| |||||||||||||||
EDCN 2017 : ESORICS Doctoral Consortium 2017 – COINS Nordic Ph.D. Workshop | |||||||||||||||
Link: https://coinsrs.no/esorics-doctoral-consortium-2017/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
ESORICS Doctoral Consortium 2017 – COINS Nordic Ph.D. Workshop
Security of emerging network technologies and critical infrastructures The doctoral consortium will be held in Oslo, Norway, in conjunction with the European Symposium on Research in Computer Security (ESORICS) in September 2017, and is sponsored by the Norwegian COINS Research School of Computer and Information Security. The Doctoral consortium intends to bring together early stage researchers within the field of information security, providing them the opportunity to communicate and explore their research fields under the guidance of distinguished researchers. The doctoral consortium seeks to: Provide experience to an extended group of Ph.D. candidates on the processes involved in the organization of academic conferences. Including: quality assurance metrics and incentives in academic research, use of conference management systems, and formal paper review and evaluation criteria. Provide a setting where Ph.D. candidates can formally communicate their research results and receive feedback, both from early stage and experienced researchers. Promote the exchange of experiences and the development of collaborations within the field of information security. To facilitate this objective, the program will include both oral presentations (for selected accepted papers) and a poster session with open discussion (available for all participants) Provide academic stimuli by accommodating keynote speeches, both on leading research topics and scientific processes. Call for papers The Doctoral consortium invites submissions that present novel research contributions and results related to the security of emerging network technologies and critical infrastructures. The topics of interest include (but are not limited) to: Access control Applied cryptography Authentication Biometrics Critical infrastructure resilience Cyber security Data integrity Defense in depth Digital forensics Distributed systems security Hardware Security Information security management Intrusion detection and visualization Malware Network security Privacy and Anonymity Real time monitoring and supervision Risk analysis and management Secure Firmware Security architectures Security models and metrics Security policies Secure communication protocols Threat modeling Trust management Vulnerability assessment and metrics Wireless security Submitted papers must be original, unpublished, and not currently submitted to another conference or journal for consideration. Accepted papers will be presented at the doctoral consortium and included in the post-proceedings, that it is planned to be published by Springer in the Lecture Notes in Computer Science (LNCS) series. The workshop aims to ensure high academic quality by restricting acceptance to 30-35% of submissions; based on discussions during the workshop, authors will be encouraged to incorporate additional findings and discussions in final revisions submitted for post-proceedings, subjected to a final review process by an editorial sub-committee of the programme committee. All papers must be written in English. The main author of the submitted paper must be a Ph.D. candidate, or former Ph.D. candidate graduating during 2017. Submissions should be at most 18 pages long in total including references and appendices. (Program Committee members are not required to read the appendices, so the paper should be intelligible without them.) Submission of short papers (minimum of five pages), with recent results, work in progress, and new ideas, is also encouraged. Submissions should not be anonymized. Authors must follow the Springer formatting instructions for the LNCS series. The organizing committee will seek to maximize the number of total reviews for each submitted paper, including additional reviews by early-stage researchers. At least one author of each accepted paper must register for the workshop and present the paper. The format of the presentation (oral/poster) will be announced after the notification of acceptance. A best paper award will be presented to contributors that submitted the best paper appearing in the workshop proceedings, in accordance with the results of the review process. |
|