logo

۰۲ شهریور - ۰۴ شهریور ۱۴۰۵

رتبه: C (CORE2023)Hybrid

International Conference on Security and Privacy for Communication Networks

به‌روزرسانی شده: 4 days ago
0.0 (0 امتیازات)

هنوز دنبال‌کننده‌ای وجود ندارد.

نمای کلی

The 22nd EAI International Conference on Security and Privacy in Communication Networks (SecureComm) will be held in Lancaster, United Kingdom, from August 24-26, 2026. It aims to bring together researchers and practitioners from academia, industry, and government to explore research directions in cybersecurity, secure communications, and networking. Accepted papers will be submitted for publication by Springer in the LNICST series.

فراخوان مقالات

SecureComm 2026: Call for Papers

The 22nd EAI International Conference on Security and Privacy in Communication Networks (SecureComm) will be held in Lancaster, United Kingdom, from August 24-26, 2026, as a hybrid conference.

SecureComm aims to bring together researchers and practitioners from academia, industry, and government to explore important research directions in cybersecurity and secure communications and networking.

Scope

SecureComm seeks submissions of high-quality research contributions encompassing ALL areas of secure communications and networking. Topics in less related areas will be considered if a clear connection to secure communication and networking is demonstrated. Topics addressing interdisciplinary challenges in different application domains are welcome.

Topics of Interest

  • Security and privacy in computer networks (e.g., wired, wireless, mobile, hybrid, sensor, vehicular, satellite, 5G, 6G, ad hoc, peer-to-peer, and software-defined networks)
  • Security and privacy in systems with strong secure communication and networking element (e.g., security in the cloud, IoT, cyber-physical systems, edge and fog computing, and teleconferencing)
  • Security and privacy in Web3.0 and metaverse
  • Distributed ledger technologies (e.g., blockchain, smart contracts, and cryptocurrencies) and decentralized applications (e.g., DeFi)
  • Security protocols at all network layers and for different applications (e.g., for secure routing, naming/addressing, network management, remote authentication and attestation)
  • Physical layer security (e.g., jamming, GPS spoofing)
  • Network attacks and forensics (e.g., DDoS, MitM, malware, botnets, side-channel attacks, phishing/pharming, cybersquatting), defenses (e.g., network intrusion detection and prevention, firewalls, packet filters, moving target defence)
  • Applications of cryptography (e.g., Analysis of deployed cryptography and cryptographic protocols, Cryptographic implementation analysis, New cryptographic protocols with real-world applications)
  • Security analysis (e.g., Malware analysis, Automated security analysis of source code and binaries, Program analysis)
  • Data-driven security and measurement studies (e.g., Measurements of fraud, malware or spam; Measurements of human behavior and security)
  • Cybercrime investigation and attribution
  • Cyber threat intelligence and cyber incident responses
  • Anonymous and privacy-aware communications (e.g., Tor, darknet)
  • Internet censorship and circumvention
  • Secure communication and networking applications (e.g., industry 4.0, energy, transportation, smart cities)
  • Quantum key distribution and other quantum-based secure communications
  • Visualization of secure communications and networking
  • Privacy-preserving computing in secure communication and networking (e.g., privacy-preserving machine learning)
  • The resilience of computer networks and critical infrastructures
  • Web and mobile security and privacy
  • Defending false information online (e.g., mis-, dis- and mal-information)
  • Socio-technical aspects of secure communications and networking (e.g., usability, human behaviors, legal issues, cybercrime, economics)
  • Security and privacy of contact tracing and other COVID-19 related digital interventions with a core element on telecommunications or networking

Important Dates

  • Full Paper Submission Deadline: 15th March, 2026
  • Notification Deadline: 1st May, 2026
  • Camera-Ready Deadline: 1st June, 2026

Submission Guidelines

  • Papers must be written in English.
  • Single-Blind Review.
  • Previously published work may not be submitted.
  • The paper submissions must follow the Springer formatting guidelines.
  • Authors are required to adhere to the Publication Ethics and Malpractice Statement.
  • Submission closes at 23:59 UTC (Coordinated Universal Time) on the day of the Submission Deadline.

How to Submit

  1. Go to Confy+ website.
  2. Log in or sign up as a new user.
  3. Select your desired track.
  4. Click the ‘Submit Paper’ link within the track and follow the instructions.

Paper Length

  • Full/Regular papers: up to 12-20 pages in length (excluding appendices, references, appreciation)
  • Short papers: 6-11 pages in length (excluding appendices, references, appreciation)

Formatting

Publication

All registered and presented papers will be submitted for publishing by Springer – LNICST series and made available through SpringerLink Digital Library.

Journal Opportunities

Authors of selected papers will be invited to submit an extended version to:

  • Wireless Networks (WINET) Journal [IF: 2.1 (2024)]

All accepted authors are eligible to submit an extended version in a fast track of:

  • EAI Endorsed Transactions on Scalable Information Systems (ESCI-WoS, Compendex)
  • EAI Endorsed Transactions on Security and Safety

There's an option for conference authors to publish their articles in the EAI Endorsed Transactions journal (Scopus, Ei-indexed, ESCI-WoS, Compendex) by paying an additional $250, discounted from the standard $400 rate.

Contact

For any inquiries, please refer to the contact information on the conference website.

تاریخ‌های مهم

تاریخ‌های کنفرانس

Conference Date

۲ شهریور ۱۴۰۵۴ شهریور ۱۴۰۵

قبلاً:
  • ۱۳ تیر ۱۴۰۴ - ۱۵ تیر ۱۴۰۴

ارسال مقاله

Full Paper Submission deadline

۲۴ اسفند ۱۴۰۴

اعلان

Notification deadline

۱۱ اردیبهشت ۱۴۰۵

نسخه نهایی

Camera-ready deadline

۱۱ خرداد ۱۴۰۵

رتبه منبع

منبع: CORE2023

رتبه: C

حوزه پژوهشی: Cybersecurity and privacy

نقشه

Loading feedback section...