logo

۰۹ تیر - ۱۲ تیر ۱۴۰۴

رتبه: B (CORE2023)Offline

ACM Conference on Security and Privacy in Wireless and Mobile Networks

به‌روزرسانی شده: 3 days ago
0.0 (0 امتیازات)

هنوز دنبال‌کننده‌ای وجود ندارد.

نمای کلی

The 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2025) will take place from June 30 to July 3, 2025, in Arlington, Virginia, USA, hosted by George Mason University. ACM WiSec is a premier conference focused on security and privacy in wireless and mobile networks, IoT, cyber-physical systems, and related areas, attracting researchers, students, and industry professionals.

فراخوان مقالات

Call for Papers: ACM WiSec 2025

The 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2025) will be held in person from June 30 to July 3, 2025, in Arlington, Virginia, USA.

About ACM WiSec

ACM WiSec is the leading ACM and SIGSAC conference dedicated to all aspects of security and privacy in wireless and mobile networks and their applications, mobile software platforms, the Internet of Things, cyber-physical systems, usable security and privacy, biometrics, and cryptography. It is a competitive, high-quality conference well-attended by industry, government, and academia.

Topics of Interest

Topics of interest for WiSec include:

  • Confidentiality, integrity, availability
  • Authentication, identity, authorization, access control models and policies, localization, key management (agreement or distribution)
  • Privacy of systems, devices, users, their locations and other attributes
  • Exploitation of systems, including through reverse engineering, fuzzing, hardware or software vulnerabilities, protocol vulnerabilities, side channels, fault injection, resource exhaustion, jamming, or other means.
  • Abuse of and through systems, including messaging abuse (spam, robocalls, etc.), theft of service, and fraud
  • Defenses for exploitation and abuse
  • Experiences developing, testing, and deploying production-ready or large-scale secure wireless systems
  • Formal analysis, formal verification, and proof-based security approaches
  • Information theoretical approaches for security
  • Usable security and privacy, human factors
  • Application of Machine Learning, e.g., for attack detection or privacy violations
  • Economic and social impacts to security and privacy

Wireless and Mobile Systems of Interest

  • Wireless networking protocols, for example: 802.11, Bluetooth, 802.15.4-based protocols, cellular air protocols including LTE and 5G-NR, Vehicle and industrial device protocols (e.g., LoRA), wireless for critical infrastructure (e.g., ADS-B, GPS, rail, satellites), NFC and smart payment applications
  • Cryptographic primitives and protocols for wireless and mobile systems, including: WPA2, AKA, etc.
  • Wireless physical layer technologies: transmission, reception, modulation, localization, remote sensing (e.g., radar, mmWave sensing), jammers, dynamic spectrum reuse and cognitive radio systems
  • Wireless and mobile device hardware and software, for example: embedded devices, wearables (e.g., watches), smartphones, mobile sensors, home and industrial automation devices (e.g., IoT, Smart Home, utilities, etc.), healthcare devices, vehicles (e.g., drones, automotive, avionics, satellites), and payment systems
  • Wireless and mobile adjacent topics, including voice interfaces, visible light communications, sonic, underwater communications, legacy telecommunications, …

Important Dates

  • First Cycle Deadlines:
    • Submission: November 21, 2024
    • Author Notification: January 15, 2025
    • Camera-ready: February 5, 2025
  • Second Cycle Deadlines:
    • Submission: March 16, 2025 (AOE)
    • Author Notification: April 25, 2025
    • Camera-ready: May 12, 2025
  • Posters/Demo Deadlines:
    • Submission: April 30, 2025 (AOE)
    • Author Notification: May 8, 2025
    • Camera-ready: May 12, 2025

Note: All deadlines are firm.

Submission Guidelines

Full, Short, and SoK Papers

  • Full papers: At most 10 pages (excluding bibliography and appendices), up to 12 pages total.
  • Short papers: Up to 6 pages (including bibliography and appendices).
  • SoK papers: Up to 10 pages (excluding bibliography and appendices), up to 15 pages total. Title must be prefixed with "SoK:".
  • All papers must be anonymized for double-blind review.

Posters and Demos

Instructions for poster and demo submissions will be made available on the WiSec 2025 website.

Artifact Evaluation

WiSec encourages authors to make software and data artifacts publicly available. Artifacts will be evaluated, and corresponding papers may be granted an artifact evaluation label.

Double Submissions

Double/simultaneous submissions to other conferences/journals are not allowed and will result in immediate rejection.

Registration

  • Registration is now open.
  • Authors of accepted papers must register by May 12, 2025.
  • Early bird rates are available until May 19, 2025.

Travel Grants for Students

ACM WiSec 2025 offers a limited number of travel grants for students who have registered and co-authored an accepted paper. Grants are competitive and intended to reimburse travel expenses.

  • Maximum of two students per institution.
  • Not eligible for postdoctoral researchers, faculty members, or senior research personnel.
  • Grant recipients may receive up to $1,000 for documented expenses (registration, airfare, lodging).
  • To apply, please complete and submit the travel grant form (Note: Link is illustrative).

Research Ethics

All submitted papers will be reviewed for ethical concerns. Researchers should consider ethical analysis an integral part of their research, adhering to principles of beneficence, justice, respect for persons, and respect of law and public interest. For human subjects research, authors are expected to follow relevant laws and institutional practices (e.g., IRB review in the US).

Policy for Peer-Review Integrity

All SIGSAC-sponsored conferences adhere to ACM policies against harassment and the ACM Code of Ethics. Authors, PC members, and reviewers must follow ACM Publications Policies, including upholding the integrity of the peer review process and avoiding conflicts of interest. Violations will be penalized according to ACM policies.

تاریخ‌های مهم

تاریخ‌های کنفرانس

Conference Date

۹ تیر ۱۴۰۴۱۲ تیر ۱۴۰۴

ارسال مقاله

First Cycle deadlines Submission

۱ آذر ۱۴۰۳

Second Cycle deadlines Submission

۲۶ اسفند ۱۴۰۳

Posters/Demo deadlines Submission

۱۰ اردیبهشت ۱۴۰۴

اعلان

First Cycle deadlines Author Notification

۲۶ دی ۱۴۰۳

Second Cycle deadlines Author Notification

۵ اردیبهشت ۱۴۰۴

Posters/Demo deadlines Author Notification

۱۸ اردیبهشت ۱۴۰۴

نسخه نهایی

First Cycle deadlines Camera-ready

۱۷ بهمن ۱۴۰۳

Posters/Demo deadlines Camera-ready

۲۲ اردیبهشت ۱۴۰۴

Second Cycle deadlines Camera-ready

۲۲ اردیبهشت ۱۴۰۴

ثبت‌نام

Authors of accepted papers must register by

۲۲ اردیبهشت ۱۴۰۴

Early bird rates are available until

۲۹ اردیبهشت ۱۴۰۴

رتبه منبع

منبع: CORE2023

رتبه: B

حوزه پژوهشی: Cybersecurity and privacy

نقشه

Loading feedback section...