posted by organizer: Carrie || 1437 views || tracked by 2 users: [display]

ICSFrontiers 2020 : 2020 2nd International Conference on Frontiers of Information and Communications Security (ICSFrontiers 2020)


When Aug 10, 2020 - Aug 12, 2020
Where Newcastle upon Tyne, UK
Submission Deadline Jul 10, 2020
Notification Due Jul 10, 2020
Final Version Due Jul 10, 2020
Categories    information   communications security

Call For Papers

★2020 2nd International Conference on Frontiers of Information and Communications Security (ICSFrontiers 2020)  - Ei Compendex & Scopus—Call for paper 
August 10-12, 2020|Newcastle upon Tyne, UK|Website:

★Venue:Newcastle University, Newcastle upon Tyne, UK
Newcastle University (formally the University of Newcastle upon Tyne) is a public research university in Newcastle upon Tyne in the North East of England. The university can trace its origins to a School of Medicine and Surgery (later the College of Medicine), established in 1834, and to the College of Physical Science (later renamed Armstrong College), founded in 1871. These two colleges came to form one division of the federal University of Durham, with the Durham Colleges forming the other. The Newcastle colleges merged to form King's College in 1937. In 1963, following an Act of Parliament, King's College became the University of Newcastle upon Tyne.

★Researchers, scientists, engineers and industry professionals will join together this year at ICSFrontiers 2020, where the latest research will be unveiled and groundbreaking research projects will be presented. The field of Frontiers of Information and Communications Security is entering an era of unprecedented change and innovation. ICSFrontiers 2020 presents one of 2020’s premiere opportunities to hear from and network with an international array of experts on the ever evolving state of the field.

★Publication and Indexing
All accepted papers will be published in the digital conference proceedings which will send to be indexed by all major citation databases such as Ei Compendex, Scopus, Google Scholar, Cambridge Scientific Abstracts (CSA), Inspec, SCImago Journal & Country Rank (SJR), EBSCO, CrossRef, Thomson Reuters (WoS), etc.
A selection of papers will be recommended to be published in journals.

★Keynote Speakers
Dr. JIE ZHANG, Newcastle University, UK
Dr. Jeong Jin Hong, Manager, Data Scientist, Applied Materials, USA
Assoc.Prof. Xin-She Yang, Middlesex University London, UK
Hans Ulrik Staehr, CEO, MarketScape, Denmark

★Program Preview/ Program at a glance
August 10, 2020: Registration + Icebreaker Reception
August 11, 2020: Opening Ceremony+ KN Speech+ Technical Sessions 
August 12, 2020: Technical Sessions+ Half day tour/Lab tours

★Paper Submission
1. PDF version submit via CMT:
2.Submit Via email directly to:

Ms. Jane X. Q. Keung

Call for papers(

Topics of interest for submission include, but are not limited to:

Access control

Language-based security


Malware and Anti-malware

Anti-virus and anti-worms

Mobile computing security and privacy

Applied cryptography

Network Functions Virtualization security

Authentication and authorization

Network security

Biometric security

Operating systems security

Blockchain and digital currency security

Post-snowden cryptography

Cloud security

Privacy protection

Computer and digital forensics

Privacy-preserving data mining

Cyber-physical systems security

Risk assessment

Data and system integrity

Risk evaluation and security

Database security

Security and privacy of Big Data

Databased security

Security for mobile computing

Digital currency

Security in wearable computing and Internet of things

Distributed systems security

Security management

E-Commerce security and trust issues

Security models

Electronic commerce security

Security models, metrics, and policies

Embedded systems security

Security of Critical Infrastructure

Engineering issues of cryptographic and security systems

Security protocols

Engineering issues of cryptographic protocols and security systems

Social networks security, privacy, and trust

Fraud and cyber-crime

Software Defined Networking security

Hardware security

Trust and reputation systems

Identity access management

Trusted computing and trustworthy computing technologies

Industrial Control Systems security

Trusted computing and trustworthy computing technology

Information hiding and watermarking

Underground economy

Insider threat detection

Usable security

Intellectual property protection

Usable security and privacy

Intrusion detection

Verification of security protocols

IoT security and privacy

Web security

Key management and key recovery

Wireless security

Related Resources

FCSIT 2020   2020 2nd Euro-Asia Conference on Frontiers of Computer Science and Information Technology (FCSIT 2020)
eKNOW 2020   The Twelfth International Conference on Information, Process, and Knowledge Management
CCNC 2021   IEEE Consumer Communications & Networking Conference
EI-ICoTSC 2020   2020 International Conference on Transport and Smart Cities (ICoTSC 2020)
TrustCom 2020   The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
JISA-CYBER-SEC 2020   Special Issue on Trends in Cybersecurity, Journal of Information Security and Applications, Elsevier
ECICT 2020   2020 2nd Euro-Asia Conference on Information and Communication Technology (ECICT 2020)
NISecurity 2021   2021 International Conference on Network and Information Security (NISecurity 2021)
IVSP--EI, Scopus 2021   2021 3rd International Conference on Image, Video and Signal Processing (IVSP 2021)--Ei Compendex, Scopus
JCICE 2021   2021 4th International Joint Conference on Information and Communication Engineering (JCICE 2021)