[Om-announce] IEEE CNS 2014 Call For Poster

sara.foresti at unimi.it sara.foresti at unimi.it
Tue Jun 24 09:37:42 CEST 2014

[Apologies if you receive multiple copies of this message]


IEEE CNS 2014 - IEEE Conference on Communications and Network Security
San Francisco, USA -- October 29-31, 2014

2‐page Abstract Due by: July 23, 2014
Notification of Acceptance: August 7, 2014
Final Abstract Due: August 20, 2014

IEEE CNS is a new conference series in IEEE Communications Society (ComSoc)
core conference portfolio and the only ComSoc conference focusing solely on
cyber security. IEEE CNS is a spin-off of IEEE INFOCOM, the premier ComSoc
conference on networking. The goal of CNS is to provide an outstanding forum
for cyber security researchers, practitioners, policy makers, and users to
exchange ideas, techniques and tools, raise awareness, and share experience
related to all practical and theoretical aspects of communications and
network security. 

Building on the success of last year's inaugural conference, IEEE CNS 2014
welcomes Poster submissions to be presented during the conference. 
A Poster submission should be a 2-page abstract, which summarizes the key 
merits of proposed ideas, presents initial results, and identifies
challenges to develop a complete solution. Abstracts will be evaluated
by the Posters Session committee based on the novelty and the potential
to stimulate discussions and promote collaborations. Poster abstracts
should be submitted via EDAS at http://edas.info/N18325
Please follow the same template for regular conference papers available
on http://www.ieee-cns.org
Sample topics of interest include but are not limited to: 
- Security and privacy issues on wired networks, e.g., the Internet, 
  peer‐to‐peer networks, overlay networks
- Security and privacy issues on wireless networks, e.g., WiFi, WiMax,
  Ah Hoc, Mesh, Sensor, RFID networks
- Security and privacy in social networks and cloud computing
- Security and privacy in smart grid, cognitive radio networks, and 
  disruption/delay tolerant networks
- Information-theoretic security
- Anonymization and privacy in communication systems
- Traffic analysis, location privacy and obfuscation of mobile
  device information
- Physical layer security methods, e.g., confidentiality and authentication
- Secure routing, Secure network management
- Mobile security, Android security, and trusted computing on mobile devices
- Intrusion detection and prevention
- Computer and network forensics 
- Vulnerability, exploitation tools, Malware, Botnet, DDoS attacks 
- Key management and PKI in the context of secure communications
- Security metrics and performance evaluation, traffic analysis techniques 
- Web, e-commerce, m-commerce, and e-mail security
- Social, economic and policy issues of trust, security and privacy
- Ensuring the availability of communications, survivability of networks 

The conference will arrange the poster session in a room where the posters
can be displayed. An accepted poster must be presented by an author in the
poster session to interested attendees. The abstract of the accepted posters
will appear in the conference proceeding and be submitted to IEEE Xplore.
Each accepted poster requires an author to register for the conference
at the appropriate rate based on the membership level. Each author
registration can cover up to three posters or papers of the conference,
but each poster must have a dedicated presenter at the session.

A Best Poster Award will be given based on the poster's novelty and
potentials in research. The quality of presentation and the interaction
during the session will also be important criteria. The award will be
announced in a plenary session of the main conference.

Il 5 x mille alla nostra Università è un investimento sui giovani,
sui loro migliori progetti.

Sostiene la libera ricerca.
Alimenta le loro speranze nel futuro.

Investi il tuo 5 x mille sui giovani.

Università degli Studi di Milano
codice fiscale 80012650158


More information about the Om-announce mailing list