We accept files in .docx/.doc/.pdf/Latex Pdf format - as per the call for papers schedule.
Papers should be thoroughly checked and proofread before submission. After you have submitted your article you are unable to make any changes to it during the refereeing process—although if accepted, you will have a chance to make minor revisions after refereeing and before the final submission of your paper.
Paper content must be original and relevant to one of the many conference topics.
Authors are required to ensure accuracy of quotations, citations, diagrams, maps, and tables.
Figures and tables need to be placed where they are to appear in the text and must be clear and easy to view.
Papers must follow format according to the template which will be sent to accepted papers.
Anonymity and privacy technologies Biometric authentication and identity management Security and privacy of blockchain and its applications Censorship countermeasures and privacy Combating cyber-crime (anti-spam, anti-phishing anti-fraud techniques, etc.) Computer and network forensics Cyber deterrence strategies Data and application security Data protection and integrity Game-theoretic security technologies Implementation and evaluation of networked security systems Information-theoretic security Intrusion detection, prevention, and response Key management, public key infrastructures, certification revocation, authentication, and access control Malware detection, prevention, and mitigation Security metrics and models Physical-layer and cross-layer security technologies Security and privacy for big data and machine learning Security and privacy for data and network outsourcing Security and privacy for mobile and wearable devices Security and privacy in cellular networks Security and privacy in cloud and edge computing Internet Security: Protocols, standards, measurements Security and privacy in crowdsourcing Security and privacy in cyber-physical systems (CPS) Security and privacy in Internet of Things (IoT) Security and privacy in emerging wireless technologies and applications Security and privacy in peer-to-peer and overlay networks Security and privacy in WiFi, ad hoc, mesh, sensor, body-area, and disruption/delay tolerant systems Security and privacy in smart cities, smart and connected health, and other smart systems/buildings/offices Security for critical infrastructures (smart grids, transportation systems, etc.) Security for future Internet architectures and designs Security for software-defined and data center networks Security and privacy in connected/autonomous vehicles, UAVs/UAS, drones, etc. Security and privacy of social networks, metaverse/virtual/augmented reality-based networks/systems Social, economic, and policy issues of trust, security, and privacy Traffic analysis Usable security and privacy Web, e-commerce, m-commerce, and e-mail security