===========================================================


*EAI SecureComm 2022: CALL FOR PAPERS* 

The 18th EAI International Conference on 
Security and Privacy in Communication Networks
October 17-19, 2022
Kansas City, Kansas, USA
https://securecomm.eai-conferences.org/2022/call-for-papers/


===========================================================
Scope

SecureComm is a conference in EAI core conference portfolio focusing
on cybersecurity. The aim of SecureComm is to bring together
researchers and practitioners in academic, industry, and government in
security, networking, communication and other related communities to
explore important research directions in the field. The 18th
SecureComm conference seeks submissions of high-quality research
contributions. Topics of interest encompass ALL areas of secure
communications and networking. Topics in less related areas will be
considered if a clear connection to secure communication and
networking is demonstrated. Topics addressing interdisciplinary
challenges in different application domains are welcome.

EAI SecureComm 2022 will be held as an on-site conference and if
needed, Accepted Authors who are unable to attend the event in person
will be given an option to present remotely.

---------------------------------------------------------
Topics

Topics of interest include, but are not limited to the following:

Security and privacy in computer networks (e.g., wired, wireless,
mobile, hybrid, sensor, vehicular, satellite, 5G, 6G, ad hoc,
peer-to-peer, and software-defined networks)

Security and privacy in systems with a strong secure communication and
networking element (e.g., security in cloud, IoT, cyber-physical
systems, edge and fog computing, and teleconferencing)

Physical layer security (e.g., jamming, GPS spoofing)

Web and mobile security and privacy

Security protocols at all network layers and for different
applications (e.g., for secure routing, naming/addressing, network
management, remote authentication and attestation)

Network attacks (e.g., DDoS, MitM, malware, botnets, side-channel
attacks, phishing/pharming, cybersquatting) and defenses (e.g.,
network intrusion detection and prevention, firewalls, packet filters,
moving target defence)

Network, internet and cloud forensics

Cybercrime investigation and attribution

Cyber threat intelligence and cyber incident responses

Anonymous and privacy-aware communications (e.g., Tor, darknet)

Internet censorship and circumvention

Secure communication and networking applications (e.g., industry 4.0,
energy, transportation, smart cities)

Quantum key distribution and other quantum-based secure communications

Visualization of secure communications and networking

Privacy-preserving computing in secure communication and networking
(e.g., privacy-preserving machine learning)

Distributed ledger technologies (e.g., blockchain and cryptocurrencies)

Resilience of computer networks and critical infrastructures

Defending false information online (e.g., mis-, dis- and mal-information)

Socio-technical aspects of secure communications and networking (e.g.,
usability, human behaviours, legal issues, cybercrime, economics)

Security and privacy of contact tracing and other COVID-19 related
digital interventions with a core element on telecommunications or
networking


---------------------------------------------------------
Publication

All registered papers will be submitted for publishing by Springer and
made available through SpringerLink Digital Library: SecureComm
Conference Proceedings.

SecureComm proceedings are indexed in leading indexing services, such
as Web of Science, Compendex, Scopus, DBLP, EU Digital Library, Google
Scholar, IO-Port, MathSciNet, Inspec, and Zentralblatt MATH.

Authors of selected papers will be invited to submit an extended
version to: Springer Wireless Networks Journal (WINET) [IF: 2.602
(2020)]

All accepted authors are eligible to submit an extended version in a
fast track of:

EAI Endorsed Transactions on Industrial Networks and Intelligent
Systems (Open Access) – recently accepted for inclusion in Scopus
EAI Endorsed Transactions on Security and Safety (Open Access)


Additional publication opportunities:
EAI/Springer Innovations in Communications and Computing Book Series
(titles in this series are indexed in Ei Compendex, Web of Science & Scopus)


---------------------------------------------------------
Paper submission

Papers should be submitted through EAI 'Confy+' system, and have to
comply with the Springer format (see Author's kit section
via https://securecomm.eai-conferences.org/2022/submission/

All conference papers undergo a thorough peer review process prior to
the final decision and publication. This process is facilitated by
experts in the Technical Program Committee during a dedicated
conference period. Standard peer review is enhanced by EAI Community
Review which allows EAI members to bid to review specific papers. All
review assignments are ultimately decided by the responsible Technical
Program Committee Members while the Technical Program Committee Chair
is responsible for the final acceptance selection. You can learn more
about Community Review here.

---------------------------------------------------------
Important dates
Full Paper Submission deadline
3 April 2022
Notification deadline
19 June 2022
Camera-ready deadline
7 August 2022
Start of Conference
17 October 2022
End of Conference
19 October 2022

===========================================================

*EAI SecureComm 2022: CALL FOR WORKSHOP PROPOSALS* 

The 18th EAI International Conference on Security and Privacy in
Communication Networks

https://securecomm.eai-conferences.org/2022/call-workshop-proposals/

===========================================================

The Conference Organizing Committee invites submissions from
individuals or groups to organise Workshops at the SecureComm 2022.

Proposals are solicited for one-day or half-day workshops to be held
as part of the SecureComm 2022 conference (October 17-19,
2022). Workshops bridging security and communications, or presenting
new perspectives in security areas are particularly welcome. A full
list of current topics of interest can be found in the SecureComm Call
For Papers
(https://securecomm.eai-conferences.org/2022/call-for-papers/).

SecureComm workshops provide a platform for presenting novel ideas in
a less formal environment than the main conference itself. The
submission format of each workshop will be determined by the workshop
organizers.

Accepted workshop papers will be published in the SecureComm workshop
proceedings by Springer, together with the main SecureComm
proceedings. Thus, the timeline to print proceedings are planned
according to the SecureComm proceedings schedule.

---------------------------------------------------------


Deadline for Workshop Proposals

Proposals Due: May 15, 2022
Notification of Workshop Proposal Acceptance: May 30, 2022

The dates for papers due, notification of acceptance, and camera ready
will be determined by the workshop organizers and may change.

Individual Workshop Papers Due: June 15, 2022
Notification of Acceptance: July 30, 2022
Camera Ready: August 7, 2022

---------------------------------------------------------

Proposal content

* Workshop title

* Abstract (less than 200 words)

* Name, affiliation, and e-mail address for each organizer along with
  the specification of the primary contact person(s)

* Background and Motivation: What is the overall topic of the
  workshop? Why is this topic of particular interest at this time? If
  the workshop has been organized in the past at SecureComm or other
  conferences, please give details of previous instances (venue, URL)
  and describe why it should be held again and how it will extend and
  build upon previous ones.

* Topics and scope: These should be within or close to the scope
  covered by the main conference, as mentioned above.

* Format: Give a description of the proposed workshop format,
  including the target number of participants, planned activities
  (such as introductions, invited talks, breakout group activities,
  general discussion), as well as how these activities address the
  workshop objectives.

* Soliciting Submissions: Indicate how you plan to attract submissions
  and/or participants. Tactics may include circulating a call to
  relevant mailing lists (indicate these please as well), publicizing
  your workshop at other relevant venues, and more.

* Selecting Participants: Indicate how you plan to select participants
  and contributions to the workshop. Indicate a program committee to
  help with the organization/review process.

* Organizers: Give short descriptions of each of the
  organizers?background and interests related to security and privacy
  in communication networks and the specific workshop topic.

---------------------------------------------------------

Workshop selection

We aim to select a diverse set of workshops and avoid having multiple
workshops on overlapping themes. Organizers of the selected workshops
will be asked to produce a Call for Papers to describe the workshop to
potential participants and solicit submissions. In order to promote
vivid discussions with more participants to the workshops, EAI will
provide Workshop Organizers with one free registration to the Workshop
for each 10 papers submitted to their workshop.

The criteria for assessment will include:
- Relevance to conference vision/topics and attendees
- Potential to bring in participants to the conference from different audiences
- Overall quality of contribution
- Provides a hands-on, collaborative, and/or active learning
  environment for attendees

---------------------------------------------------------

Workshop publication

Accepted and presented papers will be published alongside the main
conference proceedings as a sub-section/chapter. Paper formats should,
therefore, correspond to the templates of the publisher of the main
conference.

Workshop chairs are invited to engage with the journals and further
publication opportunities.

---------------------------------------------------------

Proposal submission

Workshop proposals should be submitted in a maximum of 4 pages in PDF
format, single-spaced.

Please email your workshop proposals to Workshop chairs (Dr. Lannan
Lisa Luo and Dr. Fatih Turkmen) through the email address:
(securecomm22@gmail.com).