|
Past Conferences and Journal Special Issues
Last Modified:1/4/21
Note: Please contact
cipher-cfp@ieee-security.org by email if you have any questions..
Contents
TrustData 2020
11th International Workshop on Trust, Security and Privacy for Big Data,
Nanjing, China, December 18-20, 2020.
[posted here 6/29/20]
The proliferation of new technologies such as Internet of Things and cloud
computing calls for innovative ideas to retrieve, filter, and integrate data
from a large number of diverse data sources. Big Data is an emerging paradigm
applied to datasets whose volume/velocity/variability is beyond the ability of
commonly used software tools to manage and process the data within a tolerable
period of time. More importantly, Big Data has to be of high value, and should
be protected in an efficient way. Since Big Data involves a huge amount of data
that is of high-dimensionality and inter-linkage, existing trust, security, and
privacy measures for traditional databases and infrastructures cannot satisfy
its requirements. Novel technologies for protecting Big Data are attracting
researchers and practitioners with more and more attention.
For more information, please see
http://www.spaccs.org/trustdata2020/.
DL-CTI 2020
1st ICDM Workshop on Deep Learning for Cyber Threat Intelligence,
Held in conjunction with the IEEE International Conference on Data Mining (ICDM 2020),
Sorrento, Italy, November 17-20, 2020.
[posted here 6/29/20]
The regularity of devastating cyber-attacks has made cybersecurity a grand
societal challenge. To combat this societal issue, many organizations have
aimed to develop timely, relevant, and actionable intelligence about emerging
threats and key threat actors to enable effective cybersecurity decisions. This
process, also referred to as Cyber Threat Intelligence (CTI) has quickly emerged
as a key aspect of cybersecurity. At its core, CTI is a data-driven process that
requires relies on the systematic and large-scale analysis of log files, malware
binaries, events, Open Source Intelligence (OSINT), and other rapidly evolving
cybersecurity data sources. While numerous traditional text mining, web mining,
and data mining approaches have seen remarkable developments in the past
half-decade, these approaches rely on manual feature engineering approaches.
In a rapidly evolving domain, such efforts are highly reactive, labor intensive,
and can result in missing critical insights. Deep learning holds significant
promise in automatically analyzing large quantities of structured, unstructured,
and semi-structured data identify patterns, emerging threats, and key hackers
without ad-hoc feature engineering efforts. As a result, deep learning-based CTI
systems are more resilient, detect threats previously missed by conventional
analyses, and are dynamic to the ever-evolving threat landscape. Despite its
successes, Deep Learning for CTI (DL-CTI) remains a nascent, yet promising,
research area. This workshop seeks to foster a budding community of cybersecurity
data scientists by recruiting high quality papers and holding discussions related
to emerging applications, techniques, and methodologies related to
deep learning for CTI applications.
For more information, please see
https://www.dl-cti.org/.
DependSys 2020
6th IEEE International Conference on Dependability in Sensor,
Cloud, and Big Data Systems and Applications,
Fiji, December 14-16, 2020.
[posted here 6/8/20]
IEEE DependSys 2020 conference is the 6th event in the series of conferences
which offers a timely venue for bringing together new ideas, techniques, and
solutions for dependability and its issues in sensor, cloud, and big data
systems and applications. As we are deep into the Information Age, huge amounts
of data are generated every day from sensors, individual archives, social networks,
Internet of Things, enterprises and Internet in various scales and format which
will pose a major challenge to the dependability of our designed systems. As these
systems often tend to become inert, fragile, and vulnerable after a period of
running. Effectively improving the dependability of sensor, cloud, big data systems
and applications has become increasingly critical.
This conference provides a forum for individuals, academics, practitioners, and
organizations who are developing or procuring sophisticated computer systems on
whose dependability of services they need to place great confidence. Future
systems need to close the dependability gap in face of challenges in different
circumstances. The emphasis will be on differing properties of such services, e.g.,
continuity, effective performance, real-time responsiveness, ability to overcome
data fault, corruption, anomaly, ability to avoid catastrophic failures, prevention
of deliberate privacy intrusions, reliability, availability, sustainability,
adaptability, heterogeneity, security, safety, and so on.
For more information, please see
http://cse.stfx.ca/~dependsys/2020/.
IoTSMS 2020
7th International Conference on Internet of Things: Systems,
Management and Security,
Paris, France, December 14-16, 2020.
[posted here 6/22/20]
The Internet of Things (IoT) technology offers unprecedented opportunities to
interconnect human beings as well as Machine-to-Machine (M2M), whereby sensors
and networks allow all ëthingsà to communicate directly with each other to
share vital information allowing us to have an instrumented universe where
accurate data is readily available to inform optimal decision making. The IoT
is about to enable a range of new capabilities and services far beyond todayÃs
offerings. It will fundamentally change how people go about their lives. According
to Gartner, the number of objects connected to the Internet is set to reach
20 billion by 2020. Cisco estimates the number will be close to 26 billion
objects by 2020. Others believe the actual number will be even higher with the
assumption that any object with a simple micro controller and on-off switch will
be connected to the Internet in the near feature. The scale of the IoT is set to
have a major economic, social and environmental impacts; the intersection of which
forms the future sustainable growth.
The international conference on Internet of Things: Systems, Management and
Security (IoTSMS) aims at soliciting original ideas on the broad area of IoT
including challenges and opportunities, concepts and applications and future
trends. The IoTSMS aims to facilitate discussions among academics and IoT
practitioners and make positive contributions to the field.
For more information, please see
https://emergingtechnet.org/IOTSMS2020/.
SECICT 2020
13th International Conference on Security for Information Technology and Communications,
Bucharest, Romania, November 19-20, 2020.
[posted here 5/11/20]
The conference venue will be the Palace of the National Military Circle,
located right in the heart of Bucharest, the capital city of Romania.
SECITC brings together computer security researchers, cryptographers, industry
representatives and graduate students interested in any aspect of information
security and privacy. One of SECITC’s primary goal is connecting security and
privacy researchers as well as professionals from different communities and
providing a forum that allows informal exchanges necessary for the emergence
of new scientific and industrial collaborations.
Topics comprise all aspects of Information Security, including but not limited to
the following areas: Access Control, Algorithmic Tools for Security and Cryptography,
Cryptology, Application Security, Attacks and Defenses, Authentication Biometry,
Censorship and Censorship-Resistance, Cloud Security, Distributed Systems Security,
Embedded Systems Security, Digital Forensics, Hardware Security, Information
Flow Analysis, Internet of Things (IoT) Security, Intrusion Detection,
Language-Based Security, Malware, Mobile Security and Privacy, Network Security,
New Exploits, Policy Enforcements, Privacy and Anonymity, Protocol Security,
Reverse-Engineering and Code Obfuscation, Security Architectures, Security
Aspects of Alternative Currencies, Side Channel Attacks, Surveillance
and Anti-Surveillance, System Security.
For more information, please see
http://www.secitc.eu/.
SenSys 2020
18th ACM Conference on Embedded Networked Sensor Systems,
Yokohama, Japan, November 16-19, 2020.
[posted here 2/10/20]
The 18th ACM Conference on Embedded Networked Sensor Systems (SenSys 2020) introduces
a highly selective, single-track forum for research on systems issues of sensors and
sensor-enabled smart systems, broadly defined. Systems of smart sensors will revolutionize
a wide array of application areas by providing an unprecedented density and fidelity of
instrumentation. They also present various systems challenges because of resource
constraints, uncertainty, irregularity, mobility, and scale. This conference
provides an ideal venue to address research challenges facing the design, development,
deployment, use, and fundamental limits of these systems. Sensing systems require
contributions from many fields, from wireless communication and networking, embedded
systems and hardware, energy harvesting and management, distributed systems and
algorithms, data management, and applications, so we welcome cross-disciplinary work.
For more information, please see
http://sensys.acm.org/2020/.
ISI 2020
18th Annual IEEE International Conference on Intelligence and Security Informatics,
Virtual, November 9-10, 2020.
[posted here 6/29/20]
Intelligence and security informatics (ISI) is an interdisciplinary field involving
academic researchers in information technology, social and behavioral sciences,
computer science, law, and public policy. The field also includes industry
consultants, practitioners, security managers, and chief information security
officers who support physical and cybersecurity missions at the individual,
organizational, national, and international levels (e.g., anticipation, interdiction,
prevention, preparedness, and response to threats).
Over the past 17 years, the IEEE ISI Conference has evolved from its traditional
orientation towards the intelligence and security domain to a more integrated
alignment of multiple domains, including technology, humans, organizations, and
security. The scientific community has increasingly recognized the need to address
intelligence and security threats by understanding the interrelationships between
these different components, and by integrating recent advances from different domains.
For more information, please see
http://www.isi-conf.org/.
WPES 2020
Workshop on Privacy in the Electronic Society,
Held in conjunction with the ACM Conference on Computer and Communications Security (CCS 2020),
Orlando, Florida, USA, November 9, 2020.
[posted here 7/6/20]
The Information Revolution has thoroughly transformed society. One of
the major implications of this technological shift has been a massive
increase in the collection, sharing, and analysis of personal data.
The goal of this workshop is to discuss the privacy problems that
result as well as their solutions. This will be the 19th occurrence of
this annual forum, which is held in conjunction with the ACM CCS conference.
The workshop seeks submissions from academia, government, and industry
presenting novel research on all theoretical and practical aspects of
electronic privacy, as well as experimental studies of fielded
systems, and systematization of knowledge (SoK) submissions. We
encourage submissions from other communities such as law and business
that present these communities' perspectives on technological issues.
For more information, please see
https://wpes.tech/.
CCSW 2020
ACM Cloud Computing Security,
Held in conjunction with the ACM Conference on Computer and Communications Security (CCS 2020),
Orlando, Florida, USA, November 9, 2020.
[posted here 7/6/20]
Clouds and massive-scale computing infrastructures are starting to dominate computing
and will likely continue to do so for the foreseeable future. Major cloud
operators are now comprising millions of cores hosting substantial fractions
of corporate and government IT infrastructure. CCSW is the world's premier forum
bringing together researchers and practitioners in all security aspects of cloud-centric
and outsourced computing. CCSW especially encourages novel paradigms and controversial ideas that
are not on the above list. The workshop has historically acted as a fertile
ground for creative debate and interaction in security-sensitive areas of computing impacted by clouds.
For more information, please see
https://ccsw.io.
CCS 2020
27th ACM Conference on Computer and Communications Security,
Orlando, FL, USA, November 9-13, 2020.
[posted here 1/20/20]
The 27th ACM Conference on Computer and Communications Security (CCS) seeks
submissions presenting novel contributions related to all real-world aspects of
computer security and privacy. Theoretical papers must make a convincing case
for the relevance of their results to practice. Authors are encouraged to
write the abstract and introduction of their paper in a way that makes the
results accessible and compelling to a general computer-security researcher.
In particular, authors should bear in mind that anyone on the program
committee may be asked to review any paper.
As in 2019, CCS will have two review cycles in 2020. For each submission,
one of the following decisions will be made:
Accept: Papers in this category will be accepted for publication in
the proceedings and presentation at the conference, possibly after making
minor changes with the oversight of a shepherd.
Major Revision: Papers in this category are considered to be promising
but need additional work (e.g., new experiments, proofs, or implementations).
Authors will be given the opportunity to resubmit such papers, with
appropriate revisions, in which case they should clearly explain in
a well-marked appendix how the revisions address the comments of the
reviewers. The revised paper will then be re-evaluated, and either
accepted or rejected.
Reject: Papers in this category are declined for inclusion in the
conference. Papers rejected from the first review cycle may not be
submitted again (even in revised form) to the second review cycle.
Authors of each accepted paper must ensure that at least one author
registers for the conference, and that their paper is presented
in-person at the conference.
For more information, please see
https://www.sigsac.org/ccs/CCS2020/call-for-papers.html.
Blockchain 2020
IEEE International Conference on Blockchain,
Rhode Island, Greece, November 2-6, 2020.
[posted here 12/9/19]
As a promising technique to achieve decentralized consensus, blockchain has been successfully
applied into digital currency, e.g., bitcoin, for serving as a public ledger
for transactions. Its secure design for supporting a distributed computing system with high fault tolerance is
attracting wide attention all over the world. Blockchain has a great potential
to create new foundations for our socio-economic systems by efficiently
establishing trust among people and machines, reducing cost, and increasing
utilization of resources. On one hand, blockchain will play an important role for
secure decentralization in such emerging fields as Internet of Things, Cyber Physical
Systems, edge computing, social networking, crowdsourcing and next generation
wireless communications, and even more other fields. On the other hand, its
advance should be further evolved in terms of scalability, security, privacy,
efficiency, flexibility, availability, real decentralization and high dependability.
Following the great success of IEEE Blockchain 2019, held in Atlanta, USA, IEEE Blockchain 2018,
held in Halifax, Canada, the 2020 IEEE International Conference on Blockchain
(Blockchain-2020) will provide a high-profile, leading-edge forum for researchers,
engineers, and practitioners to present latest advances and innovations in
key theories, infrastructure, schemes, and significant applications for
the blockchain, as well as to identify emerging research topics and define the future.
For more information, please see
http://www.blockchain-ieee.org/.
CFATI 2020
1st International Workshop on Cyber Forensics and Advanced Threat
Investigations in Emerging Networks,
Held in conjunction with the 11th International Conference on Emerging Ubiquitous
Systems and Pervasive Networks (EUSPN 2020),
Madeira, Portugal, November 2-5, 2020.
[posted here 6/29/20]
The main motivation for this Workshop is to bring together researchers and
practitioners working on cyber forensics and threat investigations for
emerging networks to disseminate current research issues and advances. Original
technical papers describing new, state-of-the-art research will be considered.
The Workshop welcomes submissions that evaluate existing research results by
reproducing experiments. The aim of this workshop is to provide insight for the
discussion of the major research challenges and achievements on various topics
of interest.
Papers on practical as well as on theoretical topics and problems in various topics
related to cyber forensics and threat investigations are invited, with special emphasis
on novel techniques and tools to collect data from networked devices and services in
emerging networks (such as the ones can be found in cyber-physical systems and
Internet of things).
For more information, please see
https://cfati.conceptechint.net/index.html.
SpaCCS 2020
13th International Conference on Security, Privacy and Anonymity in
Computation, Communication and Storage,
Nanjing, China, October 23 - 25, 2020.
[posted here 1/20/20]
The SpaCCS 2020 conference is the 13th event in the series of
conferences which are devoted to security, privacy and anonymity in
computation, communication and storage. SpaCCS is now recognized as the
main regular event of the world that is covering many dimensions
including security algorithms and architectures, privacy-aware policies,
regulations and techniques, anonymous computation and communication,
encompassing fundamental theoretical approaches, practical experimental
projects, and commercial application systems for computation,
communication and storage. As applications of computer systems and
networks have permeated in every aspect of our daily life, the issues of
security, privacy, and anonymity have become increasingly critical. The
conference will provide a forum for the world-class researchers to
gather and share their research achievements, emerging ideas and trends
in the highly challenging research fields.
For more information, please see
http://www.spaccs2020.com/.
SCN 2020
12th Conference on Security and Cryptography for Networks,
Amalfi, Italy, September 14 - 16, 2020.
[posted here 2/10/20]
The Twelfths Conference on Security and Cryptography for Networks (SCN 2020)
aims to bring together researchers in the field of cryptography and information
security, practitioners, developers, and users to foster cooperation, exchange
techniques, tools, experiences and ideas. The conference seeks submissions from
academia, government, and industry presenting novel research on all practical and
theoretical aspects of cryptography and information security. The primary focus is
on original, high quality, unpublished research of theoretical and practical
impact, including concepts, techniques, applications and practical experiences.
Submitted papers must not substantially overlap with papers that have been
published or that are simultaneously submitted to a journal or a
conference/workshop with proceedings.
All topic areas related to cryptography and information security are of
interest and in scope. Suggested topics include but are not restricted to:
- Anonymity and Privacy
- Applied Cryptography and Implementations
- Authentication, Identification and Access Control
- Block and Stream Ciphers
- Complexity-Theoretic Cryptography
- Cloud Computing Security
- Cryptanalysis
- Cryptocurrencies
- Cryptographic Hash Functions
- Cryptographic and Security Protocols
- Digital Signatures and Message Authentication Codes
- Distributed Systems Security
- Formal Security Methods
- Information-Theoretic Security
- Network, Web and Wireless Security
- Public-Key Encryption
- Physical Cryptography
- Security Architectures and Models
- Software and Systems Security
For more information, please see
https://scn.unisa.it/.
IEEE S&B 2020
4th IEEE Security and Privacy on the Blockchain Workshop,
Held in conjunction with EuroS&P 2020,
Genova, Italy, September 7-11, 2020.
[posted here 3/2/20]
Cryptocurrencies have emerged as a promising instrument for financial
transaction services that provide transparency and integrity in a
decentralized fashion. Their clever combination of blockchains with new
incentive mechanisms facilitate publicly verifiable and peer-to-peer transactions
without a trusted central party. As a result, they have caught the attention of
academic researchers, mainstream media, regulators, entrepreneurs and traditional
financial institutions. As a subject for academic research, the global and
self-enforcing nature of blockchains raises interesting questions and challenges
across several disciplines including computer science, law, economic and
human-computer interaction. Our workshop focuses on a wide-range of topics
ranging from the scalability of cryptocurrencies, achieving and evaluating
financial privacy in public blockchains, permissioning access to blockchains to
satisfy regulatory requirements, aligning honest behaviour in blockchain ecosystems
and smart contracts through the application of game theory and mechanism design,
and the critical analysis of various applications of blockchain to other domains.
For more information, please see
https://ieeesb.org.
IWSEC 2020
15th International Workshop on Security,
Fukui, Japan, September 2 - 4, 2020.
[posted here 2/17/20]
Original papers on the research and development of various security
topics, as well as case studies and implementation experiences, are
solicited for submission to IWSEC 2020. Topics of interest for IWSEC
2020 include all theory and practice of cryptography, information security,
and network security, as in the previous IWSEC workshops. We classify the
topics of interest into two tracks as follows, but not limited to
(1) Cryptography Track and (2) Cybersecurity and privacy track.
For more information, please see
http://www.iwsec.org/2020/.
5G-NS 2020
Workshop on 5G Networks Security,
Held in the conjunction with the ARES workshops EU Projects Symposium 2020
at 15th International Conference on Availability, Reliability and Security (ARES 2020),
Dublin, Ireland, August 25 - 28, 2020.
[posted here 2/3/20]
With the great success and development of 4G mobile networks it is expected that
the 5th generation wireless systems (in short 5G) will be a continued effort toward
rich ubiquitous communication infrastructure, promising wide range of high-quality
services. It is envisioned that 5G communication will offer significantly greater data
bandwidth and almost infinite capability of networking resulting in unfaltering user
experiences for, among others: virtual/augmented reality, massive content streaming,
telepresence, user-centric computing, crowded area services, smart personal networks,
Internet of Things (IoT), smart buildings, smart cities.
The 5G communication is currently in the center of attention of industry, academia,
and government worldwide. 5G drives many new requirements for different network capabilities.
As 5G aims at utilizing many promising network technologies, such as Software Defined
Networking (SDN), Network Functions Virtualization (NFV), Information Centric Network (ICN),
Network Slicing, Cloud Computing, etc. and supporting a huge number of connected devices
integrating above mentioned advanced technologies and innovating new techniques will surely
bring tremendous challenges for security, privacy and trust. Therefore, secure network
architectures, mechanisms, and protocols are required as the basis for 5G to address these
issues and follow security-by-design approaches. Finally, since in 5G networks even more user
data and network traffic will be transmitted, big data security solutions should be considered
in order to address the magnitude of the data volume and ensure data security and privacy.
From this perspective, the 5G-NS 2020 workshop aims at collecting the most relevant ongoing
research efforts in 5G networks security field. It also serves as a forum for 5G-PPP
Phase 1 & Phase 2 projects in order to disseminate their security-related results and
tighten & boost cooperation, and foster development of the 5G Security Community made
of 5G security experts and practitioners who pro-actively discuss and share information
to collectively progress and align on the field.
For more information, please see
https://www.ares-conference.eu/workshops/5g-ns-2020/.
IWCC 2020
9th International Workshop on Cyber Crime,
Held in conjunction with the 15th International Conference on Availability, Reliability and Security (ARES 2020),
Dublin, Ireland, August 24-28, 2020.
[posted here 1/20/20]
TodayÕs worldÕs societies are becoming more and more dependent on
open networks such as the Internet à where commercial activities, business
transactions and government services are realized. This has led to the fast
development of new cyber threats and numerous information security issues
which are exploited by cyber criminals. The inability to provide trusted
secure services in contemporary computer network technologies has a tremendous
socio-economic impact on global enterprises as well as individuals.
Moreover, the frequently occurring international frauds impose the
necessity to conduct the investigation of facts spanning across multiple
international borders. Such examination is often subject to different
jurisdictions and legal systems. A good illustration of the above being
the Internet, which has made it easier to perpetrate traditional crimes.
It has acted as an alternate avenue for the criminals to conduct their
activities, and launch attacks with relative anonymity. The increased
complexity of the communications and the networking infrastructure is
making investigation of the crimes difficult. Traces of illegal digital
activities are often buried in large volumes of data, which are hard to
inspect with the aim of detecting offences and collecting evidence.
Nowadays, the digital crime scene functions like any other network, with
dedicated administrators functioning as the first responders.
This poses new challenges for law enforcement policies and forces the computer
societies to utilize digital forensics to combat the increasing number of
cybercrimes. Forensic professionals must be fully prepared in order to be
able to provide court admissible evidence. To make these goals achievable,
forensic techniques should keep pace with new technologies.
The aim of this workshop is to bring together the research accomplishments
provided by the researchers from academia and the industry. The other goal
is to show the latest research results in the field of digital forensics
and to present the development of tools and techniques, which assist the
investigation process of potentially illegal cyber activity. We encourage
prospective authors to submit related distinguished research papers on the
subject of both: theoretical approaches and practical case reviews.
For more information, please see
https://www.ares-conference.eu/workshops/iwcc-2020/.
CUING 2020
4th International Workshop on Criminal Use of Information Hiding,
Held in conjunction with the 15th International Conference on Availability, Reliability and Security (ARES 2020),
Dublin, Ireland, August 24-28, 2020.
[posted here 1/20/20]
With the constant rise of the number of Internet users, available
bandwidth and an increasing number of services shifting into the connected world,
criminals are increasingly active in the virtual world. With improving defensive
methods cybercriminals have to utilize more and more sophisticated ways to
perform their malicious activities. While protecting the privacy of users, many
technologies used in current malware and network attacks have been abused in
order to allow criminals to carry out their activities undetected. This poses a
lot of new challenges for digital forensics analysts, academics, law enforcement
agencies (LEAs), and security professionals.
The aim of the 4th International Workshop on Criminal Use of Information Hiding (CUIng)
is to bring together researchers, practitioners, law enforcement representatives,
and security professionals in the area of analysis of information hiding.
However data hiding is understood here in a wider manner than in the academic
world i.e. all techniques that pertain to camouflaging/masking/hiding various
types of data (e.g. identities, behavior, communication, etc.) are included
here. This means not only digital steganography/covert channels but also
obfuscation/anti-forensics techniques and even underground networks
(darknets) or activities related to behavior impersonation or mimicking.
This will allow to present a more complete picture on novel research
regarding the use of data and communication hiding methods in criminal
environments and discuss ideas for fighting misuse of privacy enhancing technologies.
Moreover, this year the CUING workshop is co-organized with the
SIMARGL (Secure Intelligent Methods for Advanced RecoGnition of malware and stegomalware) H2020 project.
For more information, please see
https://www.ares-conference.eu/workshops/cuing-2020/.
USENIX-Security 2020
29th USENIX Security Symposium,
Boston, MA, USA, August 12–14, 2020.
[posted here 05/20/19]
The USENIX Security Symposium brings together researchers, practitioners,
system administrators, system programmers, and others interested in the latest
advances in the security and privacy of computer systems and networks.
All researchers are encouraged to submit papers covering novel and scientifically
significant practical works in computer security. The Symposium will span three
days with a technical program including refereed papers, invited talks, posters,
panel discussions, and Birds-of-a-Feather sessions. Co-located events will
precede the Symposium on August 10 and 11.
For more information, please see
https://www.usenix.org/conference/usenixsecurity20/call-for-papers.
SciSec 2020
3rd International Conference on Science of Cyber Security,
Shanghai, China, August 9-11, 2020.
[posted here 1/20/20]
This new forum was initiated in 2018 and aims to catalyze the
research collaborations between the relevant communities and disciplines
that can work together to deepen our understanding of, and build a firm
foundation for, the emerging Science of Cyber Security. Publications in
this venue would distinguish themselves from others by taking or thinking
from a holistic perspective about cyber security, rather than a
building-block perspective. Each submission will be reviewed by at least
3 reviewers. The program committee plans to select and award a Best Paper.
The post-conference proceedings will be published in SpringerÕs Lecture
Notes in Computer Science (LNCS) series.
For more information, please see
http://www.sci-cs.net.
IoTSPT-ML 2020
10th International Workshop on Security, Privacy, Trust, and Machine Learning for
Internet of Things,
Held in conjunction with the 29th International Conference on Computer Communications and Networks (ICCCN 2020),
Honolulu, Hawaii, USA, August 6, 2020.
[posted here 2/24/20]
Experts predict that there will be 3-4 billion of connected devices in use by consumers
by the end of this year. Although these devices in smart TVs, microwave ovens, thermostats,
etc., will probably make our lives more energy and cost efficient, they can also
threaten the security of our homes. This is because the manufacturers of these devices
are primarily interested in functionality and do not focus on securing the device
against cyber-attacks, protecting the privacy of consumer information on the device,
securing the communications from/to the device, etc. The massive scale and the variety
of these devices also make it difficult for the manufacturers to design and implement
manageable security and privacy solutions.
Another challenge in the IoT world is the continuous collection of data from the devices
which is analyzed to make conclusions about the environment being monitored by the IoT
devices. The data analyses are also crucial to maintaining the security and privacy of
the data being collected from the devices. The massive scale of next-generation IoT
systems makes the data collection, analyses, transport, and fusion of the results at
the system level seem daunting.
This workshop aims to promote discussions of research and relevant activities in
the models and design of secure, privacy-preserving, or trust architectures, data
analyses and fusion platforms, protocols, algorithms, services, and applications
for next generation IoT systems. We especially encourage security and privacy
solutions that employ innovative machine learning techniques to tackle the issues
of data volume and variety problems that are systemic in IoT platforms.
We plan to seek previously unpublished work in theoretical or experimental research,
or work in-progress
For more information, please see
https://sites.google.com/uw.edu/iotspt-ml-2020.
EAI SPNCE 2020
3rd EAI International Conference on Security and Privacy in New Computing Environments,
Lyngby, Denmark, July 27 - 28, 2020.
[posted here 2/10/20]
The existing computing models and computing environments have changed immensely due to
the rapid advancements in mobile computing, big data, and cyberspace-based supporting
technologies such as cloud computing, Internet-of-Things (IoT), blockchain, and other
large-scale computing environments. In recent years, we have witnessed an ever-growing
research interest in this field, and the key reason is its essential properties that
provide security, anonymity, and data integrity without any third-party organization
in control of the transactions. On the other hand, its advance should be further
supported with better scalability, privacy, efficiency, flexibility, availability,
and higher dependability. Traditional security techniques are faced with many
challenges in these new computing environments. Thus, efforts are needed to explore
the security and privacy issues of the above-mentioned new environments within the
cyberspace.
For more information, please see
http://spnce.org/.
DAC 2020
Design Automation Conference,
Moscone Center West, San Francisco, CA, USA, July 19 - 23, 2020.
[posted here 10/7/19]
For 57 years, the Design Automation Conference (DAC) has been recognized as the
leading-edge conference on research and practice in tools and methodologies
for the design and design automation of electronic circuits and systems. DAC
offers outstanding training, education, exhibits and networking opportunities
for a worldwide community of designers, researchers, tool developers and vendors.
Submissions are invited for Special Sessions, Designer Track, IP and Embedded
Systems Track papers and presentations, poster sessions, panels, workshops,
tutorials and co-located conferences. Criteria, topics and deadlines for the
major tracks are outlined briefly below.
Security and Privacy sessions at DAC address an urgent need to create, analyze,
evaluate, and improve the hardware, embedded systems and software base of
contemporary security solutions. Secure and trustworthy software and hardware
components, platforms and supply chains are vital to all domains including
financial, healthcare, transportation, and energy. A revolution is underway
in many industries that are "connecting the unconnected.î Such cyber-physical
systems -- e.g., automobiles, smart grid, medical devices, etc. -- are taking
advantage of integration of physical systems with information systems.
Notwithstanding the numerous benefits, these systems are appealing targets
of attacks. The scope and variety of attacks on these systems present design
challenges that span embedded hardware, software, networking, and system design.
For more information, please see
https://dac.com/call-for-contributions.
PETS 2020
20th Privacy Enhancing Technologies Symposium,
Montreal, Canada, July 14 - 18, 2020.
[posted here 07/22/19]
The annual Privacy Enhancing Technologies Symposium (PETS) brings
together privacy experts from around the world to present and discuss recent
advances and new perspectives on research in privacy technologies. The 20th PETS
event will be organised by Concordia University and the Universite du Quebec a Montreal
and held in Montreal, Canada, on a date in 2020 yet to be determined. Papers undergo
a journal-style reviewing process, and accepted papers are published in the
journal Proceedings on Privacy Enhancing Technologies (PoPETs).
PoPETs, a scholarly, open-access journal for research papers on privacy, provides
high-quality reviewing and publication while also supporting the successful PETS
community event. PoPETs is published by Sciendo, part of De Gruyter, which has over
260 years of publishing history. PoPETs does not have article processing charges
(APCs) or article submission charges.
Authors can submit papers to PoPETs four times a year, every three months, and are notified
of the decisions about two months after submission. In addition to accept and reject
decisions, papers may receive resubmit with major revisions decisions, in which case authors
are invited to revise and resubmit their article to one of the following two issues.
We endeavor to assign the same reviewers to revised submissions. Each paper accepted
in the PoPETs 2020 volume must be presented in person at the PETS 2020 symposium.
For more information, please see
https://petsymposium.org.
WiSec 2020
13th ACM Conference on Security and Privacy in Wireless and Mobile Networks,
Linz, Austria, July 8 - 10, 2020.
[posted here 2/17/20]
ACM WiSec is the leading ACM and SIGSAC conference dedicated to all aspects of
security and privacy in wireless and mobile networks and their applications. In
addition to the traditional ACM WiSec topics of physical, link, and network layer
security, we welcome papers focusing on the increasingly diverse range of mobile or
wireless applications such as Internet of Things, Cyber-Physical Systems, as well as
the security and privacy of mobile software platforms, usable security and privacy,
biometrics, and cryptography.
The conference welcomes both theoretical as well as systems contributions.
For more information, please see
https://wisec2020.ins.jku.at/.
SECRYPT 2020
17th International Conference on Security and Cryptography,
Paris, France, July 8 - 10, 2020.
[posted here 12/23/19]
SECRYPT is an annual international conference covering research
in information and communication security.
The conference seeks submissions from academia, industry, and government presenting
novel research on all theoretical and practical aspects of data protection, privacy,
security, and cryptography. Papers describing the application of security technology,
the implementation of systems, and lessons learned are also encouraged. Papers
describing new methods or technologies, advanced prototypes, systems, tools and
techniques and vision papers indicating future directions are also encouraged.
For more information, please see
http://www.secrypt.icete.org.
CyberSECHARD 2020
2nd IFIP NTMS Workshop on Cybersecurity on Hardware,
Held in conjunction with the 11th IFIP International Conference on New Technologies,
Mobility and Security (NTMS 2020),
Paris, France, July 6 - 8, 2020.
[posted here 3/16/20]
The 2nd edition of the Workshop on “CyberSECurity on HARDware (CyberSECHARD)†seeks papers in the areas of interest,
in alphabetical order, include, but are not limited to:
- Architectures and Applications
- Attacks: Implementations and Countermeasures
- Constrained and Trusted Environments
- Cryptanalysis for Hardware
- Cryptographic Primitives
- Cyberphysical and Embedded Systems
- Energy Aware Hardware Implementations
- Evaluation & Testing
- Hardware Crypto-Processors
- Hardware Obfuscation
- Internet of Things (IoT) & Cybersecurity
- Lightweight Cryptography
- Networks, Protocols and Communications: Hardware Integrations
- Pervasive & Ubiquitous Computing, Privacy
- PUFs and TRNGs for Hardware
- Reconfigurable Cybersecurity Computing
- Reconfigurable Design & Implementation
- Reverse Engineering
- Smart Cards Cybersecurity
- System-on-Chip (SoC) Design & Implementation
- Trojans on Hardware
- Trust and Anti-Counterfeiting
- Vehicular Hardware Cybersecurity
For more information, please see
http://www.ntms-conf.org/ntms2020/call-for-workshops/cybersechard.
CNS 2020
8th IEEE Conference on Communications and Network Security,
Avignon, France, June 29 - July 1, 2020.
[posted here 11/18/19]
The IEEE Conference on Communications and Network Security (CNS) is a premier forum for cybersecurity
researchers, practitioners, policy makers, and users to exchange ideas, techniques and tools,
raise awareness, and share experiences related to all practical and theoretical aspects of
communications and network security. The conference seeks submissions from academia, government,
and industry presenting novel research results in communications and network security.
Particular topics of interest include, but are not limited to:
- Anonymity and privacy technologies
- Biometric authentication and identity management
- Censorship countermeasures and privacy
- Combating cyber-crime (anti-spam, anti-phishing, anti-fraud techniques, etc.)
- Computer and network forensics
- Cyber deterrence strategies
- Data and application security
- Data protection and integrity
- Game-theoretic security technologies
- Implementation and evaluation of networked security systems
- Information-theoretic security
- Intrusion detection, prevention, and response
- Key management, public key infrastructures, certification, revocation, and authentication
- Malware detection and mitigation
- Security metrics and models
- Physical-layer and cross-layer security technologies
- Security and privacy for big data
- Security and privacy for data and network outsourcing services
- Security and privacy for mobile and wearable devices
- Security and privacy in cellular networks
- Security and privacy in cloud and edge computing
- Internet Security: Protocols, standards, measurements
- Security and privacy in crowdsourcing
- Security and privacy in cyber-physical systems
- Security and privacy in emerging wireless technologies and applications (dynamic spectrum sharing,
cognitive radio networks, millimeter wave communications, MIMO systems,
smart/connected vehicles, UAS, etc.)
- Security and privacy in peer-to-peer and overlay networks
- Security and privacy in WiFi, ad hoc, mesh, sensor, vehicular, body-area, disruption/delay
tolerant, and social networks
- Security and privacy in smart cities, smart and connected health, IoT, and RFID systems
- Security for critical infrastructures (smart grids, transportation systems, etc.)
- Security for future Internet architectures and designs
- Security for software-defined and data center networks
- Security in machine learning
- Social, economic, and policy issues of trust, security, and privacy
- Traffic analysis
- Usable security and privacy
- Web, e-commerce, m-commerce, and e-mail security
For more information, please see
https://cns2020.ieee-cns.org/.
DBSec 2020
34th Annual IFIP WG 11.3 Conference on Data and Applications
Security and Privacy,
Regensburg, Germany, June 25-27, 2020.
[posted here 12/9/19]
DBSec is an annual international conference covering research in data
and applications security and privacy. The conference seeks
submissions from academia, industry, and government presenting novel
research on all theoretical and practical aspects of data protection,
privacy, and applications security. Topics of interest include,
but are not limited to:
- access control
- anonymity
- applied cryptography in data security
- authentication
- big data security
- data and system integrity
- data protection
- database security
- digital rights management
- distributed and decentralized security
- identity management
- intrusion detection
- knowledge discovery and privacy
- methodologies for data and application security
- network security
- organisational and social aspects of security
- privacy
- secure cloud computing
- secure distributed systems
- secure information integration
- security and privacy in crowdsourcing
- security and privacy in IT outsourcing
- security and privacy in the Internet of Things
- security and privacy in location-based services
- security and privacy in P2P scenarios and social networks
- security and privacy in pervasive/ubiquitous computing
- security and privacy policies
- security management and audit
- security metrics
- threats, vulnerabilities, and risk management
- trust and reputation systems
- trust management
- web security
- wireless and mobile security
For more information, please see
https://dbsec2020.ur.de.
DASC 2020
18th IEEE International Conference on Dependable, Autonomic and Secure Computing,
Calgary, Canada, June 22-26, 2020.
[posted here 10/21/19]
IEEE DASC 2020 aims to bring together computer scientists, industrial
engineers, and researchers to discuss and exchange experimental and
theoretical results, novel designs, work-in-progress, experience, case studies,
and trend-setting ideas in the areas of dependability, security, trust and/or
autonomic computing systems. Topics of particular interests include the
following tracks, but are not limited to:
Track 1. Dependable and Fault-tolerant Computing
Track 2. Network and System Security and Privacy
Track 3. Autonomic Computing and Autonomous Systems
Track 4. Industrial Applications and Emerging Techniques
For more information, please see
http://cyber-science.org/2020/dasc/.
SecMT 2020
International Workshop on Security in Mobile Technologies,
Held in conjunction with ACNS2020,
Rome, Italy, June 22-25, 2020.
[posted here 1/13/20]
Despite being small computing devices, smartphones offer a wide
range of functionalities and services to their users, which are currently
encountered to be more than one third of the world population. This range of
features introduces new security and privacy threats, which expose users to
serious damages. Even though research in mobile security has been active over the
past 10 years, as long as the mobile technology is used, new challenges will
always come up. The purpose of this workshop is to bring researchers, hardware
and software developers, as well as practitioners and policy makers, to explore
the latest advances in the security and privacy for mobile devices.
For more information, please see
https://spritz.math.unipd.it/events/2020/ACNS_Workshop/index.html.
CLOUD S&P 2020
2nd Workshop on Cloud Security and Privacy,
Held in conjunction with ACNS2020,
Rome, Italy, June 22-25, 2020.
[posted here 1/13/20]
Cloud computing is emerging as a promising IT solution for enabling
ubiquitous, convenient, and on-demand accesses to a shared pool of configurable
computing resources. However, the widespread adoption of cloud is still being hindered
by various serious security and privacy concerns. CLOUD S&P aims to provide a
platform for researchers and practitioners to present and discuss a wide-range of
security and privacy issues and their solutions to ensure better protection in a
cloud ecosystem. This workshop invites submissions on new attacks and solutions on
various cloud-centric technologies, as well as short surveys and case studies that
shed light on the security implications of clouds.
For more information, please see
https://www.albany.edu/cloudsp2020/.
EuroSP 2020
5th IEEE European Symposium on Security and Privacy,
Genova, Italy, June 16-18, 2020.
[posted here 09/23/19]
The IEEE European Symposium on Security and Privacy (Euro S&P) is the
European sister conference of the established IEEE S&P symposium. It is a premier
forum for computer security research, presenting the latest developments and bringing
together researchers and practitioners. We solicit previously unpublished papers offering
novel research contributions in security or privacy. The emphasis is on building or
attacking real systems, even better if actually deployed, rather than presenting purely
theoretical results. Papers may present advances in the design, implementation, analysis,
verification, or empirical evaluation and measurement of secure systems. Papers that
shed new light on past results by means of sound theory or through experimentation
are also welcome. Topics of interest include:
- Access control
- Accountability
- AI-based security- or privacy-enhancing tools
- Anonymity
- Application security
- Attacks and defenses
- Authentication
- Blockchain
- Censorship and censorship-resistance
- Cloud security
- Cryptography with applied relevance to security and privacy
- Distributed systems security
- Embedded systems security
- Forensics
- Formal methods for security
- Hardware security
- Human aspects of security and privacy
- Intrusion detection
- IoT security and privacy
- Language-based security
- Malware
- Measurement relevant to security and privacy
- Metrics
- Mobile security and privacy
- Network security
- Privacy-enhancing technologies
- Protocol security
- Secure information flow
- Security and privacy policies
- Security architectures
- Security of AI
- Security usability
- System security
- Web security and privacy
For more information, please see
https://www.ieee-security.org/TC/EuroSP2020/.
WTMC 2020
5th International Workshop on Traffic Measurements for Cybersecurity,
Held in conjunction with the IEEE Euro S&P 2020,
Genova, Italy, June 15, 2020.
[posted here 12/23/19]
Current communication networks are increasingly becoming pervasive,
complex, and ever-evolving due to factors like enormous growth in the
number of network users, continuous appearance of network applications,
increasing amount of data transferred, and diversity of user behaviors.
Understanding and measuring traffic in such networks is a difficult yet
vital task for network management but recently also for cybersecurity
purposes. Network traffic measuring and monitoring can, for example,
enable the analysis of the spreading of malicious software and its
capabilities or can help to understand the nature of various network
threats including those that exploit users' behavior and other user's
sensitive information. On the other hand network traffic investigation
can also help to assess the effectiveness of the existing
countermeasures or contribute to building new, better ones. Recently,
traffic measurements have been utilized in the area of economics of
cybersecurity e.g. to assess ISP "badness" or to estimate the revenue of cyber criminals.
The aim of this workshop is to bring together the research
accomplishments provided by the researchers from academia and industry.
The other goal is to show the latest research results in the field of
cybersecurity and understand how traffic measurements can influence it.
We encourage prospective authors to submit related distinguished
research papers on the subject of both: theoretical approaches and
practical case reviews. This workshop presents some of the most relevant
ongoing research in cybersecurity seen from the traffic measurements
perspective.
The workshop will be accessible to both non-experts interested in
learning about this area and experts interesting in hearing about new
research and approaches.
For more information, please see
http://wtmc.info/.
SACMAT 2020
25th ACM Symposium on Access Control Models and Technologies,
Barcelona, Spain, June 10-12, 2020.
[posted here 09/23/19]
The organizing committee of the 25th ACM Symposium on Access Control Models and
Technologies (SACMAT 2020) invites contributions on all aspects of access control.
The symposium will provide participants the opportunity to present work at
different levels of development, from early work on promising ideas to fully
developed technical results as well as system demonstrations. The symposium will
feature a Best Paper Award. The program will include keynote talks, research paper
presentations, demos, a panel, and a poster session. Papers offering novel research
contributions are solicited for submission. Accepted papers will be presented at
the symposium and published by the ACM in the symposium proceedings. In addition
to the regular research track, this year SACMAT will again host a special track:
Blue Sky/Vision Track. Researchers are invited to submit papers describing promising
new ideas and challenges of interest to the community as well as access control
needs emerging from other fields. We are particularly looking for potentially
disruptive and new ideas which can shape the research agenda for the next 10 years.
We encourage submissions that present ideas that may have not been completely
developed and experimentally evaluated.
For more information, please see
http://www.sacmat.org/.
SBC 2020
8th International Workshop on Security in Blockchain and Cloud Computing,
Taipei, Taiwan, June 1-5, 2020.
[posted here 1/6/20]
Cloud computing has emerged as today's most exciting computing
paradigm shift in information technology. With the efficient sharing of abundant
computing resources in the cloud, users can economically enjoy the on-demand
high quality cloud applications and services without committing large capital
outlays locally. While the cloud benefits are compelling, its unique attributes
also raise many security and privacy challenges in areas such as data security,
recovery, privacy, access control, trusted computing, as well as legal issues
in areas such as regulatory compliance, auditing, and many others. To
implement secure and privacy-aware environments which can provide on-demand
computing and high-quality service for cloud users is extremely urgent.
Blockchain is another paradigm shift and drew a lot of recent attention
from both academia and industry. Moreover, blockchain and cloud have many interplays.
This workshop is intended to bring together researchers,
developers, and practitioners in security, privacy and mobile computing communities.
We will encourage submissions on all theoretical and practical aspects,
as well as experimental studies of deployed systems.
For more information, please see
https://conference.cs.cityu.edu.hk/asiaccsscc/.
CPSS 2020
6th ACM Cyber-Physical System Security Workshop,
Held in conjunction with ACM AsiaCCS 2020,
Taipei, Taiwan, June 1, 2020.
[posted here 11/18/19]
Cyber-Physical Systems (CPS) of interest to this workshop consist of large-scale
interconnected systems of heterogeneous components interacting with their physical
environments. There exist a multitude of CPS devices and applications deployed
to serve critical functions in our lives thus making security an important
non-functional attribute of such systems. This workshop will provide a platform
for professionals from academia, government, and industry to discuss novel ways
to address the ever-present security challenges facing CPS. We seek submissions
describing theoretical and practical solutions to security challenges in CPS.
Submissions pertinent to the security of embedded systems, IoT, SCADA,
smart grid, and other critical infrastructure are welcome.
For more information, please see
https://www.nics.uma.es/pub/CPSS2020/.
SADFE 2020
13th International Conference on Systematic Approaches to Digital Forensic Engineering,
New York, NY, USA, May 14-15, 2020.
[posted here 11/25/19]
The 13th International Conference on Systematic Approaches to Digital Forensic Engineering
(SADFE) is calling for paper, panel, poster, and tutorial submissions in the broad field
of Digital Forensics from both practitioner and researcher’s perspectives. With the
dynamic change and rapid expansion of the types of electronic devices, networked applications,
and investigation challenges, systematic approaches for automating the process of gathering,
analyzing and presenting digital evidence are in unprecedented demands. The SADFE
conference aims at promoting solutions for related problems.
Past speakers and attendees of SADFE have included computer scientists, social scientists,
forensic practitioners, lawyers and judges. The synthesis of hard technology and science
with social science and practice forms the foundation of this conference. Papers
focusing on any of the system, legal, or practical aspects of digital forensics
are solicited.
For more information, please see
http://www.sadfe.org/conference.html.
HOST 2020
13th IEEE International Symposium on Hardware Oriented Security and Trust,
San Jose, CA, USA, May 4-7, 2020.
[posted here 06/10/19]
IEEE International Symposium on Hardware Oriented Security and Trust (HOST) aims
to facilitate the rapid growth of hardware-based security research and development, and to
highlight new results in the area of hardware security. HOST 2020 invites original
contributions in all areas of overlap between hardware and security. This includes but
is not limited to the following:
HARDWARE
- Security primitives
- Computer-aided design (CAD) tools
- Emerging and nanoscale devices
- Trojans and backdoors
- Side-channel attacks and mitigation
- Fault injection and mitigation
- (Anti-)Reverse engineering and physical attacks
- Anti-tamper
- Anti-counterfeit
ARCHITECTURE
- Trusted execution environments
- Cache-side channel attacks and mitigation
- Privacy-preserving computation
- System-on-chip (SoC)/platform security
- FPGA and reconfigurable fabric security
- Cloud computing
- Smart phones and smart devices
SYSTEM
- Internet-of-things (IoT) security
- Sensors and sensor network security
- Smart grid security
- Automotive/autonomous vehicle security
- Cyber-physical system security
- (Adversarial) Machine learning and cyber deception
For more information, please see
http://www.hostsymposium.org/.
ICCWS 2020
13th European Workshop on Systems Security,
Co-located with the 15th European Conference on Computer Systems,
Heraklion, Crete, Greece, April 27, 2020.
[posted here 1/27/20]
The 13th European Workshop on Systems Security (EuroSec) aims to bring
together researchers, practitioners, system administrators, system
programmers, and others interested in the latest advances in the
security of computer systems and networks. The objective of the workshop
is to discuss novel, practical, systems-oriented work. The workshop will precede the EuroSys 2020 conference.
EuroSec encourages systems security researchers to share early
iterations of bleeding-edge ideas with the community, before they are
further developed into full papers. Reciprocally, authors receive
feedback to help steer and improve their research to its full potential.
Many EuroSec papers later form the basis for full conference papers
presented at one of the top venues in computer security.
EuroSec seeks contributions on all aspects of systems security.
Topics of interest include (but are not limited to):
- New attacks, evasion techniques, and defenses
- Operating system security
- Mobile systems security
- Malicious code analysis and detection
- Web security
- Network security
- Reverse engineering and binary analysis
- Hardware security
- Virtual machines and hypervisors
- Trusted computing and its applications
- Systems security aspects of privacy
- Identity management and anonymity
- Systems-based forensics
- Vulnerability discovery, analysis, and exploitation
- Embedded system security
- Cybercrime ecosystem and economics
- Security of critical infrastructures
For more information, please see
https://www.concordia-h2020.eu/eurosec-2020/.
EdgeBlock 2020
IEEE International Symposium on Edge Computing Security and Blockchain,
Co-located with IEEE INFOCOM 2020,
Beijing, China, April 27, 2020.
[posted here 11/11/19]
EdgeBlock 2020 is an international forum for researchers to present their latest researches
and perspectives on the intersection of blockchain and edge computing (including Internet
of Things ñ IoT). This is an interdisciplinary area that is of increasingly importance.
For example, in our new networked society where there are a broad range of IoT devices and
cyber physical systems around us, and data from these devices and systems generated at the
edge of the network are been sent to some edge devices or the cloud servers for processing
and storage.
The utility of blockchain in a number of applications, including to secure data-in-transit
and data-at-rest in IoT and cyber physical systems, has also been explored in the research
community. This is not surprising due to the inherent features of blockchain, such as
decentralization and immutability.
Therefore, in this workshop we are interested in determining how can we leverage blockchain
characteristics to establish trusted environments for IoT, social networking, cyber
security and other commercial applications.
For more information, please see
https://infocom2020.ieee-infocom.org/symposium-edge-computing-security-and-blockchain.
ICCWS 2020
IEEE International Conference on Cyber Warfare and Security,
Islamabad, Pakistan, March 31 - April 2, 2020.
[posted here 1/13/20]
Cyber Security is a rapidly growing global challenge with new
sophisticated zero-day attacks costing economies billion of dollars annually.
Cyber attacks may particularly affect the developed world, but developing
countries are also at higher risk due to the lack of expertise and shortage
of security professionals with adequate skills and experience to effectively
combat the rising threats. Keeping this perspective, National Centre for
Cyber Security (NCCS) Pakistan is organizing its first annual conference
titled: ÒIEEE International Conference on Cyber Warfare and Security (ICCWS-2020)Ó.
ICCWS-2020 aims to provide a platform to researchers around the World to
share contemporary research and experiences related to emerging areas of
cyber security. The conference will include high-quality and focused
technical program on cyber security with keynotes and invited talks
from prominent industry and academia experts. It will also feature an
attractive Lab-to-Market event to showcase research, industrial exhibitions
and cyber security ideas competition aimed at industry practitioners,
vendors, ambitious students, and local start-up companies.
For more information, please see
http://nccs.pk/activities/conference.
NDSS 2020
Network and Distributed System Security Symposium,
San Diego, CA, USA, February 23-26, 2020.
[posted here 06/ 3/19]
The Network and Distributed System Security Symposium (NDSS) is a top venue
that fosters information exchange among researchers and practitioners of computer,
network and distributed system security. The target audience includes those
interested in practical aspects of network and distributed system security,
with a focus on actual system design and implementation. A major goal is to
encourage and enable the Internet community to apply, deploy, and advance the
state of practical security technologies.
Technical papers and panel proposals are solicited. Authors are encouraged
to write the abstract and introduction of their paper in a way that makes
the results accessible and compelling to a general computer-security researcher.
All submissions will be reviewed by the Program Committee and accepted submissions
will be published by the Internet Society in the Proceedings of NDSS 2020. The
Proceedings will be made freely accessible from the Internet Society webpages.
Furthermore, permission to freely reproduce all or parts of papers for
noncommercial purposes is granted provided that copies bear the Internet
Society notice included in the first page of the paper. The authors are
therefore free to post the camera-ready versions of their papers on their
personal pages and within their institutional repositories. Reproduction for
commercial purposes is strictly prohibited and requires prior consent.
Paper Submission Information: New Submission Model: NDSS will have two review cycles
in 2020: the first (Summer) with a submission deadline of June 14, 2019, and the
second (Fall) with a submission deadline of September 13, 2019. All submissions
must be received by 11:59 PM AoE (UTC-12) on the day of the corresponding deadline.
For more information, please see
https://www.ndss-symposium.org/ndss2020/call-for-papers/.
IFIP11.9-DF 2020
16th Annual IFIP WG 11.9 International Conference on Digital Forensics,
New Delhi, India, January 6-8, 2020.
[posted here 06/03/19]
The IFIP Working Group 11.9 on Digital Forensics (www.ifip119.org) is an active
international community of scientists, engineers and practitioners dedicated to
advancing the state of the art of research and practice in digital forensics.
The Sixteenth Annual IFIP WG 11.9 International Conference on Digital Forensics
will provide a forum for presenting original, unpublished research results and
innovative ideas related to the extraction, analysis and preservation of all forms
of electronic evidence. Papers and panel proposals are solicited. All submissions
will be refereed by a program committee comprising members of the Working Group.
Papers and panel submissions will be selected based on their technical merit
and relevance to IFIP WG 11.9. The conference will be limited to approximately
100 participants to facilitate interactions between researchers and intense
discussions of critical research issues. Keynote presentations, revised papers
and details of panel discussions will be published as an edited volume – the
sixteenth volume in the well-known Research Advances in Digital Forensics book
series (Springer, Cham, Switzerland) during the summer of 2020.
Technical papers are solicited in all areas related to the theory and practice
of digital forensics. Areas of special interest include, but are not limited to:
- Theories, techniques and tools for extracting, analyzing and preserving digital evidence
- Enterprise and cloud forensics
- Embedded device forensics
- Internet of Things forensics
- Digital forensic processes and workflow models
- Digital forensic case studies
- Legal, ethical and policy issues related to digital forensics
For more information, please see
http://www.ifip119.org/.
|