Call for papers

Submissions are solicited in, but not limited to, the following areas:

Anti-malware   techniques: detection, analysis, and prevention

Security and privacy of mobile   and smartphone platforms

Anti-phishing,   anti-blackmailing, anti-fraud techniques

Security and privacy of systems based on machine learning and   AI

APTs, botnets, DDoS

Security for cloud and edge computing

Autonomous vehicles,   industrial control systems

Security for cyber-physical systems

Cyber attack prevention,   detection, investigation, and response

Security for emerging networks

Cyber-crime defense and   forensics

Security for future Internet architectures and designs

Electronic voting, smart grid

Security for large-scale, critical infrastructures

Home networks, IoT, body-area   networks, VANETs

Security of Web-based applications and services

Implementation, deployment and   management of network security policies

Social networking, crowd-sourcing

Integrating security in   network protocols

Software and firmware analysis, customization, and   transformation for systems security

Privacy and anonymity in   networks and distributed systems

Software-Defined Networking

Public key infrastructures,   key management, certification, and revocation

Tradeoffs between security and efficiency, usability, cost,   and ethics

Routing, naming, and   management

Trustworthy Computing software and hardware to secure networks   and distributed systems

Security and privacy for   blockchains and cryptocurrencies

Usable security and privacy

Follow us

Contact us