Call for Posters

Important Dates
  • 2‐page poster submissions due by: June 15, 2017 11:59pm EST
  • Notification of Acceptance: July 15, 2017
  • Final poster submissions due: July 25, 2017

Scope:
The IEEE Conference on Communications and Network Security (CNS) provides an outstanding forum for cybersecurity researchers, practitioners, policy makers, and users to exchange ideas, techniques and tools, raise awareness, and share experience related to all practical and theoretical aspects of communications and network security.
Building on the success of the past years’ conferences, IEEE CNS 2017 welcomes poster submissions to be presented during the conference. A poster submission should be a 2-page IEEE conference style, which summarizes the key merits of proposed ideas, presents initial results, and identifies challenges to develop a complete solution. Please include the words “IEEE CNS 17 Poster” under the title. Poster submissions will be evaluated by the Posters Session Committee based on the novelty and the potential to stimulate discussions and promote collaborations. Posters should be submitted via EDAS at http://edas.info/N23809. Please follow the same template for regular conference papers available on http://www.ieee-cns.org. Sample topics of interest include, but are not limited to:
  • Security architectures for emerging networks
  • Anonymization and privacy in communication systems
  • Biometric authentication and identity management
  • Computer and network forensics
  • Data and application security, and data protection, and integrity
  • Network resiliency and survivability in the presence of attacks
  • Key management and PKI for networks
  • Information-theoretic security
  • Intrusion detection and prevention techniques and architectures
  • Location privacy and mobile security
  • Outsourcing of network and data communication services
  • Physical layer security methods, cross-layer methods for enhancing security
  • Secure routing, network management and information sharing   
  • Security for critical cyber infrastructures, web, ecommerce, m-commerce, email, DNS, DHCP, etc.  
  • Security metrics and performance evaluation
  • Security and privacy in body area networks, cloud computing, and crowdsourcing.
  • Security and privacy for Internet of Things and Cyber-Physical Systems
  • Security and privacy in big data analytics, machine learning
  • Named data networking security
  • Security and privacy in multi-hop wireless networks: ad hoc, mesh, sensor, vehicular, and RFID networks
  • Security and privacy in peer-to-peer networks and overlay networks
  • Security and privacy in single-hop wireless networks: Wi-Fi, Wi-Max, cellular
  • Security and privacy in smart grid, cognitive radio networks, and disruption/delay tolerant networks
  • Security and privacy in social networks, pervasive and ubiquitous computing
  • Social, economic, and policy issues of trust, security, and privacy
  • Usable security for networked cyber physical systems
  • Vulnerability, exploitation tools, malware, botnet, DDoS attacks
The conference will arrange the poster session in a room where the posters can be displayed. An accepted poster must be presented by an author in the poster session to interested attendees. The accepted posters will appear in the conference proceedings and be submitted to IEEE Xplore. Each accepted poster requires an author to register for the conference at the appropriate rate based on the membership level. Each author registration can cover up to three posters or papers of the conference, but each poster must have a dedicated presenter at the session.

Also, a Best Poster Award will be given based on the poster's novelty and potentials in research. The quality of presentation and the interaction during the session will also be important criteria. The award will be announced in a plenary session of the main conference.

Poster Chairs:
  • Danda B. Rawat, Howard University, USA
  • Selcuk Uluagac, Florida International University, USA
(Click here to download CFPosters in PDF format)