posted by organizer: Carrie || 2026 views || tracked by 2 users: [display]

ICSFrontiers 2020 : 2020 2nd International Conference on Frontiers of Information and Communications Security (ICSFrontiers 2020)

FacebookTwitterLinkedInGoogle

Link: http://www.icsfrontiers.org/
 
When Nov 17, 2020 - Nov 19, 2020
Where Newcastle upon Tyne, UK
Submission Deadline Nov 5, 2020
Notification Due Nov 5, 2020
Final Version Due Nov 5, 2020
Categories    information   communications security
 

Call For Papers

★2020 2nd International Conference on Frontiers of Information and Communications Security (ICSFrontiers 2020)  - Ei Compendex & Scopus—Call for paper 
November 17-19, 2020|Newcastle upon Tyne, UK|Website: www.icsfrontiers.org

★Venue:Newcastle University, Newcastle upon Tyne, UK
Newcastle University (formally the University of Newcastle upon Tyne) is a public research university in Newcastle upon Tyne in the North East of England. The university can trace its origins to a School of Medicine and Surgery (later the College of Medicine), established in 1834, and to the College of Physical Science (later renamed Armstrong College), founded in 1871. These two colleges came to form one division of the federal University of Durham, with the Durham Colleges forming the other. The Newcastle colleges merged to form King's College in 1937. In 1963, following an Act of Parliament, King's College became the University of Newcastle upon Tyne.

★Researchers, scientists, engineers and industry professionals will join together this year at ICSFrontiers 2020, where the latest research will be unveiled and groundbreaking research projects will be presented. The field of Frontiers of Information and Communications Security is entering an era of unprecedented change and innovation. ICSFrontiers 2020 presents one of 2020’s premiere opportunities to hear from and network with an international array of experts on the ever evolving state of the field.

★Publication and Indexing
All accepted papers will be published in the digital conference proceedings which will send to be indexed by all major citation databases such as Ei Compendex, Scopus, CPCI, CPCI, Google Scholar, Cambridge Scientific Abstracts (CSA), Inspec, SCImago Journal & Country Rank (SJR), EBSCO, CrossRef, Thomson Reuters (WoS), etc.
Selected papers after significant extension will be recommended to be published in Journals.

★Keynote Speakers
Dr. JIE ZHANG, Newcastle University, UK
Dr. Jeong Jin Hong, Manager, Data Scientist, Applied Materials, USA
Assoc.Prof. Xin-She Yang, Middlesex University London, UK
Hans Ulrik Staehr, CEO, MarketScape, Denmark

★Program Preview/ Program at a glance
November 17, 2020: Registration + Icebreaker Reception
November 18, 2020: Opening Ceremony+ KN Speech+ Technical Sessions 
November 19, 2020: Technical Sessions+ Half day tour/Lab tours

★Paper Submission
1. PDF version submit via CMT: https://cmt3.research.microsoft.com/ICFICS2020
2.Submit Via email directly to: icsfrontiers@iased.org

★CONTACT US
Ms. Jane X. Q. Keung
Email: icsfrontiers@iased.org
Website: www.icsfrontiers.org


Call for papers(http://www.icsfrontiers.org/cfp.html):

Topics of interest for submission include, but are not limited to:

Access control

Language-based security

Anonymity

Malware and Anti-malware

Anti-virus and anti-worms

Mobile computing security and privacy

Applied cryptography

Network Functions Virtualization security

Authentication and authorization

Network security

Biometric security

Operating systems security

Blockchain and digital currency security

Post-snowden cryptography

Cloud security

Privacy protection

Computer and digital forensics

Privacy-preserving data mining

Cyber-physical systems security

Risk assessment

Data and system integrity

Risk evaluation and security

Database security

Security and privacy of Big Data

Databased security

Security for mobile computing

Digital currency

Security in wearable computing and Internet of things

Distributed systems security

Security management

E-Commerce security and trust issues

Security models

Electronic commerce security

Security models, metrics, and policies

Embedded systems security

Security of Critical Infrastructure

Engineering issues of cryptographic and security systems

Security protocols

Engineering issues of cryptographic protocols and security systems

Social networks security, privacy, and trust

Fraud and cyber-crime

Software Defined Networking security

Hardware security

Trust and reputation systems

Identity access management

Trusted computing and trustworthy computing technologies

Industrial Control Systems security

Trusted computing and trustworthy computing technology

Information hiding and watermarking

Underground economy

Insider threat detection

Usable security

Intellectual property protection

Usable security and privacy

Intrusion detection

Verification of security protocols

IoT security and privacy

Web security

Key management and key recovery

Wireless security

Related Resources

ICFSP--IEEE, Ei, Scopus 2021   IEEE--2021 6th International Conference on Frontiers of Signal Processing (ICFSP 2021)--Ei Compendex, Scopus
ECICT 2020   2020 2nd Euro-Asia Conference on Information and Communication Technology (ECICT 2020)
IEEE--ICFSP--Ei Compendex, Scopus 2021   IEEE--2021 6th International Conference on Frontiers of Signal Processing (ICFSP 2021)--Ei Compendex, Scopus
ICAITA 2021   10th International Conference on Advanced Information Technologies and Applications
CCNC 2021   IEEE Consumer Communications & Networking Conference
JCICE 2021   2021 4th International Joint Conference on Information and Communication Engineering (JCICE 2021)
ICCIS--IEEE, Ei and Scopus 2021   IEEE--2021 5th International Conference on Communication and Information Systems (ICCIS 2020)--Ei Compendex, Scopus
IEEE--ICCIS--Ei and Scopus 2021   IEEE--2021 5th International Conference on Communication and Information Systems (ICCIS 2020)--Ei Compendex, Scopus
ICSRS--Scopus & EI 2021   2021 5th International Conference on System Reliability and Safety (ICSRS 2021)--Scopus & EI Compendex
CRITIS 2021   The 16th International Conference on Critical Information Infrastructures Security