| |||||||||||||||
ICONCS 2020 : 2nd International Conference on Cyber Security and Computer Science | |||||||||||||||
Link: http://iconcs.daffodilvarsity.edu.bd | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
The 2nd International Conference on Cyber Security and Computer Science (ICONCS 2020) will address the discipline of Cyber Security and Computer Science. It will be held on February 15-16, 2020 in the Permanent Campus of Daffodil International University, Ashulia, Savar, Dhaka, Bangladesh.
The conference caters to both practitioners and academics, providing a forum to exchange ideas and experiences on technology, methodology, applications, study cases, and practical experiences. PAPER PRESENTATION: All submitted manuscripts will be subject to the three blind peer-reviewing process. All accepted papers must be presented as orally or through Skype during the scheduled time of the event for publication. INDEXING: All accepted papers will be included in the Conference proceedings that will also be published in the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST) by Springer (Indexed by SCOPUS). Volumes published as part of the LNICST series are made available to the following indexing services: - Conference Proceedings Citation Index (CPCI), part of Clarivate Analytics’ Web of Science - EI Engineering Index (Compendex and Inspec databases) - ACM Digital Library - DBLP - Google Scholar - IO-Port - MathSciNet - Scopus - Zentralblatt MATH IMPORTANT DATES: § Full paper submission: 25th November 2019 § Notification acceptance for full paper: 15th December 2019 § Last Date of Registration: 13th January, 2020 § Date of Conference: 15th – 16th February, 2020 Conference Scope: Cyber Security Access control Application security Attacks and defenses Computer security Cryptography Biometric and watermarking Security aspects of alternative currencies Cloud and web security Distributed systems security Design and deployment of secure services Digital forensics Embedded systems security Hardware security Information risk management Internet of things (IOT) security Intrusion detection and prevention system Language-based security Malware Mobile security Network security New exploits Privacy and anonymity Protocol security Security architectures Secure composition and adaptation of services Security and usability Security aspects of web application deployment Security architecture in web application development Security automation tools Security in continuous deployment Static and dynamic analysis for security System security Side channel attacks Surveillance and anti-surveillance Trust management Vulnerability detection model/ techniques Vulnerability prevention techniques Web application security requirements Web application security testing Computer Science Algorithms Fuzzy logic Genetic algorithms Artificial intelligence Big data and data mining Bioinformatics and scientific Blockchain Technology Computer based education Computing ethics Computer networks Censorship and censorship-resistance Data communication systems Expert systems E-commerce and e-governance Human-computer interaction Image processing Information systems and Management Knowledge data engineering Photonic Reverse-engineering and code obfuscation Technology management Verification and assurance techniques for security properties Wireless communications |
|