| |||||||||||||||
CNS 2014 : CALL FOR POSTERS, IEEE Conference on Communications and Network Security | |||||||||||||||
Link: http://cns2014.ieee-cns.org/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
CALL FOR POSTERS
Second IEEE Conference on Communications and Network Security (CNS’14) San Francisco, CA, USA October 29~31, 2014, http://www.ieee-cns.org SCOPE IEEE CNS is a new conference series in IEEE Communications Society (ComSoc) core conference portfolio and the only ComSoc conference focusing solely on cyber security. IEEE CNS is a spin-off of IEEE INFOCOM, the premier ComSoc conference on networking. The goal of CNS is to provide an outstanding forum for cyber security researchers, practitioners, policy makers, and users to exchange ideas, techniques and tools, raise awareness, and share experience related to all practical and theoretical aspects of communications and network security. Building on the success of last year’s inaugural conference, IEEE CNS 2014 welcomes Poster submissions to be presented during the conference. A Poster submission should be a 2-page abstract, which summarizes the key merits of proposed ideas, presents initial results, and identifies challenges to develop a complete solution. Abstracts will be evaluated by the Posters Session committee based on the novelty and the potential to stimulate discussions and promote collaborations. Poster abstracts should be submitted via EDAS at http://edas.info/N18325. Please follow the same template for regular conference papers available on http://www.ieee-cns.org . Sample topics of interest include but are not limited to: • Security and privacy issues on wired networks, e.g., the Internet, peer‐to‐peer networks, overlay networks • Security and privacy issues on wireless networks, e.g., WiFi, WiMax, Ah Hoc, Mesh, Sensor, RFID networks • Security and privacy in social networks and cloud computing • Security and privacy in smart grid, cognitive radio networks, and disruption/delay tolerant networks • Information-theoretic security • Anonymization and privacy in communication systems • Traffic analysis, location privacy and obfuscation of mobile device information • Physical layer security methods, e.g., confidentiality and authentication • Secure routing, Secure network management • Mobile security, Android security, and trusted computing on mobile devices • Intrusion detection and prevention • Computer and network forensics • Vulnerability, exploitation tools, Malware, Botnet, DDoS attacks • Key management and PKI in the context of secure communications • Security metrics and performance evaluation, traffic analysis techniques • Web, e-commerce, m-commerce, and e-mail security • Social, economic and policy issues of trust, security and privacy • Ensuring the availability of communications, survivability of networks The conference will arrange the poster session in a room where the posters can be displayed. An accepted poster must be presented by an author in the poster session to interested attendees. The abstract of the accepted posters will appear in the conference proceeding and be submitted to IEEE Xplore. Each accepted poster requires an author to register for the conference at the appropriate rate based on the membership level. Each author registration can cover up to three posters or papers of the conference, but each poster must have a dedicated presenter at the session. A Best Poster Award will be given based on the poster’s novelty and potentials in research. The quality of presentation and the interaction during the session will also be important criteria. The award will be announced in a plenary session of the main conference. |
|