TOPICS
The conference invites security-oriented contributions in
information technologies, robotics, cognitive systems, biotechnologies,
and nanotechnologies. Novel concepts related to hardware and software
implementations are equally welcomed. Previous editions included papers
in biometrics and forensics, personal mobile/ wireless security, robotic
and unmanned vehicle system security, perimeter, border, and homeland
security, Internet and cyber-security (i.e., detection and prevention of
cyber-crimes and identity theft), security of critical infrastructure
systems (e.g., financial, public utilities, transportation, etc.),
emergency response systems (e.g., combining space-based systems with
geographical information systems), and hybrid security systems. Papers
on the security of emerging fields like the internet of things,
pervasive computing and body wearable health devices can also be
submitted.
Papers may present advances in the theory, design, implementation,
analysis, verification, or empirical evaluation and measurement of
secure systems. Topics of interest include but are not limited to:
Access control and authorization
Accountability
Anonymity
Application security
Attacks and defences
Authentication
Cloud security
Distributed systems security
Embedded systems security
Forensics
Hardware security
Intrusion detection and prevention
Malware and unwanted software
Mobile and Web security and privacy
Network and systems security
Privacy technologies and mechanisms
Simulation of security protocols
Security and privacy for the Internet of Things
Security and privacy metrics
Security and privacy policies
Security architectures
Usable security and privacy
SUBMISSION GUIDELINES
The conference is soliciting full length papers and workshop
proposals on all the identified areas of research. Submissions should
clearly establish the research contribution, its relevance, importance
and novelty. Authors must follow the IEEE two column conference template
and manuscripts should not exceed 6 pages (including references,
figures, tables and text) in length. Please note that simultaneous
submission of the paper to any other conference is not allowed.
THE SUBMISSION PROCESS
Paper submission will open at the end of February 2017. Please visit again for more details.
Once a paper is submitted to the online conference system it will
undergo blind review by three peers. Following the review of submitted
papers, successful authors will be invited to attend and present their
work at EST 2017.