EAI PFSM 2022 will be held as a fully-fledged online conference.
In 2021, EAI successfully launched an online conference format to ensure the safety, comfort and quality of experience for attendees and a successful course of the events, all while retaining fully live interaction, publication and indexing. Due to the unrelenting global pandemic, this will also be the case in 2022.
Although we will miss having everyone meet and connect in person, we feel strongly that knowledge exchange must continue, if not more so. That is why we have equipped our online conferences with live viewing with chat, virtual Q&A, and a multitude of other measures to provide you with a great experience. Learn more about EAI’s online conferences.
Scope
The main theme of this special program is to highlight the cutting-edge technologies for Information Security, Privacy Preservation and Digital Forensics investigations to help build privacy-aware, secure, safe and resilient Smart Mobility systems for Smart Cities.
Welcome to the EAI Community
Let the EAI Community help you build your career with collaborative research, objective evaluation, and fair recognition:
- Get more visibility for your paper and receive a fair review with Community Review,
- Earn credits regardless of your paper’s acceptance and increase your EAI Index for new membership ranks and global recognition,
- Find out if your research resonates – get real-time evaluation of your presentation on-site via EAI Compass.
Topics
Topics (not limited to):
- Privacy-aware or Privacy-preserving computing;
- Information Security, Secure Intelligent transport and mobility systems;
- Privacy and Security in cloud/edge/fog computing;
- Digital Forensics for Smart Cities;
- Smart Vehicle Forensics;
- IoT forensics;
- Mobile Systems Security and Forensics;
- Cybercrime and Frauds;
- Cyber Incident Response and Recovery;
- AI-based security and privacy; Access Control; Identity management;
- Security of Communication Protocols; Security and privacy for (Industrial) Internet of Things;
- Embedded Systems Security;
- Software and Application Security;
- Malware and Unwanted Software;
- Side Channel Attacks;
- Threat scenarios, Attack Models and Security Analysis;
- Usable Security and Privacy;
- Trust Management and Reputation;
- Security and Privacy Metrics and Policies;
- Security operations and incident management;
- Intrusion detection and prevention;
- Digital watermarking;
- Digital rights management;
- Cyber threat intelligence;
- Privacy-Enhancing Technologies and Mechanisms;
- Blockchain and Cryptocurrencies;
- Biometrics Security and Privacy.
Publication
All registered papers will be submitted for publishing by Springer and made available through SpringerLink Digital Library.
Proceedings will be submitted for inclusion in leading indexing services, such as Web of Science, EI Engineering Index (Compendex and Inspec databases), DBLP, EU Digital Library, Google Scholar, IO-Port, MathSciNet, Scopus, Zentralblatt MATH.
Authors of selected best accepted and presented papers will be invited to submit an extended version to:
- Mobile Networks and Applications (MONET) Journal (IF: 3.077)
- Springer Wireless Networks Journal (WINET) [IF: 2.701 (2020)]
All accepted authors are eligible to submit an extended version in a fast track of:
- EAI Endorsed Transactions on Scalable Information Systems (Open Access) – indexed in Web of Science, Compendex & Scopus
- EAI Endorsed Transactions on Security and Safety (Open Access)
Additional publication opportunities:
- EAI/Springer Innovations in Communications and Computing Book Series
(titles in this series are indexed in Ei Compendex, Web of Science & Scopus)
Paper submission
Papers should be submitted through EAI ‘Confy+‘ system, and have to comply with the Springer format (see Author’s kit section).
- Regular papers should be up to 12-15 pages in length.
- Short papers should be 6-11 pages in length.
All conference papers undergo a thorough peer review process prior to the final decision and publication. This process is facilitated by experts in the Technical Program Committee during a dedicated conference period. Standard peer review is enhanced by EAI Community Review which allows EAI members to bid to review specific papers. All review assignments are ultimately decided by the responsible Technical Program Committee Members while the Technical Program Committee Chair is responsible for the final acceptance selection. You can learn more about Community Review here.