IEEE-CNS 2014: IEEE Conference on Communications and Network Security 2014

October 29, 2014-October 31, 2014 in San Francisco, USA

Call for Papers

IEEE CNS 2014 — IEEE Conference on Communications and Network Security San Francisco, USA – October 29-31, 2014 ******************************************************************************

IEEE Conference on Communications and Network Security (CNS) is a new conference series in IEEE Communications Society (ComSoc) core conference portfolio and the only ComSoc conference focusing solely on cyber security. IEEE CNS is a spin-off of IEEE INFOCOM, the premier ComSoc conference on networking. The goal of CNS is to provide an outstanding forum for cyber security researchers, practitioners, policy makers, and users to exchange ideas, techniques and tools, raise awareness, and share experience related to all practical and theoretical aspects of communications and network security.

Building on the success of last year’s inaugural conference, IEEE CNS 2014 seeks original high-quality technical papers from academia, government, and industry. Topics of interest encompass all practical and theoretical aspects of communications and network security, all the way from the physical layer to the various network layers to the variety of applications reliant on a secure communication substrate. Submissions with main contribution in other areas, such as information security, software security, system security, or applied cryptography, will also be considered if a clear connection to secure communications/networking is demonstrated.

Particular topics of interest include, but are not limited to: - Security and privacy in the Internet - Security and privacy in peer-to-peer networks and overlay networks - Security and privacy in single-hop wireless networks: Wi-Fi, Wi-Max - Security and privacy in multihop wireless networks: ad hoc, mesh, sensor, vehicular and RFID networks - Security and privacy in social networks and cloud computing - Security and privacy in smart grid, cognitive radio networks, and disruption/delay tolerant networks - Information-theoretic security - Anonymization and privacy in communication systems - Traffic analysis, location privacy and obfuscation of mobile device information - Physical layer security methods: confidentiality and authentication - Secure routing, network management - Intrusion detection and prevention - Computer and network forensics - Vulnerability, exploitation tools, Malware, Botnet, DDoS attacks - Key management and PKI in the context of secure communications - Security metrics and performance evaluation, traffic analysis techniques - Web, e-commerce, m-commerce, and e-mail security Social, economic and policy issues of trust, security and privacy - Ensuring the availability of communications, survivability of networks in the presence of denial of service

IMPORTANT DATES Abstract Due: March 7, 2014 Paper Due: March 14, 2014 Notification: June 13, 2014 Final Paper: July 11, 2014

GENERAL CHAIRS Cliff Wang, Army Research Office Guoliang Xue, Arizona State University

TPC CHAIRS Yan Chen, Northwestern University Radha Poovendran, University of Washington

AREA CHAIRS Yong Guan, Iowa State University Amir Herzberg, Bar-Ilan University Loukas Lazos, University of Arizona Wenjing Lou, Virginia Tech Guevara Noubir, Northeastern University Pierangela Samarati, University of Milan Wade Trappe, Rutgers University Tilman Wolf, University of Massachusetts Ben Zhao, University of California at Santa Barbara

PATRON CHAIRS Wenjing Lou, Virginia Tech Moti Yung, Google

PANEL CHAIR Wade Trappe, Rutgers University

WORKSHOP CHAIRS Hasan Cam, Army Research Lab Yanchao Zhang, Arizona State University

POSTER CHAIR Yingfei Dong, University of Hawai

LOCAL ARRANGEMENT CHAIR Patrick Tague, Carnegie Mellon University

STUDENT TRAVEL GRANT CHAIR Yingying Chen, Stevens Institute of Technology

PUBLICITY CHAIRS Sara Foresti, University of Milan Wonjun Lee, Korea University Yi Qian, University of Nebraska

PUBLICATION CHAIR Ming Li, Utah State University

WEB CHAIR Dejun Yang, Colorado School of Mines

This call for papers and additional information about the conference can be found at