Cyber Security and Privacy Workshop
Call for Papers
Camera Ready Guidelines
Accepted Papers
-
HERO: A Novel Cryptographic Scheme for Secure and Efficient Data Exchange Over Future Networks
-
An Encryption-Aware Deduplication Approach for IoT Systems
-
Automated Cyber Attack Anatomy and Timeline Visualization with Retrieval-Augmented Generation (RAG) pipeline
-
Protecting Privacy in Blockchain Applications: A Homomorphic Encryption Approach Against De-Identification Attacks
-
A Service Provider Recommendation System for Verifiable Credential Ecosystem
-
Post-Quantum DLT Framework for Secure Financial Transactions in Banking Applications
-
AMQP Under Siege: Characterizing and Measuring Slow Rate DoS Attacks
-
A Phase-Encoded Quantum One-Time Pad for Sender-Deniable Encryption
-
Decision Framework for Selection of Post Quantum Cryptographic Algorithms and Libraries
-
TPACS: A Novel Trust-Aware Proactive Adaptive Caching Strategy for Named Data Networking
-
SrcTCAM-Def: A Source-based Detection System against Slow-Rate TCAM DDoS Attacks in SDN
-
eQUIC: A Resource-friendly Encryption-based Framework to Secure QUIC Handshake Process from MITM Attacks
-
Leveraging Quantum Kernel Methods for Enhanced Intrusion Detection
-
Quantum Wasserstein GAN: A Novel Approach for Generating Anomalous Timeseries Data
-
Log-Based Authentication as a Promising Method for Detecting Cooperative Impersonation from Temporal and Spatial Perspectives
-
AAPSCH: Adaptive AI-Powered Smart Contract Honeypots with Reinforcement Learning for Blockchain Security
-
AIDE: An Adaptive Incremental Drift-Aware Engine for Malware Detection
-
Red Flags in the Browser: Detecting Impulsive Clicks for Adaptive Cybersecurity
-
Rethinking Website Fingerprinting: A Critical Study
Detailed Schedule
Panelists: Ashok Kumar Das (IIIT, Hyderabad, India), Bhavana Kanukurthi (Indian Institute of Science, Bangalore, India), Supratik Mukhopadhyay (Louisiana State University, USA)
Important Dates
| Paper Submission deadline: |
| Notification of Acceptance: |
| Camera-ready Submission: |
| Workshop Date: 6th January 2026 |
Workshop Overview
The Cybersecurity and Privacy (CSP) Workshop will be held in conjunction with the annual COMSNETS conference on January 6, 2026. This workshop is intended to be a forum where researchers can meet and discuss the latest in cyber security and privacy topics as they apply to communications systems. Security and Privacy researchers and professionals from government, industry and academia are invited to propose and present original work in the following topics (or related areas):
- Authentication, authorization, and accounting
- Information Security protocols and architectures
- Security in wired, mobile and wireless communications
- Security in grid/cloud/pervasive computing
- Network Intrusion Detection and Prevention, firewalls, packet filters
- Public Key Infrastructures, key management, credential management
- Network and internet forensics techniques
- Secure routing and security management
- Malware, botnets, and similar topics
- Embedded system security
- Zero Trust Architecture
- Access control security
- Security in parallel and distributed systems
- Blockchain and distributed ledger technologies
- Security and privacy policies
- Privacy-preserving data collection and analytics
- Anonymous communication and censorship resistance
- Critical infrastructure security and privacy
- Security and privacy for cyber physical systems
- Security and privacy for e-commerce/m-commerce
- Security and privacy in social networks
- AI and ML security and privacy
- Internet of Things (IoT) security and privacy
- Mobile devices security and privacy
- Security and privacy for digital identity
- Edge based security and privacy
- Security and privacy in the Metaverse
- Web security and privacy
Researchers are invited to submit papers based on original work written in English in these and other topics related to cyber security and privacy.
Submission Guidelines
- The Cyber Security and Privacy Workshop invites submission of original work, not previously published, or under review at another conference or journal.
- Submissions (including title, abstract, all figures, tables, and references) must be no greater than 6 pages in length. A minimum number of 4 pages are required.
- Reviews will be double-blind: authors’ names and affiliations must not be included in the submission.
- Submissions must follow the formatting guidelines as given on the IEEE Website; and those that do not meet the size and formatting requirements will not be reviewed.
- All papers must be in Adobe Portable Document Format (PDF) and submitted on EDAS.
- One of the authors must register for the workshop with the designated registration rate and present the paper in person.
- All workshop papers (both regular and invited) will appear in conference proceedings and be submitted to IEEE Xplore as well as other Abstracting and Indexing (A&I) databases.
Papers can be submitted through EDAS: https://edas.info/N34097
For any queries, please contact the workshop chairs at comsnets.workshop@gmail.com
Salil Kanhere
University of New South Wales, AustraliaVisit Homepage
6th January 2026, 9:00 AM - 10:00 AM (ESQUIRE HALL (Basement))
Social bots have evolved into highly sophisticated actors within online ecosystems, shaping public discourse, amplifying misinformation, and executing coordinated campaigns at unprecedented scale. This talk presents two complementary investigations into their behaviour and detection. First, we introduce BotSSCL, a self-supervised contrastive learning framework that detects human-like bots by leveraging social network-inspired objectives to enhance representation separability. BotSSCL achieves robust, generalizable embeddings, outperforming state-of-the-art supervised and unsupervised baselines by up to 8% in F1 score. Second, we examine TBTrackerX, a measurement-driven approach to uncover trigger-based (TB) bot campaigns, automated agents that activate in response to specific keywords to engage in deceptive financial or illicit activities. Our large-scale analysis reveals a coordinated TB ecosystem characterised by context-dependent responses, intermittent activity, and strategic dormancy to evade detection. Together, these studies provide a comprehensive view of advanced bot operations and highlight the urgent need for adaptive, resilient, and trustworthy detection strategies in dynamic social media landscapes.
Salil Kanhere is a Professor at the School of Computer Science and Engineering at UNSW Sydney, Australia. His research interests include cybersecurity, mobile computing, IoT, blockchain, and applied machine learning. He has published over 400 peer-reviewed articles and leads several government and industry-funded research projects in these fields. He is an IEEE Fellow and ACM Distinguished Member. He received the Friedrich Wilhelm Bessel Research Award (2020) and the Humboldt Research Fellowship (2014) from the Alexander von Humboldt Foundation in Germany, along with 12 Best Paper Awards. He serves on the advisory board of three SMEs and has held visiting positions at RWTH Aachen, I2R Singapore, Technical University Darmstadt, the University of Zurich, and Graz University of Technology. Salil is the Editor in Chief of the Ad Hoc Networks journal and an Associate Editor of IEEE Transactions on Network and Service Management, Computer Communications, and Pervasive and Mobile Computing. He has participated in organising committees for several IEEE/ACM international conferences and is a steering committee member for IEEE LCN and IEEE ICBC. Salil has also co-authored two books. He is a Fellow of IEEE.
Panel Discussion: Security by Design: Embedding Trust, Ethics, and Transparency into AI Systems
Program Committee
- Aditya Ahuja (TCS Research, India)
- Albert Levi (Sabanci University, Turkey)
- Argha Sen (Indian Institute of Technology Kharagpur, India)
- B. S. Manoj (Indian Institute of Space Science and Technology, India)
- Basabdatta Palit (National Institute of Technology Rourkela, India)
- Bishakh Ghosh (Indian Institute of Technology Kharagpur, India)
- Debasree Das (University of Bamberg, Germany)
- Dulanga Weerakoon (Singapore-MIT Alliance for Research and Technology, Singapore)
- Meenu Dey (Indian Institute of Technology Guwahati, India)
- Paresh Saxena (BITS Pilani, India)
- Poonam Yadav (University of York, United Kingdom)
- Rohit Kumar (Delhi Technological University)
- Rohit Verma (Intel, India)
- Roopa Vishwanathan (New Mexico State University, USA)
- Subhasish Dhal (Indian Institute of Information Technology Guwahati, India)
- Vishwas Patil (Indian Institute of Technology Bombay, India)
Workshop Co-Chairs
Shantanu Pal
Deakin University
Australia
Robin Doss
Deakin University
Australia
Sandeep Shukla
International Institute of Information Technology
Hyderabad, India
