ICICS 2022 Poster/Demo: The 24th International Conference on Information and Communications Security (Poster/Demo papers) |
Website | https://icics2022.cyber.kent.ac.uk/call_for_posters_demos.php |
Submission link | https://easychair.org/conferences/?conf=icics2022posterdemo |
Submission deadline | June 10, 2022 |
ICICS 2022 – Call for Posters and Demonstrations
Authors are invited to submit their "Already Published Research" contributions in the form of short "Extended Abstracts" that are going to be presented as posters or demonstrations (demos) at the conference.
"Poster" presentations are based on already published work with the aim of presenting to the conference attendees for additional visibility and collaboration.
"Demo" presentations can demonstrate an artifact that is based on, relevant to, or extension of already published work.
Submissions will go through a light review process to establish relevance to conference topics and interest to conference attendees. Accepted contributions will be presented at the conference in the posters and demos session, but will not be included in the formal conference proceedings. Please note that at least one author of each accepted contribution should register to the conference and present.
Submissions should be in English, as a PDF file with all fonts embedded, in the Springer LNCS format (details can be found at: http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0), typeset with 10pt font, and using reasonable spacing and margins. Papers should not exceed 2 pages in LNCS style including the bibliography. Please include "(Poster)" or "(Demo)" at the end of the title for your submission to indicate the type of presentation you would like to give in the session.
For “Poster” submissions, please include a brief summary of the already published work with a link/reference to the original publication. Alternatively, if you have a prepared poster, you can upload that as your submission – please still include a link/reference to the original publication.
For “Demo” submissions, please include a brief summary of the already published work with a link/reference to the original publication and explain how the artifact is relevant to or extends the work.
Awards
There will be two awards to be given as part of the posters and demos session: Best Poster award and Best Demo award.
Recipients of the awards will receive a certificate from the conference and a cash award sponsored by the Institute of Cyber Security for Society (iCSS), University of Kent.
How to Submit
Submissions will be handled on the EasyChair platform. Please submit your contribution via the following link: https://easychair.org/conferences/?conf=icics2022posterdemo
The deadline for submissions is June 10, 2022.
Notifications about acceptance will be sent on June 24, 2022.
Topics of Interest
Topics of particular interest include, but are not limited to:
Access control and authorization
AI-based security and privacy
Anonymity
Applied cryptography
Threat scenarios, attack models and security analysis
Attestation
Authentication
Biometrics security and privacy
Blockchain and cryptocurrencies
Cloud computing and virtualization security
Cybercrime and online harms
Cyber deception and fraud
Cyber incident response and recovery
Critical infrastructure protection
Cyber physical systems security
Cyber resilience
Cyber security education, games and awareness
Cyber threat intelligence
Data security and privacy
Digital forensics
Digital rights management
Digital watermarking
Distributed systems security
Economics of security and privacy
Edge and fog computing security
Embedded systems security
Emergency response and recovery
Hardware security
Identity management
Information security management
Internet censorship and defence
Intrusion detection and prevention
Malware and unwanted software
Misinformation, disinformation and fake news
Mobile security and privacy
Online safety and child protection
Online social media security, privacy and trust
Operating systems security
Network security
Privacy enhancing technologies and mechanisms
Security of communication protocols
Secure information flow
Security and privacy for (Industrial) Internet of Things
Security and privacy of AI (e.g., adversarial machine learning and federated learning)
Security and privacy metrics and policies
Security operations and incident management
Security visualization
Secure systems design and architectures
Side channel attacks
Software and application security
Steganography and steganalysis
Trusted computing
Trust management and reputation
Usable security and privacy
Web security and privacy