TOPICS

The conference invites security-oriented contributions in information technologies, robotics, cognitive systems, biotechnologies, and nanotechnologies. Novel concepts related to hardware and software implementations are equally welcomed. Previous editions included papers in biometrics and forensics, personal mobile/ wireless security, robotic and unmanned vehicle system security, perimeter, border, and homeland security, Internet and cyber-security (i.e., detection and prevention of cyber-crimes and identity theft), security of critical infrastructure systems (e.g., financial, public utilities, transportation, etc.), emergency response systems (e.g., combining space-based systems with geographical information systems), and hybrid security systems. Papers on the security of emerging fields like the internet of things, pervasive computing and body wearable health devices can also be submitted.
Papers may present advances in the theory, design, implementation, analysis, verification, or empirical evaluation and measurement of secure systems. Topics of interest include but are not limited to:

Access control and authorization
Accountability
Anonymity
Application security
Attacks and defences
Authentication
Cloud security
Distributed systems security
Embedded systems security
Forensics
Hardware security
Intrusion detection and prevention
Malware and unwanted software
Mobile and Web security and privacy
Network and systems security
Privacy technologies and mechanisms
Simulation of security protocols
Security and privacy for the Internet of Things
Security and privacy metrics
Security and privacy policies
Security architectures
Usable security and privacy

SUBMISSION GUIDELINES

The conference is soliciting full length papers and workshop proposals on all the identified areas of research. Submissions should clearly establish the research contribution, its relevance, importance and novelty. Authors must follow the IEEE two column conference template and manuscripts should not exceed 6 pages (including references, figures, tables and text) in length. Please note that simultaneous submission of the paper to any other conference is not allowed.

THE SUBMISSION PROCESS

Paper submission will open at the end of February 2017. Please visit again for more details.
Once a paper is submitted to the online conference system it will undergo blind review by three peers. Following the review of submitted papers, successful authors will be invited to attend and present their work at EST 2017.


با جستجو در پایگاه داده‌های ویپاب، کنفرانس علمی مورد نظر خود را بیابید و یا به ثبت اطلاعات یک کنفرانس بپردازید.
 

This is an animated dialog which is useful for displaying information. The dialog window can be moved, resized and closed with the 'x' icon.

These items will be permanently deleted and cannot be recovered. Are you sure?