, and identifies challenges to develop a complete solution. Abstracts
will be evaluated by the Posters Session committee based on the novelty and the
potential to stimulate discussions and promote collaborations. Poster abstracts
should be submitted via EDAS at http://edas.info/N20343. Please follow the same
template for regular conference papers available on http://www.ieee-cns.org. Sample
topics of interest include but are not limited to:
- Anonymization and privacy in communication systems
- Biometric authentication and identity management
- Computer and network forensics
- Data and application security
- Data protection and integrity
- Availability of communications, survivability of networks in the presence of
attacks
- Key management and PKI for networks
- Information-theoretic security
- Intrusion detection and prevention
- Location privacy
- Mobile security
- Outsourcing of network and data communication services
- Physical layer security methods, cross-layer methods for enhancing security
- Secure routing, network management
- Security for critical infrastructures
- Security metrics and performance evaluation
- Security and privacy for big data
- Security and privacy in body area networks
- Security and privacy in content delivery network
- Security and privacy in cloud computing and federated cloud
- Security and privacy in crowdsourcing
- Security and privacy in the Internet of Things
- Security and privacy in multihop wireless networks: ad hoc, mesh, sensor,
vehicular and RFID networks
- Security and privacy in peer-to-peer networks and overlay networks
- Security and privacy in single-hop wireless networks: Wi-Fi, Wi-Max
- Security and privacy in smart grid, cognitive radio networks, and
disruption/delay tolerant networks
- Security and privacy in social networks
- Security and privacy in pervasive and ubiquitous computing
- Social, economic and policy issues of trust, security and privacy
- Traffic analysis
- Usable security for networked computer systems
- Vulnerability, exploitation tools, malware, botnet, DDoS attacks
- Web, e-commerce, m-commerce, and e-mail security
The conference will arrange the poster session in a room where the posters can be
displayed. An accepted poster must be presented by an author in the poster session
to interested attendees. The abstract of the accepted posters will appear in the
conference proceeding and be submitted to IEEE Xplore. Each accepted poster requires
an author to register for the conference at the appropriate rate based on the membership
level. Each author registration can cover up to three posters or papers of the conference,
but each poster must have a dedicated presenter at the session.
A Best Poster Award will be given based on the poster's novelty and potentials in
research. The quality of presentation and the interaction during the session will also
be important criteria. The award will be announced in a plenary session of the main
conference.
Other CFPs
Last modified: 2015-07-16 23:00:48