{"id":28,"date":"2020-12-16T09:13:53","date_gmt":"2020-12-16T09:13:53","guid":{"rendered":"https:\/\/csnet-conference.org\/?page_id=28"},"modified":"2021-05-26T07:59:00","modified_gmt":"2021-05-26T07:59:00","slug":"call-for-papers","status":"publish","type":"page","link":"https:\/\/csnet-conference.org\/2021\/index.php\/call-for-papers\/","title":{"rendered":"Call for Papers"},"content":{"rendered":"\n<p><a href=\"https:\/\/csnet-conference.org\/2021\/wp-content\/uploads\/2021\/05\/CSNet-2021-CFP-Extended-1-2.pdf\"><strong>(Click here to download CFP in PDF format)<\/strong><\/a><\/p>\n\n\n\n<p>Cybersecurity is the set of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, security includes both cybersecurity and physical security.<br>After the first successful edition of CSNet 2017 in Rio de Janeiro (Brazil), the second edition CSNet 2018 in Paris (France), the third edition CSNet 2019 in Quito (Ecuador), CSNet 2020 in Lausanne (Switzerland) (Online),  the fifth edition of CSNet conference will be held in Abu Dhabi (United Arab Emirates) next October 12-14, 2021.<br>The driving theme at CSNet 2021 is&nbsp;<strong>Cyber<\/strong>&nbsp;<strong>Security in Networking<\/strong>. The technological disruption is generating an impact on society and leading to a new industrial revolution. This social and industrial change presents new technological environments constituted by ubiquitous systems and large amounts of information, which requires a change in the way how cybersecurity is applied. The use of big data, machine learning, data science, data mining, strengthens the cognitive skills of security analysts to face new forms of cybersecurity attacks. This new trend, called cognitive security, poses new challenges for researchers and companies to seek proactive security proposals according to this technological change.<\/p>\n\n\n\n<p>The CSNet 2021 conference program will be split into the following tracks:<\/p>\n\n\n\n<p><span class=\"has-inline-color has-vivid-cyan-blue-color\">Track 1: <\/span><strong>Cyber Security in Vehicular Networks<\/strong><br><span class=\"has-inline-color has-vivid-cyan-blue-color\">Track 2:<\/span> <strong>Cyber Security of Virtual infrastructures<\/strong><br><span class=\"has-inline-color has-vivid-cyan-blue-color\">Track 3:<\/span> <strong>Blockchain<\/strong><br><span class=\"has-inline-color has-vivid-cyan-blue-color\">Track 4:<\/span> <strong>Cyber Security of Critical Infrastructures<\/strong><br><span class=\"has-inline-color has-vivid-cyan-blue-color\">Track 5:<\/span> <strong>Network security<\/strong><br><span class=\"has-inline-color has-vivid-cyan-blue-color\">Track 6: <\/span><strong>Usability-Security track<\/strong><br><span class=\"has-inline-color has-vivid-cyan-blue-color\">Track 7:<\/span> <strong>Forensic track<\/strong><br><span class=\"has-inline-color has-vivid-cyan-blue-color\">Track 8:<\/span> <strong>Cyber Security for the Navy<\/strong><\/p>\n\n\n\n<p>Areas of interest include, but are not limited to:<\/p>\n\n\n\n<ul><li>Attacks on Virtualized Systems<\/li><li>Balancing Trust and Control<\/li><li>Blockchain technology and CyberSecurity<\/li><li>Cell Phones vulnerabilities<\/li><li>Cloud of Security<\/li><li>Cognitive Security<\/li><li>Concealing Malware (Trojan Horses-Root kits-Logic Bombs)<\/li><li>Cyber-attacks Cloud-oriented vs Cyber defense Cloud-oriented<\/li><li>Cybersecurity<\/li><li>Data Center Network Control, Security and Optimization<\/li><li>Demilitarization Zone (DMZ)<\/li><li>Designing a Security Policy<\/li><li>Disaster recovery plan<\/li><li>Enterprise Wireless Security<\/li><li>Hardware-Based Attacks<\/li><li>Host Network Intrusion Prevention Systems<\/li><li>Industrial control system information security<\/li><li>Infection Malware<\/li><li>Integrated Network Security Hardware<\/li><li>Internet Content Filters<\/li><li>Internet security issues<\/li><li>Network and operating system administration for security purposes<\/li><li>Network Attached Storage (NAS)<\/li><li>Network Intrusion Detection Systems (NIDS)<\/li><li>Network security design<\/li><li>Organizational Security Policies<\/li><li>Secure Network through Network Design<\/li><li>Security in Internet of Things<\/li><li>Security in Fog\/edge Computing<\/li><li>Security of Virtual Machines<\/li><li>Security, trust and privacy challenges<\/li><li>Smart City Security<\/li><li>Smart Grid security<\/li><li>Cyber Physical System (CPS) security<\/li><li>Software-Based Attacks<\/li><li>System security for wired and wireless networks<\/li><li>Virtual firewalls<\/li><li>Privacy and responsibility in digital age<\/li><li>Cybersecurity and human rights<\/li><\/ul>\n\n\n\n<p><strong>Submission Guidlines:<\/strong><\/p>\n\n\n\n<p>Submitted papers must represent original material that is not currently under review in any other conference or journal, and has not been previously published.<\/p>\n\n\n\n<p>All submissions should be written in English with maximum of eight (8) printed pages (in Two-Column IEEE Conference Format), including text, figures and references.<\/p>\n\n\n\n<p>Papers should be submitted through EDAS: <a href=\"https:\/\/edas.info\/N28090\">https:\/\/edas.info\/N28090<\/a><\/p>\n\n\n\n<p>CSNet 2021 is technically co-sponsored by IEEE, IEEE ComSoc<br>All accepted &amp; presented papers will be published in IEEE Xplore<\/p>\n\n\n\n<p>Best papers will be considered for fast-track publication in the Annals of Telecommunications (Springer, ISI-indexed)<\/p>\n\n\n\n<p>At least one author is required to register, at the full rate, to present accepted papers at the conference and for the paper to appear in the conference proceedings.<br>Best papers will be considered for fast-track publication in the Annals of Telecommunications (Springer, ISI-indexed)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>(Click here to download CFP in &hellip; <a href=\"https:\/\/csnet-conference.org\/2021\/index.php\/call-for-papers\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v15.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Call for Papers - CSNet 2021<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/csnet-conference.org\/2021\/index.php\/call-for-papers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Call for Papers - CSNet 2021\" \/>\n<meta property=\"og:description\" content=\"(Click here to download CFP in &hellip; Continue reading &rarr;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/csnet-conference.org\/2021\/index.php\/call-for-papers\/\" \/>\n<meta property=\"og:site_name\" content=\"CSNet 2021\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-26T07:59:00+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\">\n\t<meta name=\"twitter:data1\" content=\"3 minutes\">\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/csnet-conference.org\/2021\/#website\",\"url\":\"https:\/\/csnet-conference.org\/2021\/\",\"name\":\"CSNet 2021\",\"description\":\"5th Cyber Security in Networking Conference\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/csnet-conference.org\/2021\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/csnet-conference.org\/2021\/index.php\/call-for-papers\/#webpage\",\"url\":\"https:\/\/csnet-conference.org\/2021\/index.php\/call-for-papers\/\",\"name\":\"Call for Papers - CSNet 2021\",\"isPartOf\":{\"@id\":\"https:\/\/csnet-conference.org\/2021\/#website\"},\"datePublished\":\"2020-12-16T09:13:53+00:00\",\"dateModified\":\"2021-05-26T07:59:00+00:00\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/csnet-conference.org\/2021\/index.php\/call-for-papers\/\"]}]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/csnet-conference.org\/2021\/index.php\/wp-json\/wp\/v2\/pages\/28"}],"collection":[{"href":"https:\/\/csnet-conference.org\/2021\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/csnet-conference.org\/2021\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/csnet-conference.org\/2021\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/csnet-conference.org\/2021\/index.php\/wp-json\/wp\/v2\/comments?post=28"}],"version-history":[{"count":26,"href":"https:\/\/csnet-conference.org\/2021\/index.php\/wp-json\/wp\/v2\/pages\/28\/revisions"}],"predecessor-version":[{"id":291,"href":"https:\/\/csnet-conference.org\/2021\/index.php\/wp-json\/wp\/v2\/pages\/28\/revisions\/291"}],"wp:attachment":[{"href":"https:\/\/csnet-conference.org\/2021\/index.php\/wp-json\/wp\/v2\/media?parent=28"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}