Conference Information
SecureComm 2024: International ICST Conference on Security and Privacy in Communication Networks
https://securecomm.eai-conferences.org/2024/
Submission Date:
2024-05-10
Notification Date:
2024-07-20
Conference Date:
2024-10-28
Location:
Dubai, UAE
Years:
20
CCF: c   CORE: b   QUALIS: b1   Viewed: 55775   Tracked: 186   Attend: 28

Call For Papers
We welcome contributions from the following fields:

    Security and privacy in computer networks (e.g., wired, wireless, mobile, hybrid, sensor, vehicular, satellite, 5G, 6G, ad hoc, peer-to-peer, and software-defined networks)
    Security and privacy in systems with strong secure communication and networking element (e.g., security in the cloud, IoT, cyber-physical systems, edge and fog computing, and teleconferencing)
    Security and privacy in Web3.0 and metaverse
    Distributed ledger technologies (e.g., blockchain, smart contracts, and cryptocurrencies) and decentralized applications (e.g., DeFi)
    Security protocols at all network layers and for different applications (e.g., for secure routing, naming/addressing, network management, remote authentication and attestation)
    Physical layer security (e.g., jamming, GPS spoofing)
    Network attacks (e.g., DDoS, MitM, malware, botnets, side-channel attacks, phishing/pharming, cybersquatting), defenses (e.g., network intrusion detection and prevention, firewalls, packet filters, moving target defence) and forensics
    Applications of cryptography (e.g., Analysis of deployed cryptography and cryptographic protocols, Cryptographic implementation analysis, New cryptographic protocols with real-world applications)
    Security analysis (e.g., Malware analysis, Automated security analysis of source code and binaries, Program analysis)
    Data-driven security and measurement studies (e.g., Measurements of fraud, malware or spam; Measurements of human behavior and security)
    Cybercrime investigation and attribution
    Cyber threat intelligence and cyber incident responses
    Anonymous and privacy-aware communications (e.g., Tor, darknet)
    Internet censorship and circumvention
    Secure communication and networking applications (e.g., industry 4.0, energy, transportation, smart cities)
    Quantum key distribution and other quantum-based secure communications
    Visualization of secure communications and networking
    Privacy-preserving computing in secure communication and networking (e.g., privacy-preserving machine learning)
    The resilience of computer networks and critical infrastructures
    Web and mobile security and privacy
    Defending false information online (e.g., mis-, dis- and mal-information)
    Socio-technical aspects of secure communications and networking (e.g., usability, human behaviors, legal issues, cybercrime, economics)
Last updated by Dou Sun in 2024-03-14
Acceptance Ratio
YearSubmittedAcceptedAccepted(%)
20191493825.5%
20151083027.8%
2014982727.6%
2013702637.1%
2012732128.8%
2011953435.8%
20101122825%
2009751925.3%
20081242621%
20071193126.1%
20061263225.4%
20051443222.2%
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
DDDMBDInternational Conference on Database, Data Warehouse, Data Mining and Big Data2015-08-25 2015-09-10
SIMBADInternational Workshop on Similarity-Based Pattern Analysis and Recognition 2013-03-302013-07-03
GTEEInternational Conference on Green Technology and Energy Engineering2024-09-302024-10-052024-10-31
ICECEInternational Conference on Electrical and Control Engineering2015-03-312015-04-052015-04-18
cab1ICCCNInternational Conference on Computer Communications and Networks2025-02-132025-04-242025-08-04
ICMSTInternational Conference on Manufacturing Science and Technology2021-10-202021-10-252021-11-05
CECNetInternational Conference on Consumer Electronics, Communications and Networks2015-10-312015-11-102015-12-12
EDUTInternational Conference on Education & Technology2023-08-052023-08-102023-08-12
ACISAustralian Conference on Information Systems2018-08-062018-09-242018-12-03
DCITInternational Symposium on Dependable Computing and Internet of Things2015-07-152015-08-152015-11-16
Recommendation