| |||||||||||
ICONSEC 2024 : 3rd International Conference On Cyber Security and Digital Forensics | |||||||||||
Link: https://iconsec.yalova.edu.tr/ | |||||||||||
| |||||||||||
Call For Papers | |||||||||||
★Full Name: 3rd International Conference On Cyber Security and Digital Forensics
★Abbreviation: (ICONSEC'24) ★Website: https://iconsec.yalova.edu.tr/ ★Date: September 2-6, 2024 ★Place: Pristina, Kosovo ★Supported by Yalova University Cyber Security Application and Research Center ★Contact us: Website: https://iconsec.yalova.edu.tr/ Email: iconsec@yalova.edu.tr ★★Main Topics★★ CRYPTOLOGY AND ITS APPLICATIONS -Privacy computing -Homomorphic encryption -Cryptographic obfuscation -Data Encryption Algorithms -Public and private key encryption techniques -Data Privacy and watermarking -Autonomous key management -Cloud and big data security -Security for software-defined and data center networks -Virtual Private Network (VPN) -Tracing Techniques in Internet -Data Leak Prevention (DLP) -Denial of Service (DoS) and Distributed Denial of Service (DDoS) -Cryptographic Processors and Co-Processors -Control Systems/SCADA Security CYBER AND DIGITAL FORENSICS -Cyber-risk management -Evidentiary Aspects of Digital Forensics -Computer and networks forensics -Digital forensics tools and applications -Network Forensics and Traffic Analysis -Hardware Vulnerabilities and Device Forensics -Anti-Forensics and Anti-Forensics Techniques -Data leakage, Data protection and Database forensics -Privacy issues in network forensics -Malware forensics and Anti-Malware techniques -Vulnerability Assessment and Penetration Testing (VAPT) -Open Web Application Security -Vulnerability on social media spaces -Cybersecurity for digital vehicles -Hacking pacemakers -Prediction of cyber attacks -Ransomware cyber weapon -Hacking Techniques and Related Issues -Honeypot -Virus Issues (Detection, Prevention) -Intrusion Detection Systems (IDS) -Intrusion Prevention systems (IPS) -Cybersecurity, laws and regulations NETWORK AND MOBILE SECURITY -Transport-Level Security -Wireless Network Security -IP Security -Electronic Mail security -Emails mining & authorship identification -Firewall Systems -Active Networks -Security in Grid -Embedded Systems Security -True and Pseudorandom Number Generators -Side Channel Attacks -Fault Attacks -Android Security -IOS Security -Web Monitoring -Malware Analysis -Database security -Mobile App Privacy & Security BLOCK-CHAIN AND SOFTWARE TECHNOLOGIES -Blockchain and machine learning for cybersecurity -Anonymity of blockchain and cryptocurrencies -Threat categorization and threat detection -Blockchain and healthcare systems -Blockchain in supporting critical infrastructures -Digital Currency -Cryptocurrency -Privacy exposures and violations -Security and privacy in online social networks -Software Security and Secure Coding -Risk Assessment and Analysis |
|