<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=us-ascii">
<meta name="Generator" content="Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
{font-family:Wingdings;
panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
{font-family:"Lucida Sans Unicode";
panose-1:2 11 6 2 3 5 4 2 2 4;}
@font-face
{font-family:Oswald;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0cm;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-fareast-language:EN-US;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:#0563C1;
text-decoration:underline;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
{mso-style-priority:34;
margin-top:0cm;
margin-right:0cm;
margin-bottom:0cm;
margin-left:36.0pt;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-fareast-language:EN-US;}
.MsoChpDefault
{mso-style-type:export-only;
font-size:10.0pt;}
@page WordSection1
{size:612.0pt 792.0pt;
margin:3.0cm 2.0cm 3.0cm 2.0cm;}
div.WordSection1
{page:WordSection1;}
/* List Definitions */
@list l0
{mso-list-id:472411035;
mso-list-template-ids:-260040564;}
@list l0:level1
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:36.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
@list l0:level2
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:72.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
@list l0:level3
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:108.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
@list l0:level4
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:144.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
@list l0:level5
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:180.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
@list l0:level6
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:216.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
@list l0:level7
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:252.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
@list l0:level8
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:288.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
@list l0:level9
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:324.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
@list l1
{mso-list-id:601450942;
mso-list-type:hybrid;
mso-list-template-ids:-836745710 201326593 201326595 201326597 201326593 201326595 201326597 201326593 201326595 201326597;}
@list l1:level1
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-18.0pt;
font-family:Symbol;}
@list l1:level2
{mso-level-number-format:bullet;
mso-level-text:o;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-18.0pt;
font-family:"Courier New";}
@list l1:level3
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-18.0pt;
font-family:Wingdings;}
@list l1:level4
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-18.0pt;
font-family:Symbol;}
@list l1:level5
{mso-level-number-format:bullet;
mso-level-text:o;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-18.0pt;
font-family:"Courier New";}
@list l1:level6
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-18.0pt;
font-family:Wingdings;}
@list l1:level7
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-18.0pt;
font-family:Symbol;}
@list l1:level8
{mso-level-number-format:bullet;
mso-level-text:o;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-18.0pt;
font-family:"Courier New";}
@list l1:level9
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-18.0pt;
font-family:Wingdings;}
@list l2
{mso-list-id:965965464;
mso-list-template-ids:-64565308;}
@list l2:level1
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:36.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
@list l2:level2
{mso-level-number-format:bullet;
mso-level-text:o;
mso-level-tab-stop:72.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;
mso-ansi-font-size:10.0pt;
font-family:"Courier New";
mso-bidi-font-family:"Times New Roman";}
@list l2:level3
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:108.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l2:level4
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:144.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l2:level5
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:180.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l2:level6
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:216.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l2:level7
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:252.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l2:level8
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:288.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l2:level9
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:324.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l3
{mso-list-id:1853374049;
mso-list-template-ids:-2099859984;}
@list l3:level1
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:36.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
@list l3:level2
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:72.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
@list l3:level3
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:108.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
@list l3:level4
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:144.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
@list l3:level5
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:180.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
@list l3:level6
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:216.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
@list l3:level7
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:252.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
@list l3:level8
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:288.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
@list l3:level9
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:324.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
ol
{margin-bottom:0cm;}
ul
{margin-bottom:0cm;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang="en-DK" link="#0563C1" vlink="#954F72" style="word-wrap:break-word">
<div class="WordSection1">
<p class="MsoNormal" style="margin-bottom:7.5pt;background:#F1F1F2"><span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;color:#404041;mso-fareast-language:#0C00">The
<b>IEEE Conference on Communications and Network Security</b> (CNS) is a premier forum for cyber security researchers, practitioners, policy makers, and users to exchange ideas, techniques and tools, raise awareness, and share experiences related to all practical
and theoretical aspects of communications and network security. The conference seeks submissions from academia, government, and industry, presenting novel research results in communications and network security.<o:p></o:p></span></p>
<p class="MsoNormal" style="margin-bottom:7.5pt;background:#F1F1F2"><span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;color:#404041;mso-fareast-language:#0C00">Particular topics of interest include, but are not limited to:<o:p></o:p></span></p>
<ul type="disc">
<li class="MsoNormal" style="color:#404041;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l2 level1 lfo3;background:#F1F1F2">
<span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;mso-fareast-language:#0C00">Anonymity and privacy technologies<o:p></o:p></span></li><li class="MsoNormal" style="color:#404041;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l2 level1 lfo3;background:#F1F1F2">
<span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;mso-fareast-language:#0C00">Biometric authentication and identity management<o:p></o:p></span></li><li class="MsoNormal" style="color:#404041;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l2 level1 lfo3;background:#F1F1F2">
<span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;mso-fareast-language:#0C00">Security and privacy of blockchain and its applications<o:p></o:p></span></li><li class="MsoNormal" style="color:#404041;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l2 level1 lfo3;background:#F1F1F2">
<span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;mso-fareast-language:#0C00">Censorship countermeasures and privacy<o:p></o:p></span></li><li class="MsoNormal" style="color:#404041;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l2 level1 lfo3;background:#F1F1F2">
<span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;mso-fareast-language:#0C00">Combating cyber-crime (anti-spam, anti-phishing anti-fraud techniques, etc.)<o:p></o:p></span></li><li class="MsoNormal" style="color:#404041;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l2 level1 lfo3;background:#F1F1F2">
<span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;mso-fareast-language:#0C00">Computer and network forensics<o:p></o:p></span></li><li class="MsoNormal" style="color:#404041;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l2 level1 lfo3;background:#F1F1F2">
<span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;mso-fareast-language:#0C00">Cyber deterrence strategies<o:p></o:p></span></li><li class="MsoNormal" style="color:#404041;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l2 level1 lfo3;background:#F1F1F2">
<span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;mso-fareast-language:#0C00">Data and application security<o:p></o:p></span></li><li class="MsoNormal" style="color:#404041;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l2 level1 lfo3;background:#F1F1F2">
<span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;mso-fareast-language:#0C00">Data protection and integrity<o:p></o:p></span></li><li class="MsoNormal" style="color:#404041;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l2 level1 lfo3;background:#F1F1F2">
<span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;mso-fareast-language:#0C00">Game-theoretic security technologies<o:p></o:p></span></li><li class="MsoNormal" style="color:#404041;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l2 level1 lfo3;background:#F1F1F2">
<span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;mso-fareast-language:#0C00">Implementation and evaluation of networked security systems<o:p></o:p></span></li><li class="MsoNormal" style="color:#404041;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l2 level1 lfo3;background:#F1F1F2">
<span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;mso-fareast-language:#0C00">Information-theoretic security<o:p></o:p></span></li><li class="MsoNormal" style="color:#404041;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l2 level1 lfo3;background:#F1F1F2">
<span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;mso-fareast-language:#0C00">Intrusion detection, prevention, and response<o:p></o:p></span></li><li class="MsoNormal" style="color:#404041;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l2 level1 lfo3;background:#F1F1F2">
<span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;mso-fareast-language:#0C00">Key management, public key infrastructures, certification revocation, authentication, and access control<o:p></o:p></span></li><li class="MsoNormal" style="color:#404041;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l2 level1 lfo3;background:#F1F1F2">
<span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;mso-fareast-language:#0C00">Malware detection, prevention, and mitigation<o:p></o:p></span></li><li class="MsoNormal" style="color:#404041;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l2 level1 lfo3;background:#F1F1F2">
<span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;mso-fareast-language:#0C00">Security metrics and models<o:p></o:p></span></li><li class="MsoNormal" style="color:#404041;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l2 level1 lfo3;background:#F1F1F2">
<span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;mso-fareast-language:#0C00">Physical-layer and cross-layer security technologies<o:p></o:p></span></li><li class="MsoNormal" style="color:#404041;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l2 level1 lfo3;background:#F1F1F2">
<span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;mso-fareast-language:#0C00">Security and privacy for big data and machine learning<o:p></o:p></span></li><li class="MsoNormal" style="color:#404041;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l2 level1 lfo3;background:#F1F1F2">
<span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;mso-fareast-language:#0C00">Security and privacy for data and network outsourcing<o:p></o:p></span></li><li class="MsoNormal" style="color:#404041;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l2 level1 lfo3;background:#F1F1F2">
<span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;mso-fareast-language:#0C00">Security and privacy for mobile and wearable devices<o:p></o:p></span></li><li class="MsoNormal" style="color:#404041;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l2 level1 lfo3;background:#F1F1F2">
<span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;mso-fareast-language:#0C00">Security and privacy in cellular networks<o:p></o:p></span></li><li class="MsoNormal" style="color:#404041;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l2 level1 lfo3;background:#F1F1F2">
<span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;mso-fareast-language:#0C00">Security and privacy in cloud and edge computing<o:p></o:p></span></li><li class="MsoNormal" style="color:#404041;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l2 level1 lfo3;background:#F1F1F2">
<span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;mso-fareast-language:#0C00">Internet Security: Protocols, standards, measurements<o:p></o:p></span></li><li class="MsoNormal" style="color:#404041;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l2 level1 lfo3;background:#F1F1F2">
<span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;mso-fareast-language:#0C00">Security and privacy in crowdsourcing<o:p></o:p></span></li><li class="MsoNormal" style="color:#404041;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l2 level1 lfo3;background:#F1F1F2">
<span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;mso-fareast-language:#0C00">Security and privacy in cyber-physical systems (CPS)<o:p></o:p></span></li><li class="MsoNormal" style="color:#404041;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l2 level1 lfo3;background:#F1F1F2">
<span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;mso-fareast-language:#0C00">Security and privacy in Internet of Things (IoT)<o:p></o:p></span></li><li class="MsoNormal" style="color:#404041;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l2 level1 lfo3;background:#F1F1F2">
<span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;mso-fareast-language:#0C00">Security and privacy in emerging wireless technologies and applications (dynamic spectrum sharing, cognitive radio networks, millimeter wave communications,
MIMO systems, RFID, 5G/6G networks, etc.)<o:p></o:p></span></li><li class="MsoNormal" style="color:#404041;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l2 level1 lfo3;background:#F1F1F2">
<span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;mso-fareast-language:#0C00">Security and privacy in peer-to-peer and overlay networks<o:p></o:p></span></li><li class="MsoNormal" style="color:#404041;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l2 level1 lfo3;background:#F1F1F2">
<span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;mso-fareast-language:#0C00">Security and privacy in WiFi, ad hoc, mesh, sensor, body-area, and disruption/delay tolerant systems<o:p></o:p></span></li><li class="MsoNormal" style="color:#404041;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l2 level1 lfo3;background:#F1F1F2">
<span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;mso-fareast-language:#0C00">Security and privacy in smart cities, smart and connected health, and other smart systems/buildings/offices<o:p></o:p></span></li><li class="MsoNormal" style="color:#404041;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l2 level1 lfo3;background:#F1F1F2">
<span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;mso-fareast-language:#0C00">Security for critical infrastructures (smart grids, transportation systems, etc.)<o:p></o:p></span></li><li class="MsoNormal" style="color:#404041;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l2 level1 lfo3;background:#F1F1F2">
<span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;mso-fareast-language:#0C00">Security for future Internet architectures and designs<o:p></o:p></span></li><li class="MsoNormal" style="color:#404041;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l2 level1 lfo3;background:#F1F1F2">
<span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;mso-fareast-language:#0C00">Security for software-defined and data center networks<o:p></o:p></span></li><li class="MsoNormal" style="color:#404041;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l2 level1 lfo3;background:#F1F1F2">
<span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;mso-fareast-language:#0C00">Security and privacy in connected/autonomous vehicles, UAVs/UAS, drones, etc.<o:p></o:p></span></li><li class="MsoNormal" style="color:#404041;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l2 level1 lfo3;background:#F1F1F2">
<span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;mso-fareast-language:#0C00">Security and privacy of social networks, metaverse/virtual/augmented reality-based networks/systems<o:p></o:p></span></li><li class="MsoNormal" style="color:#404041;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l2 level1 lfo3;background:#F1F1F2">
<span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;mso-fareast-language:#0C00">Social, economic, and policy issues of trust, security, and privacy<o:p></o:p></span></li><li class="MsoNormal" style="color:#404041;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l2 level1 lfo3;background:#F1F1F2">
<span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;mso-fareast-language:#0C00">Traffic analysis<o:p></o:p></span></li><li class="MsoNormal" style="color:#404041;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l2 level1 lfo3;background:#F1F1F2">
<span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;mso-fareast-language:#0C00">Usable security and privacy<o:p></o:p></span></li><li class="MsoNormal" style="color:#404041;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l2 level1 lfo3;background:#F1F1F2">
<span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;mso-fareast-language:#0C00">Web, e-commerce, m-commerce, and e-mail security<o:p></o:p></span></li></ul>
<p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;background:#F1F1F2">
<span lang="EN-US" style="color:black">IMPORTANT DATES </span><span lang="EN-US"><o:p></o:p></span></p>
<ul type="disc">
<li class="MsoListParagraph" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:0cm;mso-list:l1 level1 lfo6;background:#F1F1F2">
<span lang="EN-US" style="color:black">Full Paper Submission Deadline: 20 May 2022
</span><span lang="EN-US"><o:p></o:p></span></li><li class="MsoListParagraph" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:0cm;mso-list:l1 level1 lfo6;background:#F1F1F2">
<span lang="EN-US" style="color:black">Notification of Acceptance: 15 July 2022 </span>
<span lang="EN-US"><o:p></o:p></span></li><li class="MsoListParagraph" style="color:#404041;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:0cm;mso-list:l1 level1 lfo6;background:#F1F1F2">
<span lang="EN-US" style="color:black">Final Paper Submission: 5 Aug 2022</span><span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;mso-fareast-language:#0C00"><o:p></o:p></span></li></ul>
<p class="MsoNormal" style="mso-margin-top-alt:15.0pt;margin-right:0cm;margin-bottom:7.5pt;margin-left:0cm;background:#F1F1F2">
<span style="font-size:14.5pt;font-family:Oswald;color:#404041;text-transform:uppercase;mso-fareast-language:#0C00">GENERAL CO-CHAIRS<o:p></o:p></span></p>
<p class="MsoNormal" style="margin-bottom:7.5pt;background:#F1F1F2"><span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;color:#404041;mso-fareast-language:#0C00">Haining Wang, Virginia Tech, USA<o:p></o:p></span></p>
<p class="MsoNormal" style="margin-bottom:7.5pt;background:#F1F1F2"><span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;color:#404041;mso-fareast-language:#0C00">Sencun Zhu, Penn State University, USA<o:p></o:p></span></p>
<p class="MsoNormal" style="mso-margin-top-alt:15.0pt;margin-right:0cm;margin-bottom:7.5pt;margin-left:0cm;background:#F1F1F2">
<span style="font-size:14.5pt;font-family:Oswald;color:#404041;text-transform:uppercase;mso-fareast-language:#0C00">TECHNICAL PROGRAM CO-CHAIRS<o:p></o:p></span></p>
<p class="MsoNormal" style="margin-bottom:7.5pt;background:#F1F1F2"><span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;color:#404041;mso-fareast-language:#0C00">Ming Li, University of Arizona, USA<o:p></o:p></span></p>
<p class="MsoNormal" style="margin-bottom:7.5pt;background:#F1F1F2"><span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;color:#404041;mso-fareast-language:#0C00">Selcuk Uluagac, Florida International University, USA<o:p></o:p></span></p>
<p class="MsoNormal" style="mso-margin-top-alt:15.0pt;margin-right:0cm;margin-bottom:7.5pt;margin-left:0cm;background:#F1F1F2">
<span style="font-size:14.5pt;font-family:Oswald;color:#404041;text-transform:uppercase;mso-fareast-language:#0C00">WORKSHOP CO-CHAIRS<o:p></o:p></span></p>
<p class="MsoNormal" style="margin-bottom:7.5pt;background:#F1F1F2"><span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;color:#404041;mso-fareast-language:#0C00">Berkay Celik, Purdue University, USA<o:p></o:p></span></p>
<p class="MsoNormal" style="margin-bottom:7.5pt;background:#F1F1F2"><span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;color:#404041;mso-fareast-language:#0C00">Yao Liu, University of Southern Florida, USA<o:p></o:p></span></p>
<p class="MsoNormal" style="mso-margin-top-alt:15.0pt;margin-right:0cm;margin-bottom:7.5pt;margin-left:0cm;background:#F1F1F2">
<span style="font-size:14.5pt;font-family:Oswald;color:#404041;text-transform:uppercase;mso-fareast-language:#0C00">POSTER CHAIR<o:p></o:p></span></p>
<p class="MsoNormal" style="margin-bottom:7.5pt;background:#F1F1F2"><span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;color:#404041;mso-fareast-language:#0C00">Shuai Hao, Old Dominion University, USA<o:p></o:p></span></p>
<p class="MsoNormal" style="mso-margin-top-alt:15.0pt;margin-right:0cm;margin-bottom:7.5pt;margin-left:0cm;background:#F1F1F2">
<span style="font-size:14.5pt;font-family:Oswald;color:#404041;text-transform:uppercase;mso-fareast-language:#0C00">PUBLICATION CHAIR<o:p></o:p></span></p>
<p class="MsoNormal" style="margin-bottom:7.5pt;background:#F1F1F2"><span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;color:#404041;mso-fareast-language:#0C00">Syed Rafiul Hussain, Penn State University, USA<o:p></o:p></span></p>
<p class="MsoNormal" style="mso-margin-top-alt:15.0pt;margin-right:0cm;margin-bottom:7.5pt;margin-left:0cm;background:#F1F1F2">
<span style="font-size:14.5pt;font-family:Oswald;color:#404041;text-transform:uppercase;mso-fareast-language:#0C00">LOCAL CHAIR<o:p></o:p></span></p>
<p class="MsoNormal" style="margin-bottom:7.5pt;background:#F1F1F2"><span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;color:#404041;mso-fareast-language:#0C00">Ming Li, University of Texas, Arlington, USA<o:p></o:p></span></p>
<p class="MsoNormal" style="mso-margin-top-alt:15.0pt;margin-right:0cm;margin-bottom:7.5pt;margin-left:0cm;background:#F1F1F2">
<span style="font-size:14.5pt;font-family:Oswald;color:#404041;text-transform:uppercase;mso-fareast-language:#0C00">PUBLICITY CO-CHAIRS<o:p></o:p></span></p>
<p class="MsoNormal" style="margin-bottom:7.5pt;background:#F1F1F2"><span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;color:#404041;mso-fareast-language:#0C00">Xing Gao, University of Delaware, USA<o:p></o:p></span></p>
<p class="MsoNormal" style="margin-bottom:7.5pt;background:#F1F1F2"><span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;color:#404041;mso-fareast-language:#0C00">Emmanouil Vasilomanolakis Aalborg University, Denmark<o:p></o:p></span></p>
<p class="MsoNormal" style="margin-bottom:7.5pt;background:#F1F1F2"><span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;color:#404041;mso-fareast-language:#0C00">Yongzhong He, Beijing Jiaotong University, China<o:p></o:p></span></p>
<p class="MsoNormal" style="mso-margin-top-alt:15.0pt;margin-right:0cm;margin-bottom:7.5pt;margin-left:0cm;background:#F1F1F2">
<span style="font-size:14.5pt;font-family:Oswald;color:#404041;text-transform:uppercase;mso-fareast-language:#0C00">STUDENT TRAVEL CHAIR<o:p></o:p></span></p>
<p class="MsoNormal" style="margin-bottom:7.5pt;background:#F1F1F2"><span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;color:#404041;mso-fareast-language:#0C00">Rui Zhang, University of Delaware, USA<o:p></o:p></span></p>
<p class="MsoNormal" style="mso-margin-top-alt:15.0pt;margin-right:0cm;margin-bottom:7.5pt;margin-left:0cm;background:#F1F1F2">
<span style="font-size:14.5pt;font-family:Oswald;color:#404041;text-transform:uppercase;mso-fareast-language:#0C00">WEB CHAIR<o:p></o:p></span></p>
<p class="MsoNormal" style="margin-bottom:7.5pt;background:#F1F1F2"><span style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;color:#404041;mso-fareast-language:#0C00">Guannan Liu, Virginia Tech, USA<o:p></o:p></span></p>
<p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;background:#F1F1F2">
<span lang="EN-US" style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;color:#404041;mso-fareast-language:#0C00">For more information have a look at:
<a href="https://cns2022.ieee-cns.org/">https://cns2022.ieee-cns.org/</a></span><span lang="EN-US" style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;color:black;mso-fareast-language:#0C00">
</span><span lang="EN-US" style="font-size:10.5pt;font-family:"Lucida Sans Unicode",sans-serif;color:#404041;mso-fareast-language:#0C00"><o:p></o:p></span></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
</div>
</body>
</html>