2nd Workshop on Security and Privacy in Systems and Communication Networks

(SecureSysComm 2016)

 


September 7-9, 2016, Ostrava, Czech Republic


In conjunction with the 8th International Conference on Intelligent Networking and Collaborative Systems (INCoS-2016)

 
 

Important Dates

Submission: June 1, 2016
Notification: June 7, 2016
Final version: June 10, 2016
Registration: June 10, 2016


PuBBlication

Proceedings of SecureSysComm-2016 workshop will be published by IEEE CPS.


The best papers will be considered for publication in a Special Issue of Journal of High Speed Networks.



Workshop Chairs



Program Committee

Aniello Castiglione: University of Salerno, Italy

Massimiliano Rak: Second University of Naples, Italy

Ilsun You: Korean Bible University, Korea

Ugo Fiore: University of Naples, Italy

Michał Choras: University of Science and Technology, Bydgoszcz, Poland

Salvatore Distefano: Politecnico di Milano, Italy

Sergio Ricciardi: Universitat Politecnica de Catalunya, Spain



CONTACTS

E-mail:massimo.ficcoATunina2.it

fpalmieriATunisa.it





 
 

Modern society witnesses a growing pervasiveness of sophisticated computer-based systems and increasingly performance communication networks, whose influence in daily life is huge. Complexity, heterogeneity, scale and interdependence shown by such systems are source of potential vulnerabilities and threats.

The Workshop seeks submissions from academia and industry presenting novel research on theoretical and practical aspects of data protection, privacy, security, and cryptography. Papers describing new methods or technologies, advanced prototypes, systems, tools and techniques and general survey papers indicating future directions are also encouraged.

The Workshop topics include (but are not limited to) the following:

  1. - Inspection and forensics technologies

  2. - Threat and vulnerability identification and modelling

  3. - Wireless communications security

  4. - Network-centric systems and dependability

  5. - Information security, encryption, privacy

  6. - Access control and identity management

  7. - Security and privacy protection mechanisms

  8. - Cyber-physical threats, vulnerability analysis, and countermeasures

  9. - Biometrics security and privacy

  10. - Critical infrastructure protection

  11. - Formal methods for security

  12. - Human factors and human behaviour recognition techniques

  13. - Identification, authentication and non-repudiation

  14. - Security and privacy in pervasive/ubiquitous computing

  15. - Security and privacy in smart grids

  16. - Security and privacy in social networks

  17. - Security and privacy in the cloud

  18. - SLA security in the cloud

  19. - Security weaknesses and protection of energy-control facilities

  20. - Energy consumption attacks

Aims, Scope and Topics

 
Â