posted by user: eminecngz || 469 views || tracked by 3 users: [display]

ICONSEC 2024 : 3rd International Conference On Cyber Security and Digital Forensics

FacebookTwitterLinkedInGoogle

Link: https://iconsec.yalova.edu.tr/
 
When Sep 2, 2024 - Sep 6, 2024
Where Pristina, KOSOVO
Submission Deadline Sep 1, 2024
Categories    cyber security   network security   digital forensics   mobile security
 

Call For Papers

★Full Name: 3rd International Conference On Cyber Security and Digital Forensics
★Abbreviation: (ICONSEC'24)
★Website: https://iconsec.yalova.edu.tr/
★Date: September 2-6, 2024
★Place: Pristina, Kosovo
★Supported by Yalova University Cyber Security Application and Research Center

★Contact us:
Website: https://iconsec.yalova.edu.tr/
Email: iconsec@yalova.edu.tr

★★Main Topics★★
CRYPTOLOGY AND ITS APPLICATIONS
-Privacy computing
-Homomorphic encryption
-Cryptographic obfuscation
-Data Encryption Algorithms
-Public and private key encryption techniques
-Data Privacy and watermarking
-Autonomous key management
-Cloud and big data security
-Security for software-defined and data center networks
-Virtual Private Network (VPN)
-Tracing Techniques in Internet
-Data Leak Prevention (DLP)
-Denial of Service (DoS) and Distributed Denial of Service (DDoS)
-Cryptographic Processors and Co-Processors
-Control Systems/SCADA Security

CYBER AND DIGITAL FORENSICS
-Cyber-risk management
-Evidentiary Aspects of Digital Forensics
-Computer and networks forensics
-Digital forensics tools and applications
-Network Forensics and Traffic Analysis
-Hardware Vulnerabilities and Device Forensics
-Anti-Forensics and Anti-Forensics Techniques
-Data leakage, Data protection and Database forensics
-Privacy issues in network forensics
-Malware forensics and Anti-Malware techniques
-Vulnerability Assessment and Penetration Testing (VAPT)
-Open Web Application Security
-Vulnerability on social media spaces
-Cybersecurity for digital vehicles
-Hacking pacemakers
-Prediction of cyber attacks
-Ransomware cyber weapon
-Hacking Techniques and Related Issues
-Honeypot
-Virus Issues (Detection, Prevention)
-Intrusion Detection Systems (IDS)
-Intrusion Prevention systems (IPS)
-Cybersecurity, laws and regulations

NETWORK AND MOBILE SECURITY
-Transport-Level Security
-Wireless Network Security
-IP Security
-Electronic Mail security
-Emails mining & authorship identification
-Firewall Systems
-Active Networks
-Security in Grid
-Embedded Systems Security
-True and Pseudorandom Number Generators
-Side Channel Attacks
-Fault Attacks
-Android Security
-IOS Security
-Web Monitoring
-Malware Analysis
-Database security
-Mobile App Privacy & Security

BLOCK-CHAIN AND SOFTWARE TECHNOLOGIES
-Blockchain and machine learning for cybersecurity
-Anonymity of blockchain and cryptocurrencies
-Threat categorization and threat detection
-Blockchain and healthcare systems
-Blockchain in supporting critical infrastructures
-Digital Currency
-Cryptocurrency
-Privacy exposures and violations
-Security and privacy in online social networks
-Software Security and Secure Coding
-Risk Assessment and Analysis

Related Resources

DRIJ 2024   Dental Research: An International Journal
ECCWS 2024   23rd European Conference on Cyber Warfare and Security
SPISCS 2024   2024 3rd International Conference on Signal Processing, Information System and Cyber Security (SPISCS 2024)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ICCWS 2025   20th International Conference on Cyber Warfare and Security
IJIS Special Issue 2024   Reinforcing Cyber Security of Critical Infrastructures through Digital Twins
IEEE CSR 2024   2024 IEEE International Conference on Cyber Security and Resilience
InCIT 2024   The 8th International Conference on Information Technology
CSEIT 2024   11th International Conference on Computer Science, Engineering and Information Technology
CyberHunt 2024   7th Annual Workshop on Cyber Threat Intelligence and Hunting in conjunction with the IEEE Big Data Conference