Workshop on System and Network Security (SNS'19)
Papers Due | October 20, 2019 |
Acceptance Notification | October 31, 2019 |
Final paper Deadline | November 25, 2019 |
The main goal of Workshop on System and Network Security (SNS'19) is to bring together researchers and practitioners in an attempt to identify the fundamental security challenges and future prospects in the system and network security areas. Technical papers describing original, previously unpublished research, not currently under review, are solicited. The manuscripts should be submitted in PDF format. Authors should submit their papers online via EDAS. Unregistered authors should first create an account on EDAS to log on.
Recommended topics include, but are not limited to, the following:
- Access Control Mechanisms
- Anonymity and Privacy Technologies
- Attack Data Acquisition and Network Monitoring
- Blockchain Technology and Cybersecurity
- Cognitive Security
- Combating Cyber-Crime
- Cyber Warfare and Physical Security
- Database and System Security
- Demilitarization Zone (DMZ)
- Disaster Recovery Plan
- Enterprise Wireless Security
- Forensics of Network and Distributed Systems
- Game-Theoretic Security Technologies
- Hardware-Based Attacks
- Industrial Control System Information Security
- Insider Threats and Countermeasures
- Internet Security: Protocols, Standards and Measurements
- Intrusion Detection, Prevention, and Response
- Malware Detection and Mitigation
- Network Security Policies: Implementation Deployment, Management
- Physical-Layer and Cross-Layer Security Technologies
- Public Key Infrastructures, Key Management, Certification, and Revocation
- Secure Operating Systems
- Secure Routing and Network Management
- Securing Storage
- Security in Cellular and Content-Delivery Networks
- Security in Fog/Edge Computing
- Security in High Speed Network
- Security in Internet of Things
- Security in Optical Systems and Networks
- Security in Peer-To-Peer and Overlay Networks
- Security Metrics and Models
- Security of Virtual Machines
- Software-Based Attacks
- System Security for Wired and Wireless Networks
- Virtual Firewalls
- Web Security, Web Services and Enterprise Security
Submission Instructions
Authors should submit their papers online. We use EDAS system for managing submissions and review process. Unregistered authors should first create an account on EDAS to log on. Detailed usage instruction on EDAS can be found here.
Submissions must be in Portable Document Format (.pdf). The list of authors should not be included in the paper manuscript PDF, in accordance to the double blind submission policy. Changes to the paper metadata on EDAS are permitted before the paper submission deadline.
All submissions should be written in English with a maximum paper length of FIFTEEN (15 pages). However extra page charges will be applicable for papers exceeding 12 pages. Authors should pay special attention to unusual fonts, images, and figures that might create problems for reviewers.
SSCC'19 accepts regular and work-in-progress papers. Regular papers should present novel perspectives within the general scope of the conference. Short papers (Work-in-Progress) are an opportunity to present preliminary or interim results.
Manuscript Template - Word Latex
Further formatting instructions are posted at http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0
Double Blind Submissions
All submitted papers will be judged based on their originality, technical and/or research content/depth, correctness, relevance to conference, contributions, and readability through double-blind reviewing, where the identities of the authors are withheld from the reviewers. As an author, you are required to preserve the anonymity of your submission, while at the same time allowing the reader to fully grasp the context of related past work, including your own. Common sense and careful writing will go a long way towards preserving anonymity. Papers that do not conform with our double-blind submission policies will be rejected without review.
Minimally, please take the following steps when preparing your submission:
- Remove the names and affiliations of authors from the title page.
- Remove acknowledgments of identifying names and funding sources.
- Remove project titles or names that can be used to trace back to the authors via a web search engine.
- Use care in referring to related work, particularly your own. Do not omit references to provide anonymity, as this leaves the reviewer unable to grasp the context. Instead, reference your past work in the third person, just as you would any other piece of related work by another author. For example, instead of "In prior work [3], we presented a routing protocol that ...," sentences in the spirit of "In prior work, Smith and Clark [3] presented a routing protocol that ..." should be used. With this method, the full citation to Smith and Clark can still be given, such as "[3] J. Smith, A. Clark, "Analysis of...", and it is not acceptable to say "[3] Reference deleted for double-blind review."
- Papers with the same title and abstract should not be posted on a public website, such as arxiv.org, or transmitted via public mailing lists.
The organizers regard plagiarism as a serious professional misconduct. All submissions will be screened for plagiarism and when identified, the submissions by the same author will be rejected.
Submitted papers will undergo a peer review process, coordinated by the Program Committee. Each manuscript will be reviewed by a minimum of three reviewers. Acceptance of papers will be communicated to authors by email. The accepted regular and work-in-progress papers will be published in the conference proceedings. All accepted papers will be published by Springer in Communications in Computer and Information Science Series(CCIS), ISSN: 1865:0929. The proceedings will be available via the SpringerLink digital library.
To be published in the SSCC'19 Conference Proceedings, an author of an accepted paper is required to register for the conference at the full rate. Both regular and work-in-progress papers will be scheduled for oral presentation.
Technical Program Committee
Rui Zhang, University of Delaware, USA
Martin Hell, Lund University, Sweden
Li Xu, Fujian Normal University, P.R. China
Aneel Rahim, Dublin Institute of Technology, Ireland
Salman Abdul Moiz, University of Hyderabad, Hyderabad, India
Phan Cong-Vinh, NTT University, Vietnam