Connectionists: CFP: Network Systems and Applications; Track within FedCSIS 2020; #49059; deadline July 3, 2020; online conference
Marcin Paprzycki
marcin at amu.edu.pl
Wed Jun 10 17:59:17 EDT 2020
CALL FOR PAPERS
**********************************************************************
Track 3: Network Systems and Applications
https://www.fedcsis.org/2020/nsa
Organized within the framework of the Federated Conference on Computer
Science and Information Systems (FedCSIS 2020)
(FedCSIS IEEE conference number: #49059)
Sofia, Bulgaria, 6-9 September, 2020
http://www.fedcsis.org/
************************* COVI-19 Information *************************
Taking into account lack of certainty that it will be possible to
organize the conference on-site (in Sofia) in September, we have decided
that there is no other way but to organize the conference
100% telepresence/video-based.
This decision makes us very sad, but we believe that this is the best
one we can make. This decision has consequences. First, the new
conference fee has been reduced to 150 euro (for each contributed and
accepted paper). Second, since we do not have to deal with local
arrangements, we can use the extra time and we have established the new
submission deadline. It is now July 3, 2020 for the regular papers. We
are looking forward to e-meet you.
FedCSIS organizers
************************************************************************
AIMS & SCOPE
Modern network systems encompass a wide range of solutions and
technologies, including wireless and wired networks, network systems,
services, and applications. This results in numerous active research
areas oriented towards various technical, scientific and social aspects
of network systems and applications. The primary objective of Network
Systems and Applications conference track is to group network-related
technical sessions and promote synergy between different fields of
network-related research.
This year, this track (Track #3) has three main technical sessions,
namely ANSA, IoT-ECAW’20, and NEMESIS'20. The ANSA technical session is
a wide umbrella that receives research on a broad scope of network
systems and technologies. The IoT-ECAW’20 workshop is dedicated to all
papers related to the Internet-of-Things (IoT) developments, challenges,
and applications. The NEMESIS’20 receives papers related to information
security, user privacy, and trust management from broad scope of domains
including networks, IoT, clouds, and in addition to conventional
cybersecurity applications. The three technical sessions aim to cover
all aspects related to network systems and networking technologies. As a
matter of arrangement, we encourage submitting papers to their
well-matched event. The track chairs are available via email to clarify
any confusion that might occur. For more details, see below and visit
WWW site of each Technical Session.
***
Advances in Network Systems and Applications (ANSA'20)
https://www.fedcsis.org/2020/ansa
The rapid development of computer networks including wired and wireless
networks observed today is very evolving, dynamic, and multidimensional.
On the one hand, network technologies are used in virtually several
areas that make human life easier and more comfortable. On the other
hand, the rapid need for network deployment brings new challenges in
network management and network design, which are reflected in hardware,
software, services, and security-related problems. Every day, a new
solution in the field of technology and applications of computer
networks is released. The ANSA technical session is devoted to
emphasizing up-to-date topics in networking systems and technologies by
covering problems and challenges related to the intensive
multidimensional network developments. This session covers not only the
technological side but also the societal and social impacts of network
developments. The session is inclusive and spans a wide spectrum of
networking-related topics.
The ANSA technical session is a great place to exchange ideas, conduct
discussions, introduce new ideas and integrate scientists,
practitioners, and scientific communities working in networking research
themes.
Topics:
The ANSA session is seeking original, relevant, and high-quality
research papers related, but not limited, to the following topics:
Networks architecture
Networks management
Quality-of-Service enhancement
Performance modeling and analysis
Fault-tolerant challenges and solutions
5G developments and applications
Traffic identification and classification
Switching and routing technologies
Protocols design and implementation
Wireless sensor networks
Future Internet architectures
Networked operating systems
Industrial networks deployment
Software-defined networks
Self-organizing and self-healing networks
Mulimedia in Computer Networks
Communication quality and reliability
Emerging aspects of networking systems
The session will also solicit papers about current implementation
efforts, research results, as well as position statements from industry
and academia regarding applications of networking technology.
***
Internet of Things - Enablers, Challenges and Applications (4rd Workshop
IoT-ECAW'20)
https://www.fedcsis.org/2020/iot-ecaw
The Internet of Things is a technology which is rapidly emerging the
world. IoT applications include: smart city initiatives, wearable
devices aimed to real-time health monitoring, smart homes and buildings,
smart vehicles, environment monitoring, intelligent border protection,
logistics support. The Internet of Things is a paradigm that assumes a
pervasive presence in the environment of many smart things, including
sensors, actuators, embedded systems and other similar devices.
Widespread connectivity, getting cheaper smart devices and a great
demand for data, testify to that the IoT will continue to grow by leaps
and bounds. The business models of various industries are being
redesigned on basis of the IoT paradigm. But the successful deployment
of the IoT is conditioned by the progress in solving many problems.
These issues are as the following:
The IoT technical session is seeking original, high quality research
papers related to such topics. The session will also solicit papers
about current implementation efforts, research results, as well as
position statements from industry and academia regarding applications of
IoT. The focus areas will be, but not limited to, the challenges on
networking and information management, security and ensuring privacy,
logistics, situation awareness, and medical care.
The integration of heterogeneous sensors and systems with different
technologies taking account environmental constraints, and data
confidentiality levels;
Big challenges on information management for the applications of IoT in
different fields (trustworthiness, provenance, privacy);
Security challenges related to co-existence and interconnection of many
IoT networks;
Challenges related to reliability and dependability, especially when the
IoT becomes the mission critical component;
Zero-configuration or other convenient approaches to simplify the
deployment and configuration of IoT and self-healing of IoT networks;
Knowledge discovery, especially semantic and syntactical discovering of
the information from data provided by IoT.
Topics:
The IoT session is seeking original, high quality research papers
related to following topics:
Future communication technologies (Future Internet; Wireless Sensor
Networks; Web-services, 5G, 4G, LTE, LTE-Advanced; WLAN, WPAN; Small
cell Networks…) for IoT,
Intelligent Internet Communication,
IoT Standards,
Networking Technologies for IoT,
Protocols and Algorithms for IoT,
Self-Organization and Self-Healing of IoT Networks,
Object Naming, Security and Privacy in the IoT Environment,
Security Issues of IoT,
Integration of Heterogeneous Networks, Sensors and Systems,
Context Modeling, Reasoning and Context-aware Computing,
Fault-Tolerant Networking for Content Dissemination,
IoT Architecture Design, Interoperability and Technologies,
Data or Power Management for IoT,
Fog - Cloud Interactions and Enabling Protocols,
Reliability and Dependability of mission critical IoT,
Unmanned-Aerial-Vehicles (UAV) Platforms, Swarms and Networking,
Data Analytics for IoT,
Artificial Intelligence and IoT,
Applications of IoT (Healthcare, Military, Logistics, Supply Chains,
Agriculture, ...),
E-commerce and IoT.
The session will also solicit papers about current implementation
efforts, research results, as well as position statements from industry
and academia regarding applications of IoT. Focus areas will be, but not
limited to above mentioned topics.
***
Cyber Security, Privacy and Trust (1st International Forum NEMESIS'20)
https://www.fedcsis.org/2020/nemesis
Nowadays, information security works as a backbone for protecting both
user data and electronic transactions. Protecting communications and
data infrastructures of an increasingly inter-connected world have
become vital nowadays. Security has emerged as an important scientific
discipline whose many multifaceted complexities deserve the attention
and synergy of computer science, engineering, and information systems
communities. Information security has some well-founded technical
research directions which encompass access level (user authentication
and authorization), protocol security, software security, and data
cryptography. Moreover, some other emerging topics related to
organizational security aspects have appeared beyond the long-standing
research directions.
The International Forum of Cyber Security, Privacy, and Trust
(NEMESIS’20) as a successor of International Conference on Cyber
Security, Privacy, and Trust (INSERT’19) focuses on the diversityof the
cyber information security developments and deployments in order to
highlight the most recent challenges and report the most recent
researches. The session is an umbrella for all cyber security technical
aspects, user privacy techniques, and trust. In addition, it goes beyond
the technicalities and covers some emerging topics like social and
organizational security research directions. NEMESIS’20 serves asa forum
of presentation of theoretical, applied research papers, case studies,
implementation experiences as well as work-in-progress results in cyber
security. NEMESIS’20 is intended to attract researchers and
practitioners from academia and industry and provides an international
discussion forum in order to share their experiences and their ideas
concerning emerging aspects in information security met in different
application domains. This opens doors for highlighting unknown research
directions and tackling modern research challenges. The objectives of
the NEMESIS’20 can be summarized as follows:
To review and conclude research findings in cyber security and other
security domains, focused on the protection of different kinds of assets
and processes, and to identify approaches that may be useful in the
application domains of information security.
To find synergy between different approaches, allowing elaborating
integrated security solutions, e.g. integrate different risk-based
management systems.
To exchange security-related knowledge and experience between experts to
improve existing methods and tools and adopt them to new application areas
Topics
Topics of interest include but are not limited to:
Biometric technologies
Cryptography and cryptanalysis
Critical infrastructure protection
Security of wireless sensor networks
Hardware-oriented information security
Organization- related information security
Social engineering and human aspects in cyber security
Individuals identification and privacy protection methods
Pedagogical approaches for information security education
Information security and business continuity management
Tools supporting security management and development
Decision support systems for information security
Trust in emerging technologies and applications
Digital right management and data protection
Threats and countermeasures for cybercrimes
Ethical challenges in user privacy and trust
Cyber and physical security infrastructures
Risk assessment and management
Steganography and watermarking
Digital forensics and crime science
Security knowledge management
Security of cyber-physical systems
Privacy enhancing technologies
Trust and reputation models
Misuse and intrusion detection
Data hide and watermarking
Cloud and big data security
Computer network security
Assurance methods
Security statistics
The session will also solicit papers about current implementation
efforts, research results, as well as position statements from industry
and academia regarding applications of networking technology.
PAPER SUBMISSION
* Authors should submit draft papers (as Postscript, PDF or MSWord file).
* The total length of a paper should not exceed 10 pages IEEE style
(including tables, figures and references).
* Papers will be refereed and accepted on the basis of their scientific
merit and relevance to the workshop.
* Preprints containing accepted papers will be published on a USB memory
stick provided to the FedCSIS participants.
* Only papers presented at the conference will be published in
Conference Proceedings and submitted for inclusion in the IEEE Xplore®
database.
* Conference proceedings will be published in a volume with ISBN, ISSN
and DOI numbers and posted at the conference WWW site.
* Conference proceedings will be indexed in BazEkon and submitted for
indexation in: Thomson Reuters - Conference Proceedings Citation Index,
SciVerse Scopus, Inspec, Index Copernicus, DBLP Computer Science
Bibliography and Google Scholar.
* Organizers reserve right to move accepted papers between FedCSIS events.
* For paper submission instructions, please visit:
https://www.fedcsis.org/2020/instructions
IMPORTANT DATES
+ Paper submission (strict deadline): July 3, 2020, 23:59:59 pm HST
(there will be no extension)
+ Position paper submission: July 17, 2020
+ Author notification: August 1, 2020
+ Final paper submission, registration and payment: August 14, 2020
+ Conference date: September 6-9, 2020
Track 3 Chairs:
Armando, Alessandro, University of Genova, Italy
Awad, Ali Ismail, Lulea University of Technology, Sweden
Furtak, Janusz, Military University of Technology, Poland
--
Ta wiadomość e-mail została sprawdzona pod kątem wirusów przez oprogramowanie AVG.
http://www.avg.com
More information about the Connectionists
mailing list