SINCONF 2020

13th International Conference on Security of Information and Networks

About The Event ONLINE

Proceedings by ACM Press.
All papers will be inserted into the ACM Digital Library and subsequently indexed by Scopus.

Where

Istanbul, Turkey

When

4-7 November 2020

In succession to the successful annual SIN 2007 - SIN 2019, the 13th International Conference on Security of Information and Networks (SIN 2020) provides an international forum for presentation of research and applications of security in information and networks. SIN 2020 conference features contributed as well as invited papers, special sessions, workshops, and tutorials on theory and practice of security of information and networks.

Conference Venue

Idris Yamanturk Konferans Merkezi, Istanbul Technical University, Faculty of Electrical and Electronics Engineering, Maslak, Istanbul, Turkey

Organized by:

  • Istanbul technical University, Istanbul, Turkey
  • Hasan kalyoncu University, Gaziantep, Turkey
  • The University of Glasgow, Glasgow, UK
  • Rutgers University, Newark, USA
  • Kennesaw State University, Georgia, USA
  • Malaviya National Institute of Technology, Jaipur, India
  • Manipal University Jaipur, India
  • Macquarie University, Sydney, Australia
  • Cardiff University, Wales, UK
  • Southern Federal University, Taganrog, Rostov-on-Don, Russia
  • Sochi State University, Sochi, Russia

Hosted by:

  • Department of Electronics and Communication Engineering, Istanbul Technical University, Istanbul, Turkey

Supported by:

  • Kaspersky


Important Links

SIN 2020 will feature the following keynote talks:

  • Liudmila Babenko, Southern Federal University, Taganrog, Rostov-on-Don, Russia.
  • Albert Levi, Sabanci University, Turkey. Biography
  • Muhammed Ali Aydın, Istanbul University, Turkey.

Conference Chair

  • Berna Ors Yalcin, Istanbul Technical University, Turkey

Conference Co-Chairs

  • Atilla Elçi, Hasan Kalyoncu University, Turkey
  • Ron Poet, University of Glasgow, Scotland
  • Jaideep Vaidya, Rutgers University, USA
  • Manoj S. Gaur, MNIT, India
  • Rajveer S. Shekhawat, MUJ, India
  • Mehmet Orgun, Macquarie University, Australia
  • Pete Burnap, Cardiff University, Wales
  • Oleg Makarevich, Ludmila Babenko, Southern Federal University, Russia

Program Chair

  • Berna Ors Yalcin, Istanbul Technical University, Turkey

Program Co-Chairs

  • Alexander Chefranov, Eastern Mediterranean University, TRNC
  • Maxim Anikeev, Fraunhofer Institute for Secure Information Technology, Germany
  • Philipp Reinecke, Cardiff University, United Kingdom
  • Hossain Shahriar, Kennesaw State University, USA
  • Vijay Laxmi, MNIT, India
  • Naghmeh Moradpoor Sheykhkanloo, Edinburgh Napier University, United Kingdom
  • Behnam Rahnama, Medis Inc., Iran
  • Josef Pieprzyk,CSIRO, Australia, and Polish Academy of Sceiences, Poland

Promotion Chair

  • Şerif Bahtiyar, Istanbul Technical University

Promotion Co-Chairs

  • Tahir Sandıkkaya, Istanbul Technical University, Turkey
  • Rajan Shankaran, Macquarie University, Australia
  • Manoj Kumar Bohra, Manipal University Jaipur, India
  • Xavier Bellekens, Strathclyde University, Scotland

Local Publicity Co-Chair

  • Xavier Bellekens, University of Strathclyde, Scotland

Local Committee

  • Latif AKÇAY Istanbul Technical University
  • Mehmet Onur DEMİRTÜRK Istanbul Technical University
  • Yasin Fırat KULA Istanbul Technical University
  • Mustafa TANIŞ Istanbul Technical University
  • Serdar Duran Istanbul Technical University

Logo, certificates, covers designs, and website

  • Efe Cem Elçi, Turkey
  • Sepideh Sadeghpour, Medis Inc., Iran

Volunteers Team

  • Students of Istanbul Technical University, Turkey

Advisory Committee Members

  • Bart Preneel, Katholieke Universiteit Leuven, Belgium
  • Bülent Örencik, Beykent University, Turkey
  • Cetin Kaya Koc, University of California Santa Barbara, USA
  • Edward Dawson, Queensland University of Technology, Australia
  • Elisa Bertino, Purdue University, USA
  • N. Balakrishnan, IISc Bangalore, India
  • Willy Susilo, University of Wollongong, Australia
  • Alexander Shelupanov, Tomsk State University for Control Systems and Radio Electronics, Russia

International Program Committee

  • Stelvio Cimato, University of Milan
  • Luigi Logrippo, Université du Québec en Outaouais
  • Utsav Upadhyay, Dr. B R Ambedkar National Institute of Technology, Jalandhar, Punjab, India
  • Natalia Miloslavskaya, National Research Nuclear University MEPhI (Moscow Engineering Physics Institute)
  • Bulent Orencik, Beykent University
  • Alexander Tselykh, SFEDU
  • Ercan Buluş, Namık Kemal Üniversitesi
  • Jan Jurjens, TU Dortmund
  • Bernardi Pranggono, Sheffield Hallam University
  • Ekaterina Maro, Southern Federal University
  • Edgar Weippl, University of Vienna
  • Gerardo Pelosi, Politecnico di Milano
  • Igor Kotenko, St. Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences (SPIIRAS)
  • Albert Levi, Sabanci University
  • Alexey Tselykh, Southern Federal University
  • Cihangir Tezcan, Middle East Technical University
  • Evgeny Abramov, Southern Federal University
  • Evgenia Ishchukova
  • Gaurav Somani, Central University of Rajasthan
  • Maxim Kalinin, Peter the Great St. Petersburg Polytechnic University
  • Manoj Gaur, Department of Computer Engineering, Malaviya National Instotute of Technology, Jaipur, India
  • Josef Pieprzyk, CSIRO/Data61
  • Gaurav Prasad, National Institute of Technology karnataka
  • Christophe Feltus, Luxembourg Institute of Science and Technology
  • Behnam Rahnama, Dept. of Computer Engineering, Okan University
  • Ankit Mundra, Manipal University Jaipur
  • Sunita Singhal, Manipal University Jaipur
  • Rajveer Singh Shekhawat, Manipal University Jaipur
  • Shweta Saharan, Malaviya National Institute of Technology Jaipur
  • Vasileios Vlachos, University of Thessaly
  • Naghmeh Moradpoor, Edinburgh Napier University
  • Tugkan Tuglular, Izmir Institute of Technology, Turkey
  • Olga Peskova
  • Wojciech Mazurczyk, Warsaw University of Technology, Faculty of Electronics and Information Technology, Institute of Computer Science
  • Mohammad Rahman, Florida International University

PAPER SUBMISSION INSTRUCTIONS

Papers must be submitted electronically via the SIN 2020 Submission Site at the link bellow:

Paper Submission Link


Title, author's name(s), affiliation, mailing address, telephone, fax and email of the principal author should be included. Maximum length for the proceedings is 8 pages for full paper, 4 pages for short paper, 2 pages for fast abstract and position statement, and 2 pages for demo and tutorial proposals. Extra page charges apply for full and short papers. All papers should be written according to double-column ACM conference format (https://www.acm.org/publications/proceedings-template).
All proposals for organizing workshops, tutorials, demos, and special sessions are expected at the conference e-mail sinconf@sinconf.org.

All accepted papers will be published by ACM Press in a conference proceedings and uploaded into ACM Digital Library. Extended versions of selected papers will be invited for possible publication in a special issue. Each accepted paper must be registered to be included in the proceedings. Papers not presented during the conference may be removed from the online proceedings.


CALL FOR PAPERS


Papers, special sessions, tutorials, and workshops addressing all aspects of security in information and networks are being sought. Researchers and industrial practitioners working on the following and related subjects are especially encouraged: development and realization of cryptographic solutions, security schemes, new algorithms; critical analysis of existing approaches; secure information systems, security, privacy, and trust of blockchain and distributed ledger technologies, secure smart contracts, consensus mechanisms, especially distributed control and processing applications, and security in networks; interoperability, service levels and quality issues in such systems; information assurance, security, and public policy; detection and prevention of cybercrimes such as fraud and phishing; next generation network architectures, protocols, systems and applications; industrial experiences and challenges of the above. Doctoral students are encouraged to propose papers on ongoing research. Original papers will be considered; submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any other conference or workshop that has proceedings. All submitted papers will be reviewed by at least three members of the program committee judging its originality, significance, correctness, presentation and relevance. Authors are also encouraged to propose position papers on practical studies and experiments, critique of existing work, emerging issues, and novel ideas under development. Enterprises and research centers developing, implementing, or using security tools and frameworks are encouraged to propose application / tool demo. Proposals of half-day tutorials on fundamental to advanced subjects covering practical implementation aspects of security are welcome. Proposals of special session(s) to be held in the main conference are welcome. Proposals of workshops to be held in conjunction with the conference are welcome. The theme of a workshop proposal should be closely related to a specific area of the conference topics.

Broad areas of interest in security theory, technology and applications will include, but are not limited to, the following:
  • Access control and intrusion detection
  • Security of cyber-physical systems
  • Autonomous and adaptive security
  • Security tools and development platforms
  • Computational intelligence techniques in security
  • Security ontology, models, protocols & policies
  • Computer network defense
  • Standards, guidelines and certification
  • Cryptographic techniques and key management
  • Security-aware software engineering
  • Industrial applications of security
  • Trust and privacy
  • Information assurance
  • Next generation network architectures
  • Malware analysis
  • Network security and protocols
  • Security challenges in Mobile/Embedded Systems
  • Cloud security
  • Security, privacy, and trust of blockchain and distributed ledger technologies
  • Secure smart contracts
  • Consensus mechanisms
  • Security Awareness and Education
  • Post Quantum Cryptography
  • IoT Security and Trust


Important Dates


Please consult www.sinconf.org site for the most up-to-date info on the following:

  • Paper Submission by: 15 October 2020
  • All Author Notification: 27 October 2020
  • All Camera Ready and Author Registration: 1 November 2020
  • Tutorial Date: 7 November 2020
  • Conference Dates: 4-6 November 2020


Awards


One each of the Best Paper and the Best Presentation awards will be given. The awardees will recieve keys to Kaspersky products complements of Kaspersky Academy.



PAST EVENTS & SPECIAL ISSUES

Previous SIN Conf events and their proceedings (see below for special issues and books):



CONFERENCE PROGRAM


To be announced



Contact Us

Email

sinconf sinconf.org