| |||||||||||||||
CSW 2021 : 2021 International Workshop on Cyber Security (CSW 2021) | |||||||||||||||
Link: http://www.cybersecurityworkshop.org/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
★2021 International Workshop on Cyber Security (CSW 2021)-- Ei Compendex & Scopus—Call for paper
August 13-15, 2021|Stockholm, Sweden|Website: www.cybersecurityworkshop.org ★CSW 2021 welcomes researchers, engineers, scientists and industry professionals to an open forum where advances in the field of Cyber Security can be shared and examined. The conference is an ideal platform for keeping up with advances and changes to a consistently morphing field. Leading researchers and industry experts from around the globe will be presenting the latest studies through papers and oral presentations. ★Publication and Indexing All accepted papers will be published in the digital conference proceedings which will send to be indexed by all major citation databases such as Ei Compendex, Scopus, CPCI, Google Scholar, Cambridge Scientific Abstracts (CSA), Inspec, SCImago Journal & Country Rank (SJR), EBSCO, CrossRef, Thomson Reuters (WoS), etc. Selected paper after significant extension will be recommended to be published in journals. ★Program Preview/ Program at a glance August 13: Registration + Icebreaker Reception August 14: Opening Ceremony+ KN Speech+ Technical Sessions August 15: Technical Sessions+ Half day tour/Lab tours ★Paper Submission 1.Submit Via CMT: 2.Submit Via email directly to: csw@iaeeee.org ★CONTACT US Ms. Anna H. M. Wong Email: csw@iaeeee.org Website: www.cybersecurityworkshop.org Call for papers(http://www.cybersecurityworkshop.org/cfp.html): Submissions are solicited in, but not limited to, the following areas: Anti-malware techniques: detection, analysis, and prevention Security and privacy of mobile and smartphone platforms Anti-phishing, anti-blackmailing, anti-fraud techniques Security and privacy of systems based on machine learning and AI APTs, botnets, DDoS Security for cloud and edge computing Autonomous vehicles, industrial control systems Security for cyber-physical systems Cyber attack prevention, detection, investigation, and response Security for emerging networks Cyber-crime defense and forensics Security for future Internet architectures and designs Electronic voting, smart grid Security for large-scale, critical infrastructures Home networks, IoT, body-area networks, VANETs Security of Web-based applications and services Implementation, deployment and management of network security policies Social networking, crowd-sourcing Integrating security in network protocols Software and firmware analysis, customization, and transformation for systems security Privacy and anonymity in networks and distributed systems Software-Defined Networking Public key infrastructures, key management, certification, and revocation Tradeoffs between security and efficiency, usability, cost, and ethics Routing, naming, and management Trustworthy Computing software and hardware to secure networks and distributed systems Security and privacy for blockchains and cryptocurrencies Usable security and privacy |
|