***********************************************************************************
We apologize if you receive multiple copies of this CFP
***********************************************************************************
C A L L F O R
P A P E R S
SecureComm 2024
20th EAI International Conference on Security and Privacy in Communication
Networks
October 28-30,
2024
Dubai, United Arab
Emirates
***********************************************************************************
Website:
https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecurecomm.eai-conferences.org%2F2024%2F&data=05%7C02%7C%7Ce131c67ba1bc42b35bf208dc825af0ce%7Ccc7df24760ce4a0f9d75704cf60efc64%7C0%7C0%7C638528577657464909%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=%2F3mHhIDvhKfguVQ4QtInM70DNKVxQW2k4iob6hFmbdY%3D&reserved=0
Submission link:
https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fconfyplus.eai.eu%2F&data=05%7C02%7C%7Ce131c67ba1bc42b35bf208dc825af0ce%7Ccc7df24760ce4a0f9d75704cf60efc64%7C0%7C0%7C638528577657464909%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=2eQ%2BjO2kyXkKMc2KjnD2gxOWmxBnhGCLl7yvSre1WnQ%3D&reserved=0
***** Important Dates (Late Track)
• Paper Submission Deadline: July 1, 2024
• Notification to Authors: August 15, 2024
• Camera-ready Papers Due: September 20, 2024
• Conference Dates: October 28-30, 2024
***** About SecureComm 2024
SecureComm is a conference in EAI core conference portfolio focusing on
cybersecurity. The aim of SecureComm is to bring together researchers and
practitioners in academic, industry, and government in security, networking,
communication, and other related communities to explore important research
directions in the field.
The 20th SecureComm conference seeks submissions of high-quality research
contributions. Topics of interest encompass all areas of secure communications
and networking. Topics in less related areas will be considered if a clear
connection to secure communication and networking is demonstrated. Topics
addressing interdisciplinary challenges in different application domains are
welcome.
***** Topics of Interest
• Security and privacy in computer networks (e.g., wired, wireless, mobile,
hybrid, sensor, vehicular, satellite, 5G, 6G, ad hoc, peer-to-peer, and
software-defined networks)
• Security and privacy in systems with strong secure communication and
networking element (e.g., security in the cloud, IoT, cyber-physical systems,
edge and fog computing, and teleconferencing)
• Security and privacy in Web3.0 and metaverse
• Distributed ledger technologies (e.g., blockchain, smart contracts, and
cryptocurrencies) and decentralized applications (e.g., DeFi)
• Security protocols at all network layers and for different applications
(e.g., for secure routing, naming/addressing, network management, remote
authentication, and attestation)
• Physical layer security (e.g., jamming, GPS spoofing)
• Network attacks (e.g., DDoS, MitM, malware, botnets, side-channel attacks,
phishing/pharming, cybersquatting), defenses (e.g., network intrusion detection
and prevention, firewalls, packet filters, moving target defence) and forensics
• Applications of cryptography (e.g., Analysis of deployed cryptography and
cryptographic protocols, Cryptographic implementation analysis, New
cryptographic protocols with real-world applications)
• Security analysis (e.g., Malware analysis, Automated security analysis of
source code and binaries, Program analysis)
• Data-driven security and measurement studies (e.g., Measurements of fraud,
malware or spam; Measurements of human behavior and security)
• Cybercrime investigation and attribution
• Cyber threat intelligence and cyber incident responses
• Anonymous and privacy-aware communications (e.g., Tor, darknet)
• Internet censorship and circumvention
• Secure communication and networking applications (e.g., industry 4.0, energy,
transportation, smart cities)
• Quantum key distribution and other quantum-based secure communications
• Visualization of secure communications and networking
• Privacy-preserving computing in secure communication and networking (e.g.,
privacy-preserving machine learning)
• The resilience of computer networks and critical infrastructures
• Web and mobile security and privacy
• Defending false information online (e.g., mis-, dis- and mal-information)
• Socio-technical aspects of secure communications and networking (e.g.,
usability, human behaviors, legal issues, cybercrime, economics)
***** Paper Submission
Papers should be submitted through EAI
‘Confy+<https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fconfyplus.eai.eu%2F&data=05%7C02%7C%7Ce131c67ba1bc42b35bf208dc825af0ce%7Ccc7df24760ce4a0f9d75704cf60efc64%7C0%7C0%7C638528577657464909%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=2eQ%2BjO2kyXkKMc2KjnD2gxOWmxBnhGCLl7yvSre1WnQ%3D&reserved=0>‘
system and have to comply with the Springer format.
– Full/ Regular papers should be up 12-20 pages content in length. (excluding
appendices, references, appreciation,…)
– Short papers should be 6-11 pages content in length. (excluding appendices,
references, appreciation,…)
Instructions and templates are available from Springer’s LNICST
homepage<https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.springer.com%2Fgp%2Fcomputer-science%2Flncs%2Fconference-proceedings-guidelines&data=05%7C02%7C%7Ce131c67ba1bc42b35bf208dc825af0ce%7Ccc7df24760ce4a0f9d75704cf60efc64%7C0%7C0%7C638528577657464909%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=nlSoLoToBbnHVYKQAeS7yGfpAAPs53egAsGF1frklGg%3D&reserved=0>:
– LaTeX2e Proceedings Templates
(zip)<https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fhelp.eai-conferences.org%2Fwp-content%2Fuploads%2Fsites%2F88%2F2021%2F04%2FSpringer_Latex_Template.zip&data=05%7C02%7C%7Ce131c67ba1bc42b35bf208dc825af0ce%7Ccc7df24760ce4a0f9d75704cf60efc64%7C0%7C0%7C638528577657464909%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=GOnbxHoZI5ZB%2BPyRyjQ7ZMoXPdOKnujGCzwR%2F5ODtHE%3D&reserved=0>
– Microsoft Word Proceedings Templates
(zip)<https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fhelp.eai-conferences.org%2Fwp-content%2Fuploads%2Fsites%2F88%2F2021%2F04%2FSpringer_DOCX_Template.zip&data=05%7C02%7C%7Ce131c67ba1bc42b35bf208dc825af0ce%7Ccc7df24760ce4a0f9d75704cf60efc64%7C0%7C0%7C638528577657464909%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=sQGYkHwG5YcaoFzp6wWcgJFg%2Bc8PtXPEwzn4x5KkfmU%3D&reserved=0>
Please make sure that your paper adheres to the format as specified in the
instructions and templates.
All conference papers undergo a thorough peer review process prior to the final
decision and publication. This process is facilitated by experts in the
Technical Program Committee during a dedicated conference period. Standard peer
review is enhanced by EAI Community Review which allows EAI members to bid to
review specific papers. All review assignments are ultimately decided by the
responsible Technical Program Committee Members while the Technical Program
Committee Chair is responsible for the final acceptance selection.
***** Committee
General Chairs
• Ernesto Damiani, Khalifa University, Abu Dhabi, UAE
• Robert H. Deng, Management University, Singapore
Program Chairs
• Kim-Kwang Raymond Choo, University of Texas at San Antonio, USA
• Saed Alrabaee, United Arab Emirates University, UAE
_______________________________________________
Om-announce mailing list
[email protected]
https://mailman.openmath.org/cgi-bin/mailman/listinfo/om-announce