Conference Information
CNS 2017 : IEEE Conference on Communications and Network Security
Submission Date:
2017-04-28 Extended
Notification Date:
Conference Date:
Las Vegas, Nevada, USA
Viewed: 2806   Tracked: 4   Attend: 0

Conference Location
Call For Papers
IEEE Conference on Communications and Network Security (CNS) provides an outstanding forum for cyber security researchers, practitioners, policy makers, and users to exchange ideas, techniques and tools, raise awareness, and share experience related to all practical and theoretical aspects of communications and network security. 

Particular topics of interest include, but are not limited to:

    Anonymization and privacy in communication systems
    Biometric authentication and identity management
    Computer and network forensics
    Data and application security
    Data protection and integrity
    Availability of communications, survivability of networks in the presence of attacks
    Key management and PKI for networks
    Information-theoretic security
    Intrusion detection and prevention
    Location privacy
    Mobile security
    Outsourcing of network and data communication services
    Physical layer security methods, cross-layer methods for enhancing security
    Secure routing, network management
    Security for critical infrastructures
    Security metrics and performance evaluation
    Security and privacy for big data
    Security and privacy in body area networks
    Security and privacy in content delivery network
    Security and privacy in cloud computing and federated cloud
    Security and privacy in crowdsourcing
    Security and privacy in the Internet of Things
    Security and privacy in multi-hop wireless networks: ad hoc, mesh, sensor, vehicular and RFID networks
    Security and privacy in peer-to-peer networks and overlay networks
    Security and privacy in single-hop wireless networks: Wi-Fi, Wi-Max
    Security and privacy in smart grid, cognitive radio networks, and disruption/delay tolerant networks
    Security and privacy in social networks
    Security and privacy in pervasive and ubiquitous computing
    Social, economic, and policy issues of trust, security, and privacy
    Traffic analysis
    Usable security for networked computer systems
    Vulnerability, exploitation tools, malware, botnet, DDoS attacks
    Web, e-commerce, m-commerce, and e-mail security

PLEASE NOTE: Accepted and presented technical papers will be published in the IEEE CNS 2017 Conference Proceedings and submitted to IEEE Xplore® as well as other Abstracting and Indexing (A&I) databases. See the website for author requirements of accepted authors.
Last updated by Dou Sun in 2017-04-16
Related Publications
Acceptance Ratio
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
cTAPIARichard Tapia Celebration of Diversity in Computing Conference  2016-09-14
ccb1MMMInternational Conference on MultiMedia Modeling2017-09-152017-11-032018-02-05
CSAIInternational Conference on Computer Science and Artificial Intelligence2016-08-082016-08-122016-08-13
CyberSafetyInternational Workshop on Computational Methods for CyberSafety2016-08-252016-09-102016-10-28
ICCARInternational Conference on Control, Automation and Robotics2016-02-052016-02-252016-04-28
ICC''International Conference on Internet of Things, Data and Cloud Computing2016-10-15 2017-03-22
b1Web3DInternational Symposium on Web3D Technology 2016-04-152016-05-102016-07-22
ccPCMPacific-Rim Conference on Multimedia2017-05-232017-07-012017-09-28
ICAICTAInternational Conference on Advanced Informatics: Concept Theory and Applications2017-07-012017-07-152017-08-16
ICQNMInternational Conference on Quantum, Nano and Micro Technologies 2013-05-172013-08-25
Related Journals
CCFFull NameImpact FactorPublisherISSN
IEEE Transactions on Sustainable Computing2.456IEEE1536-1233
IT Professional1.067IEEE1520-9202
Ocean Modelling3.337ELSEVIER1463-5003
Semiconductor Science and Technology2.098IOP Publishing0268-1242
bJournal of Computer Security IOS Press0926-227X
Journal of the Association for Information Science and Technology2.322John Wiley & Sons2330-1643
Swarm Intelligence and Numerical MethodsRational Publication0000-0000
IEEE Transactions on Services Computing2.365IEEE1939-1374
cIET Information Security0.862IET1751-8709
aIEEE Transactions on Information Forensics and Security1.826IEEE1556-6013