posted by user: eminecngz || 351 views || tracked by 3 users: [display]

ICONSEC 2024 : 3rd International Conference On Cyber Security and Digital Forensics

FacebookTwitterLinkedInGoogle

Link: https://iconsec.yalova.edu.tr/
 
When Sep 2, 2024 - Sep 6, 2024
Where Pristina, KOSOVO
Submission Deadline Sep 1, 2024
Categories    cyber security   network security   digital forensics   mobile security
 

Call For Papers

★Full Name: 3rd International Conference On Cyber Security and Digital Forensics
★Abbreviation: (ICONSEC'24)
★Website: https://iconsec.yalova.edu.tr/
★Date: September 2-6, 2024
★Place: Pristina, Kosovo
★Supported by Yalova University Cyber Security Application and Research Center

★Contact us:
Website: https://iconsec.yalova.edu.tr/
Email: iconsec@yalova.edu.tr

★★Main Topics★★
CRYPTOLOGY AND ITS APPLICATIONS
-Privacy computing
-Homomorphic encryption
-Cryptographic obfuscation
-Data Encryption Algorithms
-Public and private key encryption techniques
-Data Privacy and watermarking
-Autonomous key management
-Cloud and big data security
-Security for software-defined and data center networks
-Virtual Private Network (VPN)
-Tracing Techniques in Internet
-Data Leak Prevention (DLP)
-Denial of Service (DoS) and Distributed Denial of Service (DDoS)
-Cryptographic Processors and Co-Processors
-Control Systems/SCADA Security

CYBER AND DIGITAL FORENSICS
-Cyber-risk management
-Evidentiary Aspects of Digital Forensics
-Computer and networks forensics
-Digital forensics tools and applications
-Network Forensics and Traffic Analysis
-Hardware Vulnerabilities and Device Forensics
-Anti-Forensics and Anti-Forensics Techniques
-Data leakage, Data protection and Database forensics
-Privacy issues in network forensics
-Malware forensics and Anti-Malware techniques
-Vulnerability Assessment and Penetration Testing (VAPT)
-Open Web Application Security
-Vulnerability on social media spaces
-Cybersecurity for digital vehicles
-Hacking pacemakers
-Prediction of cyber attacks
-Ransomware cyber weapon
-Hacking Techniques and Related Issues
-Honeypot
-Virus Issues (Detection, Prevention)
-Intrusion Detection Systems (IDS)
-Intrusion Prevention systems (IPS)
-Cybersecurity, laws and regulations

NETWORK AND MOBILE SECURITY
-Transport-Level Security
-Wireless Network Security
-IP Security
-Electronic Mail security
-Emails mining & authorship identification
-Firewall Systems
-Active Networks
-Security in Grid
-Embedded Systems Security
-True and Pseudorandom Number Generators
-Side Channel Attacks
-Fault Attacks
-Android Security
-IOS Security
-Web Monitoring
-Malware Analysis
-Database security
-Mobile App Privacy & Security

BLOCK-CHAIN AND SOFTWARE TECHNOLOGIES
-Blockchain and machine learning for cybersecurity
-Anonymity of blockchain and cryptocurrencies
-Threat categorization and threat detection
-Blockchain and healthcare systems
-Blockchain in supporting critical infrastructures
-Digital Currency
-Cryptocurrency
-Privacy exposures and violations
-Security and privacy in online social networks
-Software Security and Secure Coding
-Risk Assessment and Analysis

Related Resources

CSW 2024   2024 3rd International Conference on Cyber Security
ECCWS 2024   23rd European Conference on Cyber Warfare and Security
SPTM 2024   12th International Conference of Security, Privacy and Trust Management
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IEEE WIFS 2024   16th IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS) 2024
SPISCS 2024   2024 3rd International Conference on Signal Processing, Information System and Cyber Security (SPISCS 2024)
IJIS Special Issue 2024   Reinforcing Cyber Security of Critical Infrastructures through Digital Twins
InCIT 2024   The 8th International Conference on Information Technology
IEEE CSR 2024   2024 IEEE International Conference on Cyber Security and Resilience
Hacktivity 2024   Hacktivity 2024 - IT Security Festival