|
|
Commentary and Opinion
NewsBits: Announcements and correspondence from readers (please contribute!)
Listing of academic positions available by
Cynthia Irvine
Posted November 2017
University of Gothenburg
Gothenburg, Sweden
PhD student
Date position announcement closes: December 23, 2017
URL of position description: https://goo.gl/pcdTAa
Conference and Workshop Announcements
Cipher
calls-for-papers
and
calendar
Cipher calendar announcements are on Twitter; follow "ciphernews"
Requests for inclusion in the list should sent per instructions.
new calls or announcements added since Cipher E140
(the calls-for-papers and the calendar announcements may differ
slightly in content or time of update):
PETS 2018 18th Privacy Enhancing Technologies Symposium, Barcelona, Spain, July 24-27, 2018. (Submissions Due 30 November 2017, 28 February 2018)
The annual Privacy Enhancing Technologies Symposium (PETS) brings together privacy experts from around the world to present and discuss recent advances and new perspectives on research in privacy technologies. Papers undergo a journal-style reviewing process and accepted papers are published in Proceedings on Privacy Enhancing Technologies (PoPETs), a scholarly, open access journal. Submitted papers should present novel practical and/or theoretical research into the design, analysis, experimentation, or fielding of privacy-enhancing technologies. While PETS/PoPETs has traditionally been home to research on anonymity systems and privacy-oriented cryptography, we strongly encourage submissions on a number of both well-established and emerging privacy-related topics, for which examples are provided below. PoPETs also solicits submissions for Systematization of Knowledge (SoK) papers. These are papers that critically review, evaluate, and contextualize work in areas for which a body of prior literature exists, and whose contribution lies in systematizing the existing knowledge in that area. Authors are encouraged to view our FAQ about the submission process.
Information & Communications Technology Express, Special Issue on Critical Infrastructure (CI) & Smart Grid Cyber Security, (Submissions Due 1 December 2017)
Guest Editors: Leandros A. Maglaras (De Montfort University, UK),
Ki-Hyung Kim (Ajou University, Korea), Helge Janicke (De Montfort
University, UK), Mohamed Amine Ferrag, Guelma University, Algeria),
Artemios G. Voyiatzis (SBA Research, Austria), Pavlina Fragkou (T.E.I of Athens, Greece),
Athanasios Maglaras (T.E.I. of Thessaly, Greece),
and Tiago J. Cruz (University of Coimbra, Portugal).
Cyber-physical systems are becoming vital to modernizing the national critical
infrastructure (CI) systems. A smart grid is an energy transmission and
distribution network enhanced through digital control, monitoring, and
telecommunications capabilities. It provides a real-time, two-way flow of
energy and information to all stakeholders in the electricity chain, from the
generation plant to the commercial, industrial, and residential end user. Each
smart grid subsystem and its associated assets require specific security
functions and solutions. For example, the solution to secure a substation is
not the same as the solution to secure demand response and home energy management
systems. Usual cyber security technologies and best practices - such as antivirus,
firewalls, intrusion prevention systems, network security design, defense in
depth, and system hardening - are necessary to protect the smart grid. However,
history showed they are only part of the solution. Owing to the rapid increase
of sophisticated cyber threats with exponentially destructive effects advanced
cyber security technologies must be developed. The title of this special issue
of ICT Express is therefore coined concisely as "Special Issue on CI & Smart
Grid Cyber Security". This special issue focuses on innovative methods and
techniques in order to address unique security issues relating to CI and smart
grids. Original submissions reflecting latest research observation and achievement
in the following areas are invited:
SP 2018 39th IEEE Symposium on Security and Privacy, San Francisco, CA, USA, May 21-23, 2018. (Submissions Due first day of each month)
Since 1980 in Oakland, the IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners. We solicit previously unpublished papers offering novel research contributions in any aspect of security or privacy. Papers may present advances in the theory, design, implementation, analysis, verification, or empirical evaluation and measurement of secure systems. Topics of interest include:
ASIACCS 2018 ACM Symposium on Information, Computer and Communications Security, Sungdo, Incheon, Korea, Jun 4-8, 2018. (Submissions Due 6 December 2017)
We invite submissions from academia, government, and industry presenting novel research on all theoretical and practical aspects of computer and network security. Areas of interest for ASIACCS 2018 include, but are not limited to:
IWSPA 2018 4th International Workshop on Security and Privacy Analytics, Co-located with ACM CODASPY 2018, Tempe, AZ, USA, March 21, 2018. (Submissions Due 8 December 2017)
Increasingly, sophisticated techniques from machine learning, data mining, statistics and natural language processing are being applied to challenges in security and privacy fields. However, experts from these areas have no medium where they can meet and exchange ideas so that strong collaborations can emerge, and cross-fertilization of these areas can occur. Moreover, current courses and curricula in security do not sufficiently emphasize background in these areas and students in security and privacy are not emerging with deep knowledge of these topics. Hence, we propose a workshop that will address the research and development efforts in which analytical techniques from machine learning, data mining, natural language processing and statistics are applied to solve security and privacy challenges ("security analytics"). Submissions of papers related to methodology, design, techniques and new directions for security and privacy that make significant use of machine learning, data mining, statistics or natural language processing are welcome. Furthermore, submissions on educational topics and systems in the field of security analytics are also highly encouraged.
CNS 2018 IEEE Conference on Communications and Network Security, Beijing, China, May 30 - June 1, 2018. (Submissions Due 20 December 2017)
IEEE Conference on Communications and Network Security (IEEE CNS) is a conference series in IEEE Communications Society (ComSoc) core conference portfolio and the only ComSoc conference focusing solely on cybersecurity. IEEE CNS provides a premier forum for security researchers, practitioners, policy makers, and users to exchange ideas, techniques and tools, raise awareness, and share experience related to all practical and theoretical aspects of cybersecurity. Building on the success of the past five years' conferences, IEEE CNS 2018 seeks original high-quality technical papers from academia, government, and industry. Topics of interest encompass all practical and theoretical aspects of communications and network security, from the physical layer to the network layer to the variety of applications reliant on a secure communication substrate. Topics of interest include:
DFRWS 2018 18th Annual DFRWS USA 2018 Conference, Providence, Rhode Island, USA, July 15-18, 2018. (Submissions Due 12 January 2018)
We invite contributions in five categories: research papers, presentation proposals, panel proposals, workshop proposals, and demo proposals. Topics of Interest:
BioSTAR 2018 3rd International Workshop on Bio-inspired Security, Trust, Assurance and Resilience, Co-located with 39th IEEE Symposium on Security and Privacy (IEEE S&P 2018), San Francisco, CA, USA, May 24, 2018. (Submissions Due 15 January 2018)
As computing and communication systems continue to expand and offer new services, these advancements require more dynamic, diverse, and interconnected computing infrastructures. Unfortunately, defending and maintaining resilient and trustworthy operation of these complex systems are increasingly difficult challenges. Conventional approaches to Security, Trust, Assurance and Resilience (STAR for short) are often too narrowly focused and cannot easily scale to manage large, coordinated and persistent attacks in these environments. Designs found in nature are increasingly used as a source of inspiration for STAR and related networking and intelligence solutions for complex computing and communication environments. Nature's footprint is present in the world of Information Technology, where there are an astounding number of computational bio-inspired techniques. These well-regarded approaches include genetic algorithms, neural networks, ant algorithms, immune systems just to name a few. For example several networking management and security technologies have successfully adopted some of nature's approaches, such as swarm intelligence, artificial immune systems, sensor networks, moving target defense, diversity-based software design, etc. Nature has also developed an outstanding ability to recognize individuals or foreign objects and adapt/evolve to protect a group or a single organism. Solutions that incorporate these nature-inspired characteristics often have improved performance and/or provided new capabilities beyond more traditional methods. The aim of this workshop is to bring together the research accomplishments provided by the researchers from academia and the industry. The other goal is to show the latest research results in the field of nature-inspired STAR aspects in computing and communications. Topics of interests include, but are not limited to:
SADFE 2018 12th International Workshop on Systematic Approaches to Digital Forensics Engineering, Co-located with 39th IEEE Symposium on Security and Privacy (IEEE S&P 2018), San Francisco, CA, USA, May 24, 2018. (Submissions Due 16 January 2018)
SADFE (Systematic Approaches to Digital Forensic Engineering) promotes systematic approaches to digital forensic investigation on failures of today's cyber systems and networks. SADFE furthers Digital Forensic Engineering (DFE) advancement as a disciplined and holistic scientific practice. The 12th International Conference on Systematic Approaches to Digital Forensic Engineering (SADFE) is calling for paper submissions in the broad field of Digital Forensics from both practitioner and researcher's perspectives. With the dynamic change and rapid expansion of the types of electronic devices, networked applications, and investigation challenges, systematic approaches for automating the process of gathering, analyzing and presenting digital evidence are in unprecedented demands. The SADFE conference aims at promoting solutions for related problems. Past speakers and attendees of SADFE have included computer scientists, social scientists, forensic practitioners, lawyers and judges. The synthesis of hard technology and science with social science and practice forms the foundation of this conference. Papers focusing on any of the system, legal, or practical aspects of digital forensics are solicited. Topics to be Addressed:
HotSoS 2018 5th Annual Hot Topics in the Science of Security Symposium, Raleigh, North Carolina, USA, April 10-11, 2018. (Submissions Due 17 January 2018)
HoTSoS draws together researchers, practitioners, and thought leaders from government, industry, and academia. The conference provides a forum for dialogue centered upon the development and advancement of scientific foundations in cybersecurity. The technical emphasis of HoTSoS is on scientific methods, data gathering and analysis, experimental approaches, mathematical models, and the interactions among those approaches to build a foundational science of security. The HoTSoS vision is one of engaging and growing a community - including researchers and skilled practitioners from diverse disciplines - that is focused around the advancement of scientific methods. We invite submissions on any topic related to science of security that aligns with the conference scope and goals listed above. The 2018 HoTSoS will highlight the following themes:
USENIX Security 2018 27th USENIX Security Symposium, Baltimore, MD, USA, August 15-17, 2018. (Submissions Due 8 February 2018)
The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks. All researchers are encouraged to submit papers covering novel and scientifically significant practical works in computer security. USENIX Security is interested in all aspects of computing systems security and privacy. Papers without a clear application to security or privacy, however, will be considered out of scope and may be rejected without full review.
Staying in touch....
Changing your email address? Please send updates to cipher@ieee-security.org
IEEE Computer Society's Technical Committee on Security and Privacy
TC home page | TC Officers | |
How to join the TCSP (or other TCs) | Open Access Proceedings | |
Cipher past issues archive | ||
IEEE Computer Society | Cipher Privacy Policy |