The 1st IEEE Conference on Communications and Network Security (CNS 2013)
Washington D.C., USA
October 14 ~16, 2013
Call for Papers
Cyber security has become an important research and development area for academia, government, and industry in recent years. As government and industry investment in cyber security research continues to grow, there will be a dramatic increase in the amount of new results generated by the research community, which must be disseminated widely amongst the research community in order to provide the peer review feedback that is needed to ensure that high-quality solutions that address important and emerging security issues are developed.
As a leading professional society focusing on communications technologies, IEEE Communications Society (ComSoc) has identified the need for a high-quality security conference that would focus on communications-oriented aspects of security. IEEE ComSoc has thus decided to launch a new conference dedicated to Communications and Network Security. This new conference is positioned to be a core ComSoc conference (at a level comparable to IEEE INFOCOM) and will serve as a premier forum for communications and network security researchers, practitioners, policy makers, and users to exchange ideas, techniques and tools, raise awareness, and share experience related to security and privacy.
IEEE CNS seeks original high-quality technical papers from academia, government, and industry. Topics of interest encompass all practical and theoretical aspects of communications and network security, all the way from the physical layer to the various network layers to the variety of applications reliant on a secure communication substrate. Submissions with main contribution in other areas, such as information security, software security, system security, or applied cryptography, will also be considered if a clear connection to secure communications/networking is demonstrated.
Particular topics of interest include, but are not limited to:
- Security and Privacy in the Internet, peer-to-peer networks, overlay networks
- Security and Privacy in Wi-Fi, Wi-Max, ad hoc, mesh, sensor, and RFID networks
- Security and Privacy in emerging technologies: social networks, cognitive radio networks, disruption/delay tolerant networks, vehicular networks, cloud computing, smart grid
- Cross-layer methods for enhancing security
- Information-theoretic security
- Anonymization and privacy in communication systems
- Traffic analysis, location privacy and obfuscation of mobile device information
- Physical layer security methods: confidentiality and authentication
- Secure routing, network management
- Intrusion detection
- Computer and network forensics
- Vulnerability, exploitation tools, Malware, Botnet, DDoS attacks
- Key management and PKI
- Security metrics and performance evaluation, traffic analysis techniques
- Web, e-commerce, m-commerce, and e-mail security
- Social, economic and policy issues of trust, security and privacy
- Ensuring the availability of communications, survivability of networks in the presence of denial of service
- Jamming and jamming-resistance
- Multipath routing around network holes
|March 8, 2013, 11:59 pm EST
|Notification of Acceptance
|June 14, 2013
|July 12, 2013
- Sushil Jajodia, George Mason University, USA
Technical Program Chairs
- Wenjing Lou, Virginia Tech, USA
- Wade Trappe, Rutgers University, USA
- Peng Ning, North Carolina State University, USA
- Moti Yung, Google, Inc.
- Pierangela Samarati, University of Milan, ITALY
- Yanchao Zhang, Arizona State University, USA
- Student Travel Grant Chair:
- Yong Guan, Iowa State University, USA
- Harvey Freeman, HAF Consulting, Inc.
- Charles Clancy, Virginia Tech, USA
- Local Arrangements Chair:
- Tom Hou, Virginia Tech, USA
- Nan Zhang, George Washington University, USA
- Yingying Jennifer Chen, Stevens Institute of Technology, USA
- Yingjiu Li,Singapore Management University, Singapore
- Peter Mueller, IBM Zurich Research Lab, Switzerlan
- Yi Qian, University of Nebraska, Lincoln, USA
- Bruce Worthman, IEEE Communications Society
- Ming Li, Utah State University, USA
IEEE and IEEE Communications Society Policies
To ensure appropriate consideration of conflicts of interest during the review process, the ComSoc prohibits changes to the list of authors once a paper has been submitted for review during review, revision, or (if accepted) final publication. The author list may be changed only prior to the submission deadline.
Additional paper submittal instructions can be found on the conference Web site www.ieee-cns.org.
To be published in the IEEE CNS 2013 Conference Proceedings and IEEE Xplore®, an author of an accepted paper is required to register for the conference at the full (member or non-member) rate and the paper must be presented by an author of that paper at the conference unless the TPC Chair grants permission for a substitute presenter.
Non-refundable registration fees must be paid prior to uploading the final IEEE formatted, publication-ready version of the paper. For authors with multiple accepted papers, one full registration is valid for up to 3 papers. Accepted and presented papers will be published in the IEEE CNS 2013 Conference Proceedings and in IEEE Xplore®.