ACM SIGCHI General Interest Announcements (Mailing List)


Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Marcin Paprzycki <[log in to unmask]>
Reply To:
Marcin Paprzycki <[log in to unmask]>
Wed, 20 May 2020 00:17:55 +0200
text/plain (331 lines)


Network Systems and Applications

Organized within the framework of the Federated Conference on Computer 
Science and Information Systems (FedCSIS 2020), Track 5

Sofia, Bulgaria, 6-9 September, 2020



We would like to assure everybody that FedCSIS 2020 will take place, the 
submitted and accepted papers will be published and sent for indexations 
as usual. In case the conference cannot be staged in real setting of 
beautiful Sofia, we will provide a virtual web-based avenue for it. We 
look forward to receiving your contributions as usual and guarantee that 
FedCSIS 2020 will be another memorable and rewarding conference.

Nevertheless, we would like to stress that in case of inability to be 
physically present at the FedCSIS Conference, due to travel 
restrictions, the FedCSIS paper authors will be allowed to remotely 
present their papers. Fees for remote presentations will be 
substantially reduced (details soon).



Modern network systems encompass a wide range of solutions and 
technologies, including wireless and wired networks, network systems, 
services, and applications. This results in numerous active research 
areas oriented towards various technical, scientific and social aspects 
of network systems and applications. The primary objective of Network 
Systems and Applications conference track is to group network-related 
technical sessions and promote synergy between different fields of 
network-related research.

This year, this track (Track #3) has three main technical sessions, 
namely ANSA, IoT-ECAW’20, and NEMESIS'20. The ANSA technical session is 
a wide umbrella that receives research on a broad scope of network 
systems and technologies. The IoT-ECAW’20 workshop is dedicated to all 
papers related to the Internet-of-Things (IoT) developments, challenges, 
and applications. The NEMESIS’20 receives papers related to information 
security, user privacy, and trust management from broad scope of domains 
including networks, IoT, clouds, and in addition to conventional 
cybersecurity applications. The three technical sessions aim to cover 
all aspects related to network systems and networking technologies. As a 
matter of arrangement, we encourage submitting papers to their 
well-matched event. The track chairs are available via email to clarify 
any confusion that might occur. For more details, see below and visit 
WWW site of each Technical Session.


Advances in Network Systems and Applications (ANSA'20)

The rapid development of computer networks including wired and wireless 
networks observed today is very evolving, dynamic, and multidimensional. 
On the one hand, network technologies are used in virtually several 
areas that make human life easier and more comfortable. On the other 
hand, the rapid need for network deployment brings new challenges in 
network management and network design, which are reflected in hardware, 
software, services, and security-related problems. Every day, a new 
solution in the field of technology and applications of computer 
networks is released. The ANSA technical session is devoted to 
emphasizing up-to-date topics in networking systems and technologies by 
covering problems and challenges related to the intensive 
multidimensional network developments. This session covers not only the 
technological side but also the societal and social impacts of network 
developments. The session is inclusive and spans a wide spectrum of 
networking-related topics.

The ANSA technical session is a great place to exchange ideas, conduct 
discussions, introduce new ideas and integrate scientists, 
practitioners, and scientific communities working in networking research 

The ANSA session is seeking original, relevant, and high-quality 
research papers related, but not limited, to the following topics:

Networks architecture
Networks management
Quality-of-Service enhancement
Performance modeling and analysis
Fault-tolerant challenges and solutions
5G developments and applications
Traffic identification and classification
Switching and routing technologies
Protocols design and implementation
Wireless sensor networks
Future Internet architectures
Networked operating systems
Industrial networks deployment
Software-defined networks
Self-organizing and self-healing networks
Mulimedia in Computer Networks
Communication quality and reliability
Emerging aspects of networking systems

The session will also solicit papers about current implementation 
efforts, research results, as well as position statements from industry 
and academia regarding applications of networking technology.


Internet of Things - Enablers, Challenges and Applications (4rd Workshop 

The Internet of Things is a technology which is rapidly emerging the 
world. IoT applications include: smart city initiatives, wearable 
devices aimed to real-time health monitoring, smart homes and buildings, 
smart vehicles, environment monitoring, intelligent border protection, 
logistics support. The Internet of Things is a paradigm that assumes a 
pervasive presence in the environment of many smart things, including 
sensors, actuators, embedded systems and other similar devices. 
Widespread connectivity, getting cheaper smart devices and a great 
demand for data, testify to that the IoT will continue to grow by leaps 
and bounds. The business models of various industries are being 
redesigned on basis of the IoT paradigm. But the successful deployment 
of the IoT is conditioned by the progress in solving many problems. 
These issues are as the following:

The IoT technical session is seeking original, high quality research 
papers related to such topics. The session will also solicit papers 
about current implementation efforts, research results, as well as 
position statements from industry and academia regarding applications of 
IoT. The focus areas will be, but not limited to, the challenges on 
networking and information management, security and ensuring privacy, 
logistics, situation awareness, and medical care.

The integration of heterogeneous sensors and systems with different 
technologies taking account environmental constraints, and data 
confidentiality levels;
Big challenges on information management for the applications of IoT in 
different fields (trustworthiness, provenance, privacy);
Security challenges related to co-existence and interconnection of many 
IoT networks;
Challenges related to reliability and dependability, especially when the 
IoT becomes the mission critical component;
Zero-configuration or other convenient approaches to simplify the 
deployment and configuration of IoT and self-healing of IoT networks;
Knowledge discovery, especially semantic and syntactical discovering of 
the information from data provided by IoT.

The IoT session is seeking original, high quality research papers 
related to following topics:

Future communication technologies (Future Internet; Wireless Sensor 
Networks; Web-services, 5G, 4G, LTE, LTE-Advanced; WLAN, WPAN; Small 
cell Networks…) for IoT,
Intelligent Internet Communication,
IoT Standards,
Networking Technologies for IoT,
Protocols and Algorithms for IoT,
Self-Organization and Self-Healing of IoT Networks,
Object Naming, Security and Privacy in the IoT Environment,
Security Issues of IoT,
Integration of Heterogeneous Networks, Sensors and Systems,
Context Modeling, Reasoning and Context-aware Computing,
Fault-Tolerant Networking for Content Dissemination,
IoT Architecture Design, Interoperability and Technologies,
Data or Power Management for IoT,
Fog - Cloud Interactions and Enabling Protocols,
Reliability and Dependability of mission critical IoT,
Unmanned-Aerial-Vehicles (UAV) Platforms, Swarms and Networking,
Data Analytics for IoT,
Artificial Intelligence and IoT,
Applications of IoT (Healthcare, Military, Logistics, Supply Chains, 
Agriculture,  ...),
E-commerce and IoT.
The session will also solicit papers about current implementation 
efforts, research results, as well as position statements from industry 
and academia regarding applications of IoT. Focus areas will be, but not 
limited to above mentioned topics.


Cyber Security, Privacy and Trust (1st International Forum NEMESIS'20)

Nowadays, information security works as a backbone for protecting both 
user data and electronic transactions. Protecting communications and 
data infrastructures of an increasingly inter-connected world have 
become vital nowadays. Security has emerged as an important scientific 
discipline whose many multifaceted complexities deserve the attention 
and synergy of computer science, engineering, and information systems 
communities. Information security has some well-founded technical 
research directions which encompass access level (user authentication 
and authorization), protocol security, software security, and data 
cryptography. Moreover, some other emerging topics related to 
organizational security aspects have appeared beyond the long-standing 
research directions.

The International Forum of Cyber Security, Privacy, and Trust 
(NEMESIS’20) as a successor of International Conference on Cyber 
Security, Privacy, and Trust (INSERT’19) focuses on the diversityof the 
cyber information security developments and deployments in order to 
highlight the most recent challenges and report the most recent 
researches. The session is an umbrella for all cyber security technical 
aspects, user privacy techniques, and trust. In addition, it goes beyond 
the technicalities and covers some emerging topics like social and 
organizational security research directions. NEMESIS’20 serves asa forum 
of presentation of theoretical, applied research papers, case studies, 
implementation experiences as well as work-in-progress results in cyber 
security. NEMESIS’20 is intended to attract researchers and 
practitioners from academia and industry and provides an international 
discussion forum in order to share their experiences and their ideas 
concerning emerging aspects in information security met in different 
application domains. This opens doors for highlighting unknown research 
directions and tackling modern research challenges. The objectives of 
the NEMESIS’20 can be summarized as follows:

To review and conclude research findings in cyber security and other 
security domains, focused on the protection of different kinds of assets 
and processes, and to identify approaches that may be useful in the 
application domains of information security.
To find synergy between different approaches, allowing elaborating 
integrated security solutions, e.g. integrate different risk-based 
management systems.
To exchange security-related knowledge and experience between experts to 
improve existing methods and tools and adopt them to new application areas
Topics of interest include but are not limited to:

Biometric technologies
Cryptography and cryptanalysis
Critical infrastructure protection
Security of wireless sensor networks
Hardware-oriented information security
Organization- related information security
Social engineering and human aspects in cyber security
Individuals identification and privacy protection methods
Pedagogical approaches for information security education
Information security and business continuity management
Tools supporting security management and development
Decision support systems for information security
Trust in emerging technologies and applications
Digital right management and data protection
Threats and countermeasures for cybercrimes
Ethical challenges in user privacy and trust
Cyber and physical security infrastructures
Risk assessment and management
Steganography and watermarking
Digital forensics and crime science
Security knowledge management
Security of cyber-physical systems
Privacy enhancing technologies
Trust and reputation models
Misuse and intrusion detection
Data hide and watermarking
Cloud and big data security
Computer network security
Assurance methods
Security statistics

The session will also solicit papers about current implementation 
efforts, research results, as well as position statements from industry 
and academia regarding applications of networking technology.



* Authors should submit draft papers (as Postscript, PDF or MSWord file).
* The total length of a paper should not exceed 10 pages IEEE style 
(including tables, figures and references).
* Papers will be refereed and accepted on the basis of their scientific 
merit and relevance to the workshop.
* Preprints containing accepted papers will be published on a USB memory 
stick provided to the FedCSIS participants.
* Only papers presented at the conference will be published in 
Conference Proceedings and submitted for inclusion in the IEEE Xplore® 
* Conference proceedings will be published in a volume with ISBN, ISSN 
and DOI numbers and posted at the conference WWW site.
* Conference proceedings will be indexed in BazEkon and submitted for 
indexation in: Thomson Reuters - Conference Proceedings Citation Index, 
SciVerse Scopus, Inspec, Index Copernicus, DBLP Computer Science 
Bibliography and Google Scholar.
* Organizers reserve right to move accepted papers between FedCSIS events.

* For paper submission instructions, please visit:


Paper submission (sharp / no extension): May 29, 2020
Position paper submission: June 23, 2020
Author notification: July 15, 2020
Final paper submission and registration: July 31, 2020
Conference date: September 6-9, 2020

Track 3 Chairs:

Armando, Alessandro, University of Genova, Italy
Awad, Ali Ismail, Lulea University of Technology, Sweden
Furtak, Janusz, Military University of Technology, Poland

Ta wiadomość e-mail została sprawdzona pod kątem wirusów przez oprogramowanie AVG.

    For news of CHI books, courses & software, join CHI-RESOURCES
     mailto: [log in to unmask]

    To unsubscribe from CHI-ANNOUNCEMENTS send an email to
     mailto:[log in to unmask]

    For further details of CHI lists see