[Isms] IEEE CNS 2018 - Call for Posters (Deadline: March 5)

"LUO, LANNAN" <LLUO@cse.sc.edu> Tue, 09 January 2018 02:25 UTC

Return-Path: <LLUO@cse.sc.edu>
X-Original-To: isms@ietfa.amsl.com
Delivered-To: isms@ietfa.amsl.com
Received: from localhost (localhost []) by ietfa.amsl.com (Postfix) with ESMTP id F1205124BE8 for <isms@ietfa.amsl.com>; Mon, 8 Jan 2018 18:25:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.208
X-Spam-Status: No, score=-4.208 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, T_RP_MATCHES_RCVD=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([]) by localhost (ietfa.amsl.com []) (amavisd-new, port 10024) with ESMTP id kciEDRGWIXh0 for <isms@ietfa.amsl.com>; Mon, 8 Jan 2018 18:24:59 -0800 (PST)
Received: from mo7.mail.sc.edu (mo7.mail.sc.edu []) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D13CA126C89 for <isms@ietf.org>; Mon, 8 Jan 2018 18:24:58 -0800 (PST)
Received: from mo7.mail.sc.edu ( id hagjvk0171s8 for <isms@ietf.org>; Mon, 8 Jan 2018 21:24:58 -0500 (envelope-from <LLUO@cse.sc.edu>)
Received: from CAE145HUBP03.ds.sc.edu ([]) by mo7.mail.sc.edu (SonicWALL with ESMTPS (version=TLSv1/SSLv3 cipher=ECDHE-RSA-AES256-SHA bits=256) id 201801090224570617719; Mon, 08 Jan 2018 21:24:57 -0500
Received: from CAE145EMBP02.ds.sc.edu ([fe80::bc67:c4b6:7a3c:50a0]) by CAE145HUBP03.ds.sc.edu ([::1]) with mapi id 14.03.0361.001; Mon, 8 Jan 2018 21:24:56 -0500
From: "LUO, LANNAN" <LLUO@cse.sc.edu>
To: "isms@ietf.org" <isms@ietf.org>
Thread-Topic: IEEE CNS 2018 - Call for Posters (Deadline: March 5)
Thread-Index: AQHTiPEJCZRyrjiWLUarpn9pSSZtrA==
Date: Tue, 9 Jan 2018 02:24:56 +0000
Message-ID: <F0ACB042FDEBA44C972AA9527AEEB8DC07E11C3C@CAE145EMBP02.ds.sc.edu>
Accept-Language: en-US
Content-Language: en-US
x-originating-ip: []
Content-Type: multipart/alternative; boundary="_000_F0ACB042FDEBA44C972AA9527AEEB8DC07E11C3CCAE145EMBP02dss_"
MIME-Version: 1.0
X-Mlf-UniqueId: o201801090224570617719
Archived-At: <https://mailarchive.ietf.org/arch/msg/isms/Hk53QI4yUGnVDOA-AL8H8fW0ypE>
Subject: [Isms] IEEE CNS 2018 - Call for Posters (Deadline: March 5)
X-BeenThere: isms@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Mailing list for the ISMS working group <isms.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/isms>, <mailto:isms-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/isms/>
List-Post: <mailto:isms@ietf.org>
List-Help: <mailto:isms-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/isms>, <mailto:isms-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Jan 2018 02:25:02 -0000

[Apologies, if you receive multiple copies of this CFP]


6th IEEE Conference on Communications and Network Security (CNS 2018)
30 May - 1 June 2018, Beijing, China

The IEEE Conference on Communications and Network Security (CNS) is a premier forum for cyber security researchers, practitioners, policy makers, and users to exchange ideas, techniques and tools, raise awareness, and share experiences related to all practical and theoretical aspects of communications and network security.

Building on the success of the past years' conferences, IEEE CNS 2018 welcomes poster submissions to be presented during the conference. A poster submission should be a 2-page abstract, which summarizes the key merits of proposed ideas, presents initial results, and identifies challenges to develop a complete solution. Poster submissions will be evaluated by the Posters Session Committee based on the novelty and the potential to stimulate discussions and promote collaborations. Posters should be submitted via EDAS at https://edas.info/N24385. Please follow the same template for regular conference papers available on http://cns2018.ieee-cns.org.
Sample topics of interest include, but are not limited to:

- Anonymity and privacy technologies
- Biometric authentication and identity management
- Computer and network forensics
- Cyber deterrence strategies
- Data and application security
- Data protection and integrity
- Game-theoretic security technologies
- Implementation and evaluation of networked security systems
- Information-theoretic security
- Intrusion detection, prevention, and response
- Key management, public key infrastructures, certification, revocation, and authentication
- Location privacy
- Malware detection and mitigation
- Physical-layer and cross-layer security technologies
- Security metrics and models
- Security and privacy for big data
- Security and privacy for data and network outsourcing services
- Security and privacy for mobile and wearable devices
- Security and privacy in cellular networks
- Security and privacy in cloud and edge computing
- Security and privacy in crowdsourcing
- Security and privacy in emerging wireless technologies (dynamic spectrum sharing, cognitive radio networks, millimeter wave communications, MIMO systems, etc.)
- Security and privacy in peer-to-peer and overlay networks
- Security and privacy in WiFi, ad hoc, mesh, sensor, vehicular, body-area, disruption/delay tolerant, and social networks.
- Security and privacy in smart cities, smart and connected health, IoT, and RFID systems
- Security for critical infrastructures (smart grids, transportation systems, etc.)
- Security for future Internet architectures and designs
- Security for software-defined and data center networks
- Social, economic, and policy issues of trust, security, and privacy
- Traffic analysis
- Usable security and privacy
- Web, e-commerce, m-commerce, and e-mail security

Deadline for poster submission: March 5, 2018
Notification to authors: March 26, 2018
Camera-ready version: April 2, 2018

The conference will arrange the poster session in a room where the posters can be displayed. An accepted poster must be presented by an author in the poster session to interested attendees. The abstract of the accepted posters will appear in the conference proceeding and be submitted to IEEE Xplore. Each accepted poster requires an author to register for the conference at the appropriate rate based on the membership level. Each author registration can cover up to three posters or papers of the conference, but each poster must have a dedicated presenter at the session.

A Best Poster Award will be given based on the poster's novelty and potentials in research. The quality of presentation and the interaction during the session will also be important criteria. The award will be announced in a plenary session of the main conference.

Sara Foresti, Universita' degli Studi di Milano, Italy
Chunyi Peng, Purdue University, USA