posted by user: eminecngz || 1290 views || tracked by 4 users: [display]

ICONSEC 2024 : 3rd International Conference On Cyber Security and Digital Forensics

FacebookTwitterLinkedInGoogle

Link: https://iconsec.yalova.edu.tr/
 
When Sep 2, 2024 - Sep 6, 2024
Where Pristina, KOSOVO
Submission Deadline Sep 1, 2024
Categories    cyber security   network security   digital forensics   mobile security
 

Call For Papers

★Full Name: 3rd International Conference On Cyber Security and Digital Forensics
★Abbreviation: (ICONSEC'24)
★Website: https://iconsec.yalova.edu.tr/
★Date: September 2-6, 2024
★Place: Pristina, Kosovo
★Supported by Yalova University Cyber Security Application and Research Center

★Contact us:
Website: https://iconsec.yalova.edu.tr/
Email: iconsec@yalova.edu.tr

★★Main Topics★★
CRYPTOLOGY AND ITS APPLICATIONS
-Privacy computing
-Homomorphic encryption
-Cryptographic obfuscation
-Data Encryption Algorithms
-Public and private key encryption techniques
-Data Privacy and watermarking
-Autonomous key management
-Cloud and big data security
-Security for software-defined and data center networks
-Virtual Private Network (VPN)
-Tracing Techniques in Internet
-Data Leak Prevention (DLP)
-Denial of Service (DoS) and Distributed Denial of Service (DDoS)
-Cryptographic Processors and Co-Processors
-Control Systems/SCADA Security

CYBER AND DIGITAL FORENSICS
-Cyber-risk management
-Evidentiary Aspects of Digital Forensics
-Computer and networks forensics
-Digital forensics tools and applications
-Network Forensics and Traffic Analysis
-Hardware Vulnerabilities and Device Forensics
-Anti-Forensics and Anti-Forensics Techniques
-Data leakage, Data protection and Database forensics
-Privacy issues in network forensics
-Malware forensics and Anti-Malware techniques
-Vulnerability Assessment and Penetration Testing (VAPT)
-Open Web Application Security
-Vulnerability on social media spaces
-Cybersecurity for digital vehicles
-Hacking pacemakers
-Prediction of cyber attacks
-Ransomware cyber weapon
-Hacking Techniques and Related Issues
-Honeypot
-Virus Issues (Detection, Prevention)
-Intrusion Detection Systems (IDS)
-Intrusion Prevention systems (IPS)
-Cybersecurity, laws and regulations

NETWORK AND MOBILE SECURITY
-Transport-Level Security
-Wireless Network Security
-IP Security
-Electronic Mail security
-Emails mining & authorship identification
-Firewall Systems
-Active Networks
-Security in Grid
-Embedded Systems Security
-True and Pseudorandom Number Generators
-Side Channel Attacks
-Fault Attacks
-Android Security
-IOS Security
-Web Monitoring
-Malware Analysis
-Database security
-Mobile App Privacy & Security

BLOCK-CHAIN AND SOFTWARE TECHNOLOGIES
-Blockchain and machine learning for cybersecurity
-Anonymity of blockchain and cryptocurrencies
-Threat categorization and threat detection
-Blockchain and healthcare systems
-Blockchain in supporting critical infrastructures
-Digital Currency
-Cryptocurrency
-Privacy exposures and violations
-Security and privacy in online social networks
-Software Security and Secure Coding
-Risk Assessment and Analysis

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CYBER 2025   The Tenth International Conference on Cyber-Technologies and Cyber-Systems
ECCWS 2024   23rd European Conference on Cyber Warfare and Security
ECCWS 2025   24th European Conference on Cyber Warfare and Security
IEEE CSR 2025   2025 IEEE International Conference on Cyber Security and Resilience
NTIJ 2024   Nanoscience and Technology: An International Journal
ISDFS 2025   13th International Symposium on Digital Forensics and Security
CCITT 2025   4th International Conference on Computing and Information Technology Trends
CGIP--EI 2025   2025 3rd International Conference on Computer Graphics and Image Processing (CGIP 2025)