SIN: Security of Information and Networks

FacebookTwitterLinkedInGoogle

 

Past:   Proceedings on DBLP

Future:  Post a CFP for 2022 or later   |   Invite the Organizers Email

 
 

All CFPs on WikiCFP

Event When Where Deadline
SIN 2021 Security of Information and Networks
Nov 10, 2021 - Nov 12, 2021 Edinburgh, Scotland Sep 2, 2021
SIN 2019 12th International Conference on Security of Information and Networks
Sep 12, 2019 - Sep 15, 2019 Sochi, Russia Jul 20, 2019
SIN 2018 11th International Conference on Security of Information and Networks
Sep 10, 2018 - Sep 12, 2018 Cardiff May 21, 2018
SIN 2017 10th International Conference on Security of Information and Networks
Oct 13, 2017 - Oct 15, 2017 Jaipur, India Jul 17, 2017
SIN 2015 8th International Conference on Security of Information and Networks
Sep 8, 2015 - Sep 10, 2015 Sochi, Russia May 11, 2015
SIN 2014 7th International Conference on the Security of Information and Networks
Sep 9, 2014 - Sep 11, 2014 Glasgow UK Jun 2, 2014
SIN 2013 The 6th International Conference on Security of Information and Networks (SIN 2013)
Nov 26, 2013 - Nov 28, 2013 Aksaray, Turkey Jul 31, 2013
SIN 2011 4th International Conference on Security of Information and Networks
Nov 14, 2011 - Nov 19, 2011 Sydney, Australia Aug 10, 2011
SIN 2010 3rd International Conference on Security of Information and Networks
Sep 7, 2010 - Sep 11, 2010 Taganrog, Rostov-on-Don, Russia May 11, 2010
SIN 2009 2nd ACM International Conference on Security of Information and Networks
Oct 6, 2009 - Oct 10, 2009 Gazimagusa, TRNC, North Cyprus May 20, 2009
 
 

Present CFP : 2021

Papers, special sessions, tutorials, and workshops addressing all aspects of security in information and networks are being sought. Researchers and industrial practitioners working on the following and related subjects are especially encouraged. Doctoral students are encouraged to propose papers on ongoing research.

Broad areas of interest in security theory, technology and applications will include, but are not limited to, the following:

Secure information systems
=========================
Security, privacy, and trust of blockchain and distributed ledger technologies
Consensus mechanisms, especially distributed control and processing applications
Secure smart contracts

Security in networks
=====================
Network security and protocols
Computer network defense
Next-generation network architectures
Autonomous and adaptive security

Development and realization of fundamental technologies
=======================================================
Cryptographic techniques and key management
Post Quantum Cryptography
Security schemes
New algorithms
IoT Security and Trust
Malware analysis
Access control and intrusion detection
Computational intelligence techniques in security
Trust and privacy

Application Areas
==================
detection and prevention of cybercrimes such as fraud and phishing
Industrial applications of security
Industrial experiences and challenges of security systems
Security of cyber-physical systems
Security tools and development platforms
Security-aware software engineering
Security challenges in Mobile/Embedded Systems
Cloud security
Security Awareness and Education

Security Assurance
===================
Critical analysis of existing approaches
Interoperability, service levels and quality issues in security systems
Information assurance, security, and public policy
Security ontology, models, protocols & policies
Standards, guidelines and certification
Information assurance

Types of submissions
======================

Original papers will be considered; submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any other conference or workshop that has proceedings. All submitted papers will be reviewed by at least three members of the program committee judging its originality, significance, correctness, presentation and relevance.

Authors are also encouraged to propose position papers on practical studies and experiments, critique of existing work, emerging issues, and novel ideas under development.

Enterprises and research centers developing, implementing, or using security tools and frameworks are encouraged to propose application / tool demo.

Proposals of half-day tutorials on fundamental to advanced subjects covering practical implementation aspects of security are welcome. Proposals of special session(s) to be held in the main conference are welcome

Proposals of workshops to be held in conjunction with the conference are welcome. The theme of a workshop proposal should be closely related to a specific area of the conference topics.
 

Related Resources

Ei/Scopus-CACEE 2024   2024 2nd International Conference on Automation, Control and Electronics Engineering (CACEE 2024) -Ei Compendex
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CSP--EI 2025   2025 9th International Conference on Cryptography, Security and Privacy (CSP 2025)
CSP 2025   2025 9th International Conference on Cryptography, Security and Privacy (CSP 2025)
ACM AICCC 2024   ACM--2024 7th Artificial Intelligence and Cloud Computing Conference (AICCC 2024)
ICICT 2025   IEEE--2025 The 8th International Conference on Information and Computer Technologies (ICICT 2025)
Ei/Scopus-AIMLR 2024   2024 2nd Asia Conference on Artificial Intelligence, Machine Learning and Robotics (AIMLR 2024)
ICBDA 2025   IEEE--2025 the 10th International Conference on Big Data Analytics (ICBDA 2025)
ICGDA--EI 2025   2025 8th International Conference on Geoinformatics and Data Analysis (ICGDA 2025)