2nd Cyber Security In Networking Conference

Cybersecurity is the set of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, security includes both cybersecurity and physical security. In this conference we are interested in cybersecurity in networking


General Chair

  • Patrick Hebrard (Naval group, France)

  • Solange Ghernaouti (University of Lausanne, Switzerland)

TPC Chairs

  • Cunqing Hua (Shanghai Jiao Tong University, China)

  • Rida Khatoun (Telecom ParisTech, France)

Program Committee

  • Mohamad Badra (CNRS/Zayed University, France)

  • Marinho Barcellos (Federal University of Rio Grande do Sul, Brazil)

  • Abderrahim Benslimane (University of Avignon, France)

  • Raouf Boutaba (University of Waterloo, Canada)

  • Georg Carle (Technische Universität München, Germany)

  • Periklis Chatzimisios (Alexander TEI of Thessaloniki, Greece)

  • Xiuzhen Chen (Shanghai Jiaotong University, P.R. China)

  • Laurent Ciavaglia (Nokia, France)

  • Filip De Turck (Ghent University - imec, Belgium)

  • Emmanuel Dotaro (Thales, France)

  • Otto Carlos Duarte (Universidade Federal do Rio de Janeiro, Brazil)

  • Ahmad Fadlallah (University of Science and Arts in Lebanon, Lebanon)

  • Wissam Fawaz (LAU, Lebanon)

  • Yacine Ghamri (ENSIIE, France)

  • Solange Ghernaouti Hélie (University of Lausanne, Switzerland)

  • Lisandro Granville (Federal University of Rio Grande do Sul, Brazil)

  • Vincent Guyot (ESIEA, France)

  • Kamel Haddadou (GANDI SAS, France)

  • Badis Hammi (Télécom ParisTech, France)

  • James Hong (POSTECH, Korea)

  • Bijan Jabbari (George Mason University, USA)

  • Diego Kreutz (Federal University of Pampa (UNIPAMPA), Brazil)

  • Houda Labiod (TELECOM ParisTech (ex: ENST), France)

  • Latif Ladid (University of Luxembourg / IPv6 Forum, Luxembourg)

  • Abdelkader Lahmadi (LORIA, France)

  • Patrick Lallement (Prof, France)

  • Wenjia Li (New York Institute of Technology, USA)

  • Xiaodong Lin (Wilfrid Laurier University, Canada)

  • Pascal Lorenz (University of Haute Alsace, France)

  • Diogo Mattos (Universidade Federal do Rio de Janeiro, Brazil)

  • Deep Medhi (University of Missouri-Kansas City, USA)

  • Refik Molva (EURECOM, France)

  • Michele Nogueira (Federal University of Parana (UFPR), Brazil)

  • Guy Pujolle (University Pierre et Marie Curie - Paris 6, France)

  • Pierangela Samarati (Universita' degli Studi di Milano, Italy)

  • Stefano Secci (Sorbonne Université, France)

  • Ahmed Serhrouchni (ENST, France)

  • Mehmet Ulema (Manhattan College, USA)

  • Pascal Urien (Télécom ParisTech, France)

  • Paulo Verissimo (University of Lisbon, Poland)

  • Sherali Zeadally (University of Kentucky, USA)

  • Benoit Martin (DGA, France)

  • Yvon Kermarrec (IMT Atlantique, France)

Call for paper

Important date

Draft paper submission deadline
Draft paper acceptance notification
Final paper submission deadline

Areas of interest include, but are not limited to:

  • Attacks on Virtualized Systems

  • Balancing Trust and Control

  • Cell Phones vulnerabilities

  • Cloud of Security

  • Concealing Malware (Trojan Horses-Root kits-Logic Bombs)

  • Cyber-attacks Cloud-oriented vs Cyber defense Cloud-oriented

  • Cybersecurity

  • Data Center Network Control, Security and Optimization

  • Demilitarization Zone (DMZ)

  • Designing a Security Policy

  • Disaster recovery plan

  • Enterprise Wireless Security

  • Hardware-Based Attacks

  • Host Network Intrusion Prevention Systems

  • Industrial control system information security

  • Infection Malware

  • Integrated Network Security Hardware

  • Internet Content Filters

  • Internet security issues

  • Network and operating system administration for security purposes

  • Network Attached Storage (NAS)

  • Network Intrusion Detection Systems (NIDS)

  • Network security design

  • Organizational Security Policies

  • Secure Network through Network Design

  • Security of Virtual Machines

  • Security, trust and privacy challenges

  • Smart City Security

  • Smart Grid security

  • Software-Based Attacks

  • System security for wired and wireless networks

  • Virtual firewalls

  • Blockchain technology and CyberSecurity


Paper Submission:

Submitted papers must represent original material that is not currently under review in any other conference or journal, and has not been previously published. All submissions should be written in English with maximum of eight (8) printed pages (in Two-Column IEEE Conference Format), including text, figures and references. Papers should be submitted through EDAS at:

Best papers will be considered for fast-track publication in the Annals of Telecommunications (Springer, ISI-indexed) Information at:

Submit Comment
Verify Code Change Another
All Comments
Important Date
  • Conference Date

    Oct 24



    Oct 26


  • May 23 2018

    Draft paper submission deadline

  • Jun 14 2018

    Draft Paper Acceptance Notification

  • Jun 30 2018

    Final Paper Deadline

Contact Information
Previous Conferences
Scan the QR code×