Información de la conferencia
SecureComm 2024: International ICST Conference on Security and Privacy in Communication Networks
https://securecomm.eai-conferences.org/2024/Día de Entrega: |
2024-05-10 |
Fecha de Notificación: |
2024-07-20 |
Fecha de Conferencia: |
2024-10-28 |
Ubicación: |
Dubai, UAE |
Años: |
20 |
CCF: c CORE: b QUALIS: b1 Vistas: 54570 Seguidores: 186 Asistentes: 28
Solicitud de Artículos
We welcome contributions from the following fields: Security and privacy in computer networks (e.g., wired, wireless, mobile, hybrid, sensor, vehicular, satellite, 5G, 6G, ad hoc, peer-to-peer, and software-defined networks) Security and privacy in systems with strong secure communication and networking element (e.g., security in the cloud, IoT, cyber-physical systems, edge and fog computing, and teleconferencing) Security and privacy in Web3.0 and metaverse Distributed ledger technologies (e.g., blockchain, smart contracts, and cryptocurrencies) and decentralized applications (e.g., DeFi) Security protocols at all network layers and for different applications (e.g., for secure routing, naming/addressing, network management, remote authentication and attestation) Physical layer security (e.g., jamming, GPS spoofing) Network attacks (e.g., DDoS, MitM, malware, botnets, side-channel attacks, phishing/pharming, cybersquatting), defenses (e.g., network intrusion detection and prevention, firewalls, packet filters, moving target defence) and forensics Applications of cryptography (e.g., Analysis of deployed cryptography and cryptographic protocols, Cryptographic implementation analysis, New cryptographic protocols with real-world applications) Security analysis (e.g., Malware analysis, Automated security analysis of source code and binaries, Program analysis) Data-driven security and measurement studies (e.g., Measurements of fraud, malware or spam; Measurements of human behavior and security) Cybercrime investigation and attribution Cyber threat intelligence and cyber incident responses Anonymous and privacy-aware communications (e.g., Tor, darknet) Internet censorship and circumvention Secure communication and networking applications (e.g., industry 4.0, energy, transportation, smart cities) Quantum key distribution and other quantum-based secure communications Visualization of secure communications and networking Privacy-preserving computing in secure communication and networking (e.g., privacy-preserving machine learning) The resilience of computer networks and critical infrastructures Web and mobile security and privacy Defending false information online (e.g., mis-, dis- and mal-information) Socio-technical aspects of secure communications and networking (e.g., usability, human behaviors, legal issues, cybercrime, economics)
Última Actualización Por Dou Sun en 2024-03-14
Coeficiente de Aceptación
Año | Enviados | Aceptados | Aceptados(%) |
---|---|---|---|
2019 | 149 | 38 | 25.5% |
2015 | 108 | 30 | 27.8% |
2014 | 98 | 27 | 27.6% |
2013 | 70 | 26 | 37.1% |
2012 | 73 | 21 | 28.8% |
2011 | 95 | 34 | 35.8% |
2010 | 112 | 28 | 25% |
2009 | 75 | 19 | 25.3% |
2008 | 124 | 26 | 21% |
2007 | 119 | 31 | 26.1% |
2006 | 126 | 32 | 25.4% |
2005 | 144 | 32 | 22.2% |
Conferencias Relacionadas
Abreviación | Nombre Completo | Entrega | Conferencia |
---|---|---|---|
DDDMBD | International Conference on Database, Data Warehouse, Data Mining and Big Data | 2015-08-25 | 2015-09-10 |
SIMBAD | International Workshop on Similarity-Based Pattern Analysis and Recognition | 2013-07-03 | |
GTEE | International Conference on Green Technology and Energy Engineering | 2024-09-30 | 2024-10-31 |
ICECE | International Conference on Electrical and Control Engineering | 2015-03-31 | 2015-04-18 |
ICCCN | International Conference on Computer Communications and Networks | 2025-02-13 | 2025-08-04 |
ICMST | International Conference on Manufacturing Science and Technology | 2021-10-20 | 2021-11-05 |
CECNet | International Conference on Consumer Electronics, Communications and Networks | 2015-10-31 | 2015-12-12 |
EDUT | International Conference on Education & Technology | 2023-08-05 | 2023-08-12 |
ACIS | Australian Conference on Information Systems | 2018-08-06 | 2018-12-03 |
DCIT | International Symposium on Dependable Computing and Internet of Things | 2015-07-15 | 2015-11-16 |
Revistas Relacionadas
CCF | Nombre Completo | Factor de Impacto | Editor | ISSN |
---|---|---|---|---|
International Journal of Security, Privacy and Trust Management | AIRCC | 2319-4103 | ||
Annals of Operations Research | 4.400 | Springer | 0254-5330 | |
Modeling, Identification and Control | The Research Council of Norway | 0332-7353 | ||
Journal of Molecular Graphics and Modelling | 2.700 | Elsevier | 1093-3263 | |
Combinatorica | 1.000 | Springer | 0209-9683 | |
International Journal of Computer Networks & Communications | AIRCC | 0975-2293 | ||
c | IEEE Geoscience and Remote Sensing Letters | 4.000 | IEEE | 1545-598X |
Simulation Modelling Practice and Theory | 3.500 | Elsevier | 1569-190X | |
IEEE Transactions on Signal Processing | 4.600 | IEEE | 1053-587X | |
International Journal of Computational Geometry and Applications | World Scientific | 0218-1959 |
Nombre Completo | Factor de Impacto | Editor |
---|---|---|
International Journal of Security, Privacy and Trust Management | AIRCC | |
Annals of Operations Research | 4.400 | Springer |
Modeling, Identification and Control | The Research Council of Norway | |
Journal of Molecular Graphics and Modelling | 2.700 | Elsevier |
Combinatorica | 1.000 | Springer |
International Journal of Computer Networks & Communications | AIRCC | |
IEEE Geoscience and Remote Sensing Letters | 4.000 | IEEE |
Simulation Modelling Practice and Theory | 3.500 | Elsevier |
IEEE Transactions on Signal Processing | 4.600 | IEEE |
International Journal of Computational Geometry and Applications | World Scientific |
Recomendaciones