posted by user: eminecngz || 1554 views || tracked by 4 users: [display]

ICONSEC 2024 : 3rd International Conference On Cyber Security and Digital Forensics

FacebookTwitterLinkedInGoogle

Link: https://iconsec.yalova.edu.tr/
 
When Sep 2, 2024 - Sep 6, 2024
Where Pristina, KOSOVO
Submission Deadline Sep 1, 2024
Categories    cyber security   network security   digital forensics   mobile security
 

Call For Papers

★Full Name: 3rd International Conference On Cyber Security and Digital Forensics
★Abbreviation: (ICONSEC'24)
★Website: https://iconsec.yalova.edu.tr/
★Date: September 2-6, 2024
★Place: Pristina, Kosovo
★Supported by Yalova University Cyber Security Application and Research Center

★Contact us:
Website: https://iconsec.yalova.edu.tr/
Email: iconsec@yalova.edu.tr

★★Main Topics★★
CRYPTOLOGY AND ITS APPLICATIONS
-Privacy computing
-Homomorphic encryption
-Cryptographic obfuscation
-Data Encryption Algorithms
-Public and private key encryption techniques
-Data Privacy and watermarking
-Autonomous key management
-Cloud and big data security
-Security for software-defined and data center networks
-Virtual Private Network (VPN)
-Tracing Techniques in Internet
-Data Leak Prevention (DLP)
-Denial of Service (DoS) and Distributed Denial of Service (DDoS)
-Cryptographic Processors and Co-Processors
-Control Systems/SCADA Security

CYBER AND DIGITAL FORENSICS
-Cyber-risk management
-Evidentiary Aspects of Digital Forensics
-Computer and networks forensics
-Digital forensics tools and applications
-Network Forensics and Traffic Analysis
-Hardware Vulnerabilities and Device Forensics
-Anti-Forensics and Anti-Forensics Techniques
-Data leakage, Data protection and Database forensics
-Privacy issues in network forensics
-Malware forensics and Anti-Malware techniques
-Vulnerability Assessment and Penetration Testing (VAPT)
-Open Web Application Security
-Vulnerability on social media spaces
-Cybersecurity for digital vehicles
-Hacking pacemakers
-Prediction of cyber attacks
-Ransomware cyber weapon
-Hacking Techniques and Related Issues
-Honeypot
-Virus Issues (Detection, Prevention)
-Intrusion Detection Systems (IDS)
-Intrusion Prevention systems (IPS)
-Cybersecurity, laws and regulations

NETWORK AND MOBILE SECURITY
-Transport-Level Security
-Wireless Network Security
-IP Security
-Electronic Mail security
-Emails mining & authorship identification
-Firewall Systems
-Active Networks
-Security in Grid
-Embedded Systems Security
-True and Pseudorandom Number Generators
-Side Channel Attacks
-Fault Attacks
-Android Security
-IOS Security
-Web Monitoring
-Malware Analysis
-Database security
-Mobile App Privacy & Security

BLOCK-CHAIN AND SOFTWARE TECHNOLOGIES
-Blockchain and machine learning for cybersecurity
-Anonymity of blockchain and cryptocurrencies
-Threat categorization and threat detection
-Blockchain and healthcare systems
-Blockchain in supporting critical infrastructures
-Digital Currency
-Cryptocurrency
-Privacy exposures and violations
-Security and privacy in online social networks
-Software Security and Secure Coding
-Risk Assessment and Analysis

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CYBER 2025   The Tenth International Conference on Cyber-Technologies and Cyber-Systems
NTIJ 2025   Nanoscience and Technology: An International Journal
EDTconf 2025   2nd International Conference on Engineering Digital Twins
MarCaS 2025   LCN MarCaS 2025 : 3rd IEEE LCN Special Track on Maritime Communication and Security (MarCaS)
NC 2025   13th International Conference of Networks and Communications
ADIP--EI 2025   2025 7th Asia Digital Image Processing Conference (ADIP 2025)
EI/Scopus-ICDEAI 2025   2025 International Conference on Digital Education and Artificial Intelligence -EI/Scopus
Collection_DependXAIdata 2025   Topical Collection on Dependable and Reliable Datasets for Explainable Artificial Intelligence and Cyber Security Research
LoDiSA 2025   3rd Workshop on Low-Cost Digital Solutions for Industrial Automation