Conference Information
SecureComm 2024: International ICST Conference on Security and Privacy in Communication Networks
https://securecomm.eai-conferences.org/2024/Submission Date: |
2024-05-10 |
Notification Date: |
2024-07-20 |
Conference Date: |
2024-10-28 |
Location: |
Dubai, UAE |
Years: |
20 |
CCF: c CORE: b QUALIS: b1 Viewed: 54178 Tracked: 186 Attend: 28
Call For Papers
We welcome contributions from the following fields: Security and privacy in computer networks (e.g., wired, wireless, mobile, hybrid, sensor, vehicular, satellite, 5G, 6G, ad hoc, peer-to-peer, and software-defined networks) Security and privacy in systems with strong secure communication and networking element (e.g., security in the cloud, IoT, cyber-physical systems, edge and fog computing, and teleconferencing) Security and privacy in Web3.0 and metaverse Distributed ledger technologies (e.g., blockchain, smart contracts, and cryptocurrencies) and decentralized applications (e.g., DeFi) Security protocols at all network layers and for different applications (e.g., for secure routing, naming/addressing, network management, remote authentication and attestation) Physical layer security (e.g., jamming, GPS spoofing) Network attacks (e.g., DDoS, MitM, malware, botnets, side-channel attacks, phishing/pharming, cybersquatting), defenses (e.g., network intrusion detection and prevention, firewalls, packet filters, moving target defence) and forensics Applications of cryptography (e.g., Analysis of deployed cryptography and cryptographic protocols, Cryptographic implementation analysis, New cryptographic protocols with real-world applications) Security analysis (e.g., Malware analysis, Automated security analysis of source code and binaries, Program analysis) Data-driven security and measurement studies (e.g., Measurements of fraud, malware or spam; Measurements of human behavior and security) Cybercrime investigation and attribution Cyber threat intelligence and cyber incident responses Anonymous and privacy-aware communications (e.g., Tor, darknet) Internet censorship and circumvention Secure communication and networking applications (e.g., industry 4.0, energy, transportation, smart cities) Quantum key distribution and other quantum-based secure communications Visualization of secure communications and networking Privacy-preserving computing in secure communication and networking (e.g., privacy-preserving machine learning) The resilience of computer networks and critical infrastructures Web and mobile security and privacy Defending false information online (e.g., mis-, dis- and mal-information) Socio-technical aspects of secure communications and networking (e.g., usability, human behaviors, legal issues, cybercrime, economics)
Last updated by Dou Sun in 2024-03-14
Acceptance Ratio
Year | Submitted | Accepted | Accepted(%) |
---|---|---|---|
2019 | 149 | 38 | 25.5% |
2015 | 108 | 30 | 27.8% |
2014 | 98 | 27 | 27.6% |
2013 | 70 | 26 | 37.1% |
2012 | 73 | 21 | 28.8% |
2011 | 95 | 34 | 35.8% |
2010 | 112 | 28 | 25% |
2009 | 75 | 19 | 25.3% |
2008 | 124 | 26 | 21% |
2007 | 119 | 31 | 26.1% |
2006 | 126 | 32 | 25.4% |
2005 | 144 | 32 | 22.2% |
Related Conferences
Short | Full Name | Submission | Conference |
---|---|---|---|
DDDMBD | International Conference on Database, Data Warehouse, Data Mining and Big Data | 2015-08-25 | 2015-09-10 |
SIMBAD | International Workshop on Similarity-Based Pattern Analysis and Recognition | 2013-07-03 | |
GTEE | International Conference on Green Technology and Energy Engineering | 2024-09-30 | 2024-10-31 |
ICECE | International Conference on Electrical and Control Engineering | 2015-03-31 | 2015-04-18 |
ICCCN | International Conference on Computer Communications and Networks | 2025-02-13 | 2025-08-04 |
ICMST | International Conference on Manufacturing Science and Technology | 2021-10-20 | 2021-11-05 |
CECNet | International Conference on Consumer Electronics, Communications and Networks | 2015-10-31 | 2015-12-12 |
EDUT | International Conference on Education & Technology | 2023-08-05 | 2023-08-12 |
ACIS | Australian Conference on Information Systems | 2018-08-06 | 2018-12-03 |
DCIT | International Symposium on Dependable Computing and Internet of Things | 2015-07-15 | 2015-11-16 |
Related Journals
CCF | Full Name | Impact Factor | Publisher | ISSN |
---|---|---|---|---|
International Journal of Security, Privacy and Trust Management | AIRCC | 2319-4103 | ||
Annals of Operations Research | 4.400 | Springer | 0254-5330 | |
Modeling, Identification and Control | The Research Council of Norway | 0332-7353 | ||
Journal of Molecular Graphics and Modelling | 2.700 | Elsevier | 1093-3263 | |
Combinatorica | 1.000 | Springer | 0209-9683 | |
International Journal of Computer Networks & Communications | AIRCC | 0975-2293 | ||
c | IEEE Geoscience and Remote Sensing Letters | 4.000 | IEEE | 1545-598X |
Simulation Modelling Practice and Theory | 3.500 | Elsevier | 1569-190X | |
IEEE Transactions on Signal Processing | 4.600 | IEEE | 1053-587X | |
International Journal of Computational Geometry and Applications | World Scientific | 0218-1959 |
Full Name | Impact Factor | Publisher |
---|---|---|
International Journal of Security, Privacy and Trust Management | AIRCC | |
Annals of Operations Research | 4.400 | Springer |
Modeling, Identification and Control | The Research Council of Norway | |
Journal of Molecular Graphics and Modelling | 2.700 | Elsevier |
Combinatorica | 1.000 | Springer |
International Journal of Computer Networks & Communications | AIRCC | |
IEEE Geoscience and Remote Sensing Letters | 4.000 | IEEE |
Simulation Modelling Practice and Theory | 3.500 | Elsevier |
IEEE Transactions on Signal Processing | 4.600 | IEEE |
International Journal of Computational Geometry and Applications | World Scientific |
Recommendation