Cyber Security and Privacy Workshop

Call for Papers


Camera Ready Guidelines


Accepted Papers

  1. HERO: A Novel Cryptographic Scheme for Secure and Efficient Data Exchange Over Future Networks
    Avnith Mishra (BITS Pilani, Rajasthan, India), Arsh Singh (BITS Pilani, Rajasthan, India), Sharda Tripathi (Birla Institute of Technology and Science Pilani, India)

  2. An Encryption-Aware Deduplication Approach for IoT Systems
    Surya Pavan Devarapalli, Jay Dave, Paarth Prakash, Sujal Jindal, Divya Daga and Anakhi Hazarika (BITS Pilani Hyderabad Campus, India)

  3. Automated Cyber Attack Anatomy and Timeline Visualization with Retrieval-Augmented Generation (RAG) pipeline
    Rajalakshmi (NIT Tiruchirappalli, India), Ghanshyam S Bopche (National Institute of Technology, Tiruchirappalli, India)

  4. Protecting Privacy in Blockchain Applications: A Homomorphic Encryption Approach Against De-Identification Attacks
    Gauri Shankar (LUT University, Finland), Narendra Kumar Dewangan and Sathwik Narkedimilli (Telecom Paris, France), Anish Jindal (Durham University, United Kingdom (Great Britain))

  5. A Service Provider Recommendation System for Verifiable Credential Ecosystem
    Vigneswaran R, Nallagonda Harshita, Batsayan Das, Siddhasagar Pani and Srujana Kanchanapalli (Tata Consultancy Services, India), Praveen Gauravaram (Tata Consultancy Services, Australia & New Zealand)

  6. Post-Quantum DLT Framework for Secure Financial Transactions in Banking Applications
    Abhishek Pandey (International Institute of Information Technology Hyderabad, India), Debnath Ghosh (International Institute of Information Technology, Hyderabad, India), Prithwi Bagchi (International Institute of Information Technology Hyderabad, India), Ashok Kumar Das (International Institute of Information Technology, Hyderabad, India), Ravi Kumar Kappagantu, Srinivas V Katakam and Jitendra Chougala (Lloyds Technology Centre, Hyderabad, India)

  7. AMQP Under Siege: Characterizing and Measuring Slow Rate DoS Attacks
    Sushant Kuril (IIIT Sri City, India), Nikhil Tripathi (IIT (ISM) Dhanbad, India), Munmun Swain, Kamalakanta Sethi and Priyambada Subudhi (IIIT Sri City, India)

  8. A Phase-Encoded Quantum One-Time Pad for Sender-Deniable Encryption
    Sougata Jana (National Institute of Technology Durgapur, India), Jaydeep Howlader (National Institute of Technology, Durgapur, India)

  9. Decision Framework for Selection of Post Quantum Cryptographic Algorithms and Libraries
    Pankaj Kumar Sahu (Tata Consultancy Services Research & TCS Research, India), Shubhro Roy, Mangesh Gharote, Sr. and Sutapa Mondal (Tata Consultancy Services Limited, India), Rajan M A (Tata Consultancy Services, India), Sachin Lodha (Tata Research Development and Design Centre, India)

  10. TPACS: A Novel Trust-Aware Proactive Adaptive Caching Strategy for Named Data Networking
    Matta Krishna Kumari (SRM University AP, India & Amaravati, India), Nikhil Tripathi (IIT (ISM) Dhanbad, India), Piyush Joshi (IIIT Sri City, India)

  11. SrcTCAM-Def: A Source-based Detection System against Slow-Rate TCAM DDoS Attacks in SDN
    Mitali Sinha, Padmalochan Bera and Manoranjan Satpathy (IIT Bhubaneswar, India)

  12. eQUIC: A Resource-friendly Encryption-based Framework to Secure QUIC Handshake Process from MITM Attacks
    Debasmita Dey (IIEST Shibpur, India)

  13. Leveraging Quantum Kernel Methods for Enhanced Intrusion Detection
    Anuj Tiwari (Indian Institute of Technology Gandhinagar, India), Sameer G Kulkarni (Indian Institute of Technology, Gandhinagar, India)

  14. Quantum Wasserstein GAN: A Novel Approach for Generating Anomalous Timeseries Data
    Shashi Kumar (Indian Institute of Technology Gandhinagar, India), Sameer G Kulkarni (Indian Institute of Technology, Gandhinagar, India)

  15. Log-Based Authentication as a Promising Method for Detecting Cooperative Impersonation from Temporal and Spatial Perspectives
    Ryosuke Kobayashi (The University of Tokyo, Japan), Mhd Irvan (the University of Tokyo, Japan), Franziska Zimmer, Maharage N S Perera and Rie Shigetomi Yamaguchi (The University of Tokyo, Japan)

  16. AAPSCH: Adaptive AI-Powered Smart Contract Honeypots with Reinforcement Learning for Blockchain Security
    Mahesh Babu Chittem (SRM University AP, India), Ashok Kumar Pradhan (SRM University, Andhra Pradesh, India)

  17. AIDE: An Adaptive Incremental Drift-Aware Engine for Malware Detection
    Meghana Kiran (SRM University AP, India), Jyothi Samhitha Katragadda, Sai Avinash Sirasapalli and Lokesh Katragadda (SRM University - AP, India), Bhaskara Santhosh Egala (SRM University AP, India)

  18. Red Flags in the Browser: Detecting Impulsive Clicks for Adaptive Cybersecurity
    Shubham Malaviya (TCS Research, India), Manish Shukla (TCS Innovation Labs - TRDDC, India), Sachin Lodha (Tata Research Development and Design Centre, India), Anuj Bagad (TCS Research, India)

  19. Rethinking Website Fingerprinting: A Critical Study
    Aditi Aralkar, Pankaj Chaudhary and Neminath Hubballi (Indian Institute of Technology Indore, India), Manjesh Kumar Hanawal (Indian Institute of Technology Bombay, India)


Important Dates

Paper Submission deadline:           15th October 2025 (AoE)  30th October 2025 (AoE)
Notification of Acceptance:            15th November 2025  20th November 2025  26th November 2025
Camera-ready Submission:            30th November 2025  5th December 2025
Workshop Date:                                6th January 2026

Workshop Overview

The Cybersecurity and Privacy (CSP) Workshop will be held in conjunction with the annual COMSNETS conference on January 6, 2026. This workshop is intended to be a forum where researchers can meet and discuss the latest in cyber security and privacy topics as they apply to communications systems. Security and Privacy researchers and professionals from government, industry and academia are invited to propose and present original work in the following topics (or related areas):

  • Authentication, authorization, and accounting
  • Information Security protocols and architectures
  • Security in wired, mobile and wireless communications
  • Security in grid/cloud/pervasive computing
  • Network Intrusion Detection and Prevention, firewalls, packet filters
  • Public Key Infrastructures, key management, credential management
  • Network and internet forensics techniques
  • Secure routing and security management
  • Malware, botnets, and similar topics
  • Embedded system security
  • Zero Trust Architecture
  • Access control security
  • Security in parallel and distributed systems
  • Blockchain and distributed ledger technologies
  • Security and privacy policies
  • Privacy-preserving data collection and analytics
  • Anonymous communication and censorship resistance
  • Critical infrastructure security and privacy
  • Security and privacy for cyber physical systems
  • Security and privacy for e-commerce/m-commerce
  • Security and privacy in social networks
  • AI and ML security and privacy
  • Internet of Things (IoT) security and privacy
  • Mobile devices security and privacy
  • Security and privacy for digital identity
  • Edge based security and privacy
  • Security and privacy in the Metaverse
  • Web security and privacy

Researchers are invited to submit papers based on original work written in English in these and other topics related to cyber security and privacy.


Submission Guidelines

  • The Cyber Security and Privacy Workshop invites submission of original work, not previously published, or under review at another conference or journal.
  • Submissions (including title, abstract, all figures, tables, and references) must be no greater than 6 pages in length. A minimum number of 4 pages are required.
  • Reviews will be double-blind: authors’ names and affiliations must not be included in the submission.
  • Submissions must follow the formatting guidelines as given on the IEEE Website; and those that do not meet the size and formatting requirements will not be reviewed.
  • All papers must be in Adobe Portable Document Format (PDF) and submitted on EDAS.
  • One of the authors must register for the workshop with the designated registration rate and present the paper in person.
  • All workshop papers (both regular and invited) will appear in conference proceedings and be submitted to IEEE Xplore as well as other Abstracting and Indexing (A&I) databases.

Papers can be submitted through EDAS: https://edas.info/N34097

For any queries, please contact the workshop chairs at comsnets.workshop@gmail.com


Program Committee

  • Aditya Ahuja (TCS Research, India)
  • Albert Levi (Sabanci University, Turkey)
  • Argha Sen (Indian Institute of Technology Kharagpur, India)
  • B. S. Manoj (Indian Institute of Space Science and Technology, India)
  • Basabdatta Palit (National Institute of Technology Rourkela, India)
  • Bishakh Ghosh (Indian Institute of Technology Kharagpur, India)
  • Debasree Das (University of Bamberg, Germany)
  • Dulanga Weerakoon (Singapore-MIT Alliance for Research and Technology, Singapore)
  • Meenu Dey (Indian Institute of Technology Guwahati, India)
  • Paresh Saxena (BITS Pilani, India)
  • Poonam Yadav (University of York, United Kingdom)
  • Rohit Kumar (Delhi Technological University)
  • Rohit Verma (Intel, India)
  • Roopa Vishwanathan (New Mexico State University, USA)
  • Subhasish Dhal (Indian Institute of Information Technology Guwahati, India)
  • Vishwas Patil (Indian Institute of Technology Bombay, India)

Workshop Co-Chairs

Shantanu Pal

Shantanu Pal

Deakin University
Australia

Robin Doss

Robin Doss

Deakin University
Australia

Sandeep Shukla

Sandeep Shukla

International Institute of Information Technology
Hyderabad, India