Services
Professional Activities/Services in the Laboratory for Cybersecurity Dynamics
- Service as Associate Editor or Member of Editorial Board:
- Scientific Reports, 2022-
- IEEE Transactions on Network Science and Engineering, 2017-2022
- IEEE Transactions on Information Forensics and Security, 2014-2017
- IEEE Transactions on Dependable and Secure Computing, 2011-2016
- International Journal of Security and Networks (IJSN), Aug. 2011-Aug. 2014
- Service as Conference/Workshop Initiator:
- International Conference on Science of Cyber Security: A new series of conferences I co-initiated (since 2018).
- Steering Committee Chair, The International Conference on Science of Cyber Security (SciSec), 2019-
- ACM Workshop on Scalable Trusted Computing (STC)
- International Conference on Science of Cyber Security: A new series of conferences I co-initiated (since 2018).
- Service as a program committee (co-)chair of the following conferences/workshops:
- Workshop on Cyber and Physical Resilience, affiliated with The 10th International Conference on Complex Systems (ICCS’2020)
- The 2nd International Conference on Science of Cyber Security (SciSec’2019)
- The 20th International Conference on Information and Communications Security (ICICS’2018)
- The 1st International Conference on Science of Cyber Security (SciSec’2018)
- International Workshop on Attacks and Defenses for Internet-of-Things (ADIoT’18)
- The 9th International Conference on Network and System Security (NSS’15) —Nov. 3-5, 2015 in New York City
- The 9th China International Conference on Information Security and Cryptology (Inscrypt’13)
- 2013 ACM Asia Public-Key Cryptography Workshop (AsiaPKC 2013)
- The Second ACM Workshop on Scalable Trusted Computing (STC’07)
- The First ACM Workshop on Scalable Trusted Computing (STC’06)
- Service as a program committee member of the following conferences/workshops (stop updating in 2021 as there are too many):
- The 11th ACM Conference on Data and Application Security and Privacy (CODASPY’2021)
- The 2021 IEEE Conference on Dependable and Secure Computing (DSC’2021)
- The 2021 Corona-Def Workshop (affiliated with NDSS’2021)
- The 16th International Conference on Information Security and Cryptology (Inscrypt’20)
- The 14th International Conference on Network and System Security (NSS’20)
- ACM Workshop on Moving Target Defense (MTD’20)
- The 8th IEEE Conference on Communications and Network Security (CNS’20)
- The 1st International Workshop on Cyber-Physical Security for Critical Infrastructures Protection (CPS4CIP’20)
- The 16th International Conference on Security and Privacy in Communication Networks (SECURECOMM’20)
- The 15th International Conference on Information Security and Cryptology (Inscrypt’19)
- IEEE 2019 Military Communications Conference (Milcom’19)
- The 14th International Conference on Information Security Practice and Experience (ISPEC’19)
- The 1st International Workshop on Security for Financial Critical Infrastructures and Services (FINSEC’19)
- IEEE 27th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS’19)
- The Second International Conference on Machine Learning for Cyber Security (ML4CS’19)
- The 15th International Conference on Security and Privacy in Communication Networks (SECURECOMM’19)
- The 7th IEEE Conference on Communications and Network Security (CNS’19)
- The 13th International Conference on Trust Management (IFIPTM’19)
- The 17th IEEE International Conference on Intelligence and Security Informatics (IEEE ISI’19)
- The 14th International Conference on Information Security and Cryptology (Inscrypt’18)
- IEEE International Conference on Intelligence and Security Informatics (IEEE ISI’18)
- IEEE 2018 Military Communications Conference (Milcom’18)
- The 12th International Conference on Trust Management (IFIPTM’18)
- IEEE 26th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS’18)
- The 6th IEEE Conference on Communications and Network Security (CNS’18)
- The 12th International Conference on Network and System Security (NSS’18)
- The 14th International Conference on Information Security Practice and Experience (ISPEC’18)
- The 14th International Conference on Security and Privacy in Communication Networks (SECURECOMM’18)
- The 19th International Conference on Information & Communications Security (ICICS’17)
- The 13th International Conference on Information Security and Cryptology (Inscrypt’17)
- IEEE 2017 Military Communications Conference
- The 13th International Conference on Security and Privacy in Communication Networks (SECURECOMM’17)
- IEEE International Conference on Intelligence and Security Informatics (IEEE ISI’17)
- IEEE 25th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS’17)
- The 5th IEEE Conference on Communications and Network Security (CNS’17)
- The 3rd International Workshop on Mobile Computing Security (MCS’16)
- The 4th Annual Symposium and Bootcamp for Hot Topics on Science of Security (HoTSoS’17)
- The 2017 IEEE Conference on Dependable and Secure Computing (DSC’17)
- The 11th International Conference on Network and System Security (NSS’2017)
- The 11th International Conference on Trust Management (IFIPTM’17)
- IEEE International Conference on Intelligence and Security Informatics (IEEE ISI’16)
- The 12th China International Conference on Information Security and Cryptology (Inscrypt’16)
- The 19th International Conference on Information Security and Cryptology (ICISC 2016)
- The 10th International Conference on Network and System Security (NSS’2016)
- The 10th International Conference on Provable Security (ProvSec’16)
- IEEE 2016 Military Communications Conference
- The 10th International Conference on Trust Management (IFIPTM’16)
- The 25th International Conference on Computer Communications and Networks (ICCCN’16)
- The Ninth International Conference on Provable Security (ProvSec’15)
- The 17th International Conference on Information & Communications Security (ICICS’15)
- The 24th International Conference on Computer Communications and Networks (ICCCN’15)
- IEEE International Performance Computing and Communications Conference (IPCCC’15)
- IEEE International Conference on Intelligence and Security Informatics (IEEE ISI’15)
- The IEEE International Conference on Communications (ICC’15)
- The 9th International Conference on Trust Management (IFIPTM’15)
- ACM 2015 Workshop on Security and Privacy Analytics (affiliated with ACM CODASPY’2015)
- International Workshop on Future Information Security (FIS 2015)
- The 6th International Conference on Trusted Systems (INTRUST’14)
- The 8th International Conference on Network and System Security (NSS’2014)
- The 17th Information Security Conference (ISC’14)
- The 9th China International Conference on Information Security and Cryptology (Inscrypt’14)
- IEEE 2014 Joint Intelligence and Security Informatics Conference (JISIC 2014)
- IEEE 2014 Military Communications Conference
- The 31st IEEE International Performance Computing and Communication Conference (IPCCC’14)
- The 2nd IEEE Cloud Security Auditing Workshop (CSAW’14)
- The 6th International Symposium on Cyberspace Safety and Security (CSS 2014)
- The 5th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN’14) — Ubiquitous Security and Privacy Solutions
- The 8th International Conference on Network and System Security (NSS’14)
- The 34th International Conference on Distributed Computing Systems (ICDCS’14) — Security and Privacy
- GLOBECOM 2014 Communication & Information System Security (CISS) Symposium
- The 8th IFIP WG 11.11 International Conference on Trust Management (IFIPTM’14)
- Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security (CMS’2014)
- IEEICC — Communications and Information Systems Security Symposium (CISS’14)
- The 10th Information Security Practice & Experience Conference (ISPEC’14)
- The 15th International Conference on Information & Communications Security (ICICS’13)
- The 4th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN’13) — Ubiquitous Security and Privacy Solutions
- 2013 CLOUD SECURITY AUDITING WORKSHOP (CSAW’13)
- The 7th International Conference on Network and System Security (NSS’13)
- The 2013 IEEE Intelligence and Security Informatics Conference (ISI’13)
- Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security (CMS’2013)
- IEEE Globecom’13 — Communication and Information System Security Symposium
- The 4th International Conference on Trusted Systems (INTRUST’12)
- 31rd IEEE International Performance Computing and Communications Conference (IPCCC’12)
- 2012 Workshop on Hardware and Architectural Support for Security and Privacy (HASP’12)
- 4th IEEE International Conference and Workshops on Cloud Computing Technology and Science (CloudCom’12) –Security and Privacy
- IEEE Globecom’12 — Communication and Information System Security Symposium
- The 6th International Conference on Network and System Security (NSS’12)
- The 17th Australasian Conference on Information Security and Privacy (ACISP’12)
- The 17th European Symposium on Research in Computer Security (ESORICS’12)
- The 13th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security (CMS’12)
- The 5th ACM Conference on Wireless Network Security (ACM WiSec’12)
- The 2012 IEEE Intelligence and Security Informatics Conference (ISI’12)
- International Conference on Applied Cryptography and Network Security (ACNS’12)
- The Second ACM Conference on Data and Application Security and Privacy (ACM CODASPY’12)
- The 8th Annual IEEE Consumer Communications and Networking Conference (CCNC’12) — Security and Content Protection
- The 3rd International Conference on Trusted Systems (INTRUST’11)
- The 10th International Conference on Cryptology and Network Security (CANS’11)
- The 2011 IEEE International Performance Computing and Communication Conference (IPCCC’11)
- The 14th Information Security Conference (ISC’11) The Fifty International Conference on Provable Security (ProvSec’11)
- The 2011 IEEE Globecom (Globecom’11)
- The 4th ACM Conference on Wireless Network Security (ACM WiSec’11)
- The 12th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security (CMS’11)
- First ACM Conference on Data and Application Security and Privacy (ACM CODASPY’11)
- International Conference on Applied Cryptography and Network Security (ACNS’11)
- The 2011 IEEE Intelligence and Security Informatics Conference (ISI’11)
- The 8th Annual IEEE Consumer Communications and Networking Conference (CCNC’11) — Security and Content Protection
- The 2011 IEEE International Conference on Communications (ICC’11)
- The 6th China International Conferences on Information Security and Cryptology (Inscrypt’10)
- The Second International Conference on Trusted Systems (INTRUST’10)
- International Workshop on Mobile Computing Using Cloud (MobiCloud’10)
- The Fifth International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA’10)
- The 2010 Annual Summit and Conference of Asia-Pacific Signal and Information Processing Association 2010 (APSIPA ASC 2010) — Communication Systems: Information and Network Security Track
- The 2010 IEEE International Performance Computing and Communication Conference (IPCCC’10)
- The 13th Information Security Conference (ISC’10)
- The 2010 IEEE Globecom (Globecom’10)
- The 2010 IEEE Intelligence and Security Informatics Conference (ISI’10)
- The 2010 International Conference on Communications and Mobile Computing (CMC’10)
- The 5th China International Conferences on Information Security and Cryptology (Inscrypt’09)
- The International Conference on Trusted Systems (INTRUST’09)
- International Workshop on Security, Privacy and Trust of Computer and Cyber-Physical Networks (SecureCPN 2009)
- The 2009 IEEE Intelligence and Security Informatics Conference (ISI’09)
- The Third International Conference on Provable Security (ProvSec’09)
- The 2009 International Conference on Communications and Networking in China (CHINACOM’09) — Network and Information Security Symposium
- The 2009 IEEE International Conference on Communications (ICC’09) — Information and Network Security Symposium
- The 4th International Conference on Information Security and Cryptology (INSCRYPT’08)
- The Second Conference on Provable Security (ProvSec’08)
- The Third Asia-Pacific Trusted Infrastructure Technologies Conference (APTC’08)
- The 3rd International Symposium on Information Security (IS’08)
- The 2008 International Conference on Security and Cryptography (SECRYPT’08)
- The International Conference on Communications and Networking in China (ChinaCom’08) — Network and Information Security Symposium
- The 2008 IEEE International Conference on Communications (ICC’08) — Information and Network Security Symposium
- The 3rd International SKLOIS Conference on Information Security and Cryptology (INSCRYPT’07)
- The 3rd Workshop on Cryptography for Ad-hoc Networks (WCAN’07)
- The 2007 International Conference on Security and Cryptography (SECRYPT’07)
- The 13th ACM Conference on Computer and Communication Security (ACM CCS’06)
- The 2006 International Conference on Security and Cryptography (SECRYPT’06)
- The 2nd IEEE/CreateNet International Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm’06)
- The 5th International Conference on Cryptology and Network Security (CANS06)
- The 5th Conference on Security and Cryptography for Networks (SCN’06)
- The 2nd IEEE International Workshop on Trust, Security and Privacy in Ubiquitous Computing (TSPUC’06)
- The 8th International Conference on Information Security and Cryptology (ICISC 2005)
- The 4th International Conference on Cryptology and Network Security (CANS05)
- The 6th International Workshop on Information Security Applications (WISA’05)
- IEEE Globecom 2005 (Symposium on Computer and Network Security)
- The 4th International Workshop for Applied PKI (IWAP’05)
- The 2nd International Conference on Applied Cryptography and Network Security (ACNS’04)
- The 9th ACM Conference on Computer and Communications Security (ACM CCS’02)
- Service as a reviewer of the following journals/books:
- ACM Computing Survey
- IEEE/ACM Transactions on Networking (IEEE/ACM ToN)
- ACM Transactions on Sensor Networks (ACM ToSN)
- ACM Mobile Computing and Communications Review
- IEEE Transactions on Parallel and Distributed Systems (IEEE TPDS)
- ACM Transactions on Information and System Security (ACM TISSEC)
- IEEE Journal on Selected Areas in Communications (IEEE JSAC)
- IEEE Transaction on Dependable and Secure Computing (IEEE TDSC)
- IEEE Transactions on Computers (IEEE ToC)
- IEEE Transactions on Wireless Communication (IEEE TWC)
- IEEE Transactions on Information Security & Forensics (IEEE TIFS)
- Journla of Computer Security
- International Journal of Information Security
- IEEE Communication Letters
- Elsevier Ad Hoc Networks Journal
- IET Proceedings Information Security
- The Handbook of Information Security (John Wiley \& Sons, Inc.)