X-Received: by 2002:a05:6000:1d93:b0:1ec:7868:b92d with SMTP id bk19-20020a0560001d9300b001ec7868b92dmr152604wrb.507.1645663081917; Wed, 23 Feb 2022 16:38:01 -0800 (PST) X-Received: by 2002:a0c:b19a:0:b0:432:4542:46d5 with SMTP id v26-20020a0cb19a000000b00432454246d5mr164694qvd.84.1645663081301; Wed, 23 Feb 2022 16:38:01 -0800 (PST) Path: csiph.com!news.mixmin.net!proxad.net!feeder1-2.proxad.net!209.85.128.87.MISMATCH!news-out.google.com!nntp.google.com!postnews.google.com!google-groups.googlegroups.com!not-for-mail Newsgroups: comp.os.linux.security Date: Wed, 23 Feb 2022 16:38:01 -0800 (PST) Injection-Info: google-groups.googlegroups.com; posting-host=156.146.57.67; posting-account=XlanDQoAAABZc50p5dPjAS3LOP-OufWx NNTP-Posting-Host: 156.146.57.67 User-Agent: G2/1.0 MIME-Version: 1.0 Message-ID: <122197ea-9abc-4c7b-93fd-c5324a93a254n@googlegroups.com> Subject: EAI SecureComm 2022: CALL FOR PAPERS From: Wenqiang Li Injection-Date: Thu, 24 Feb 2022 00:38:01 +0000 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Xref: csiph.com comp.os.linux.security:751 [Please accept our apologies if you receive multiple copies] =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D *EAI SecureComm 2022: CALL FOR PAPERS*=20 The 18th EAI International Conference on Security and Privacy in Communicat= ion Networks https://securecomm.eai-conferences.org/2022/call-for-papers/ =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D Scope SecureComm is a conference in EAI core conference portfolio focusing on cyb= ersecurity. The aim of SecureComm is to bring together researchers and prac= titioners in academic, industry, and government in security, networking, co= mmunication and other related communities to explore important research dir= ections in the field. The 18th SecureComm conference seeks submissions of h= igh-quality research contributions. Topics of interest encompass ALL areas = of secure communications and networking. Topics in less related areas will = be considered if a clear connection to secure communication and networking = is demonstrated. Topics addressing interdisciplinary challenges in differen= t application domains are welcome. EAI SecureComm 2022 will be held as an on-site conference and if needed, Ac= cepted Authors who are unable to attend the event in person will be given a= n option to present remotely. --------------------------------------------------------- Topics Topics of interest include, but are not limited to the following: Security and privacy in computer networks (e.g., wired, wireless, mobile, h= ybrid, sensor, vehicular, satellite, 5G, 6G, ad hoc, peer-to-peer, and soft= ware-defined networks) Security and privacy in systems with a strong secure communication and netw= orking element (e.g., security in cloud, IoT, cyber-physical systems, edge = and fog computing, and teleconferencing) Physical layer security (e.g., jamming, GPS spoofing) Web and mobile security and privacy Security protocols at all network layers and for different applications (e.= g., for secure routing, naming/addressing, network management, remote authe= ntication and attestation) Network attacks (e.g., DDoS, MitM, malware, botnets, side-channel attacks, = phishing/pharming, cybersquatting) and defenses (e.g., network intrusion de= tection and prevention, firewalls, packet filters, moving target defence) Network, internet and cloud forensics Cybercrime investigation and attribution Cyber threat intelligence and cyber incident responses Anonymous and privacy-aware communications (e.g., Tor, darknet) Internet censorship and circumvention Secure communication and networking applications (e.g., industry 4.0, energ= y, transportation, smart cities) Quantum key distribution and other quantum-based secure communications Visualization of secure communications and networking Privacy-preserving computing in secure communication and networking (e.g., = privacy-preserving machine learning) Distributed ledger technologies (e.g., blockchain and cryptocurrencies) Resilience of computer networks and critical infrastructures Defending false information online (e.g., mis-, dis- and mal-information) Socio-technical aspects of secure communications and networking (e.g., usab= ility, human behaviours, legal issues, cybercrime, economics) Security and privacy of contact tracing and other COVID-19 related digital = interventions with a core element on telecommunications or networking --------------------------------------------------------- Publication All registered papers will be submitted for publishing by Springer and made= available through SpringerLink Digital Library: SecureComm Conference Proc= eedings. SecureComm proceedings are indexed in leading indexing services, such as We= b of Science, Compendex, Scopus, DBLP, EU Digital Library, Google Scholar, = IO-Port, MathSciNet, Inspec, and Zentralblatt MATH. Authors of selected papers will be invited to submit an extended version to= : Springer Wireless Networks Journal (WINET) [IF: 2.602 (2020)] All accepted authors are eligible to submit an extended version in a fast t= rack of: EAI Endorsed Transactions on Industrial Networks and Intelligent Systems (O= pen Access) =C2=A8C recently accepted for inclusion in Scopus EAI Endorsed Transactions on Security and Safety (Open Access) Additional publication opportunities: EAI/Springer Innovations in Communications and Computing Book Series (titles in this series are indexed in Ei Compendex, Web of Science & Scopus= ) --------------------------------------------------------- Paper submission Papers should be submitted through EAI 'Confy+' system, and have to comply = with the Springer format (see Author's kit section). All conference papers undergo a thorough peer review process prior to the f= inal decision and publication. This process is facilitated by experts in th= e Technical Program Committee during a dedicated conference period. Standar= d peer review is enhanced by EAI Community Review which allows EAI members = to bid to review specific papers. All review assignments are ultimately dec= ided by the responsible Technical Program Committee Members while the Techn= ical Program Committee Chair is responsible for the final acceptance select= ion. You can learn more about Community Review here. --------------------------------------------------------- Important dates Full Paper Submission deadline 3 April 2022 Notification deadline 19 June 2022 Camera-ready deadline 7 August 2022 Start of Conference 17 October 2022 End of Conference 19 October 2022 =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D *EAI SecureComm 2022: CALL FOR WORKSHOP PROPOSALS*=20 The 18th EAI International Conference on Security and Privacy in Communicat= ion Networks https://securecomm.eai-conferences.org/2022/call-workshop-proposals/ =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D The Conference Organizing Committee invites submissions from individuals or= groups to organise Workshops at the SecureComm 2022. Proposals are solicited for one-day or half-day workshops to be held as par= t of the SecureComm 2022 conference (October 17-19, 2022). Workshops bridgi= ng security and communications, or presenting new perspectives in security = areas are particularly welcome. A full list of current topics of interest c= an be found in the SecureComm Call For Papers (https://securecomm.eai-confe= rences.org/2022/call-for-papers/). SecureComm workshops provide a platform for presenting novel ideas in a les= s formal environment than the main conference itself. The submission format= of each workshop will be determined by the workshop organizers. Accepted workshop papers will be published in the SecureComm workshop proce= edings by Springer, together with the main SecureComm proceedings. Thus, th= e timeline to print proceedings are planned according to the SecureComm pro= ceedings schedule. --------------------------------------------------------- Deadline for Workshop Proposals Proposals Due: May 15, 2022 Notification of Workshop Proposal Acceptance: May 30, 2022 The dates for papers due, notification of acceptance, and camera ready will= be determined by the workshop organizers and may change. Individual Workshop Papers Due: June 15, 2022 Notification of Acceptance: July 30, 2022 Camera Ready: August 7, 2022 --------------------------------------------------------- Proposal content * Workshop title * Abstract (less than 200 words) * Name, affiliation, and e-mail address for each organizer along with the s= pecification of the primary contact person(s) * Background and Motivation: What is the overall topic of the workshop? Why= is this topic of particular interest at this time? If the workshop has bee= n organized in the past at SecureComm or other conferences, please give det= ails of previous instances (venue, URL) and describe why it should be held = again and how it will extend and build upon previous ones. * Topics and scope: These should be within or close to the scope covered by= the main conference, as mentioned above. * Format: Give a description of the proposed workshop format, including the= target number of participants, planned activities (such as introductions, = invited talks, breakout group activities, general discussion), as well as h= ow these activities address the workshop objectives. * Soliciting Submissions: Indicate how you plan to attract submissions and/= or participants. Tactics may include circulating a call to relevant mailing= lists (indicate these please as well), publicizing your workshop at other = relevant venues, and more. * Selecting Participants: Indicate how you plan to select participants and = contributions to the workshop. Indicate a program committee to help with th= e organization/review process. * Organizers: Give short descriptions of each of the organizers?background = and interests related to security and privacy in communication networks and= the specific workshop topic. --------------------------------------------------------- Workshop selection We aim to select a diverse set of workshops and avoid having multiple works= hops on overlapping themes. Organizers of the selected workshops will be as= ked to produce a Call for Papers to describe the workshop to potential part= icipants and solicit submissions. In order to promote vivid discussions wit= h more participants to the workshops, EAI will provide Workshop Organizers = with one free registration to the Workshop for each 10 papers submitted to = their workshop. The criteria for assessment will include: - Relevance to conference vision/topics and attendees - Potential to bring in participants to the conference from different audie= nces - Overall quality of contribution - Provides a hands-on, collaborative, and/or active learning environment fo= r attendees --------------------------------------------------------- Workshop publication Accepted and presented papers will be published alongside the main conferen= ce proceedings as a sub-section/chapter. Paper formats should, therefore, c= orrespond to the templates of the publisher of the main conference. Workshop chairs are invited to engage with the journals and further publica= tion opportunities. --------------------------------------------------------- Proposal submission Workshop proposals should be submitted in a maximum of 4 pages in PDF forma= t, single-spaced. Please email your workshop proposals to Workshop chairs: Dr. Lannan Lisa Lu= o and Dr. Fatih Turkmen.