Vai al contenuto principale della pagina
Autore: | Jadliwala Murtuza |
Titolo: | Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks / / Murtuza Jadliwala, Yongdae Kim, Alexandra Dmitrienko |
Pubblicazione: | New York : , : Association for Computing Machinery, , 2022 |
Descrizione fisica: | 1 online resource (301 pages) |
Disciplina: | 621.38456 |
Soggetto topico: | Mobile communication systems |
Persona (resp. second.): | KimYongdae |
DmitrienkoAlexandra | |
Sommario/riassunto: | Welcome! We are excited to welcome you to the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec). As the threat to public health due to the COVID-19 pandemic is subsiding and global travel opening up again, we are happy to bring back WiSec to a fully in-person setting this year, departing from the fully online/virtual modality adopted by the last two versions of WiSec. WiSec'22 will take place at the luxurious Hyatt Regency San Antonio Riverwalk Hotel, located in the heart of beautiful downtown San Antonio, Texas, USA, and is hosted by the Department of Computer Science and the National Security Collaboration Center at the University of Texas at San Antonio (UTSA). WiSec'22 will be a fourday (May 16-19) fully in-person conference, with the main conference program spanning the first three days (May 16-18), while the post-conference workshop (WiseML) taking place on the fourth day (May 19). After 15 years of existence, WiSec 2022 continues to be the premier venue for research dedicated to all aspects of security and privacy in wireless and mobile networks, their systems, and their applications. We have an exciting main conference program spanning a total of three days, with single-track technical paper sessions, a poster and demo session, three excellent keynote talks from wireless and mobile security experts, Prof. Srdjan Capkun (ETH Zurich), Prof. William Enck (NC State University), and Prof. Gabriela Ciocarlie (the University of Texas at San Antonio), and a panel on "Wireless and Mobile Security Research and Teaching in the Post- Pandemic World". We invite participants to attend the exciting paper presentations and keynotes live in an in-person setting, interact with the presenters during Q&A sessions after each talk, network during the coffee breaks and lunches on each day, and socialize during the reception (co-located with the poster & demo session) and banquet dinner. The COVID-19 pandemic continues to create travel challenges for some of us. Although most of the talks will be delivered in-person, some speakers will present and participate in Q&A sessions virtually due to travel restrictions in their home country. We plan to record all the presentations and make them publicly available to the entire WiSec and security community soon after the conference. The technical program this year features 25 outstanding papers: 16 full papers, 8 short papers, and 1 SoK paper as well as 9 posters and 2 demonstrators on early results and practical prototypes. The technical program covers a wide variety of security and privacy problems relating to IoT security, cellular communication security, wireless technologies (Wi-Fi, Bluetooth, ZigBee), application of cryptographic protocols, authentication, applications using machine learning for security, and a wide range of mobile application security. We continue with the replicability labels and could assign 8 available, 5 reproduced, and 5 functional labels to papers this year. Those papers made all their artifacts available as required to reproduce the work. Our call for papers attracted 81 qualified submissions from across the globe, which demonstrates the continuous interest in and growth of the topic area. The submissions were carefully reviewed by 77 technical program committee (TPC) members from academia, industrial research labs, and federal organizations, along with a selected group of external experts. The TPC was formed with the goal of covering diverse research expertise as well as diverse perspectives and approaches. The paper review process followed double-blind and single round policy, and all but one of the papers received three or more reviews. The review period was accompanied by thorough online discussions. Thanks to the dedicated work of the program committee, we were able to adhere to our timeline with tight time constraints on the review process, arriving at decisions less than five weeks after the paper submission. Providing quality peer reviews in a short time frame is a great asset for authors. The turnaround time at WiSec remains among the fastest for any reputable academic conference or journal, requiring strong commitment from the program committee, whose dedicated members deserve special praise. |
Titolo autorizzato: | Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks |
Formato: | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione: | Inglese |
Record Nr.: | 9910571793103321 |
Lo trovi qui: | Univ. Federico II |
Opac: | Controlla la disponibilità qui |