posted by organizer: Carrie || 2652 views || tracked by 1 users: [display]

ICSFrontiers 2020 : 2020 2nd International Conference on Frontiers of Information and Communications Security (ICSFrontiers 2020)

FacebookTwitterLinkedInGoogle

Link: http://www.icsfrontiers.org/
 
When Nov 17, 2020 - Nov 19, 2020
Where Newcastle upon Tyne, UK
Submission Deadline Nov 5, 2020
Notification Due Nov 5, 2020
Final Version Due Nov 5, 2020
Categories    information   communications security
 

Call For Papers

★2020 2nd International Conference on Frontiers of Information and Communications Security (ICSFrontiers 2020)  - Ei Compendex & Scopus—Call for paper 
November 17-19, 2020|Newcastle upon Tyne, UK|Website: www.icsfrontiers.org

★Venue:Newcastle University, Newcastle upon Tyne, UK
Newcastle University (formally the University of Newcastle upon Tyne) is a public research university in Newcastle upon Tyne in the North East of England. The university can trace its origins to a School of Medicine and Surgery (later the College of Medicine), established in 1834, and to the College of Physical Science (later renamed Armstrong College), founded in 1871. These two colleges came to form one division of the federal University of Durham, with the Durham Colleges forming the other. The Newcastle colleges merged to form King's College in 1937. In 1963, following an Act of Parliament, King's College became the University of Newcastle upon Tyne.

★Researchers, scientists, engineers and industry professionals will join together this year at ICSFrontiers 2020, where the latest research will be unveiled and groundbreaking research projects will be presented. The field of Frontiers of Information and Communications Security is entering an era of unprecedented change and innovation. ICSFrontiers 2020 presents one of 2020’s premiere opportunities to hear from and network with an international array of experts on the ever evolving state of the field.

★Publication and Indexing
All accepted papers will be published in the digital conference proceedings which will send to be indexed by all major citation databases such as Ei Compendex, Scopus, CPCI, CPCI, Google Scholar, Cambridge Scientific Abstracts (CSA), Inspec, SCImago Journal & Country Rank (SJR), EBSCO, CrossRef, Thomson Reuters (WoS), etc.
Selected papers after significant extension will be recommended to be published in Journals.

★Keynote Speakers
Dr. JIE ZHANG, Newcastle University, UK
Dr. Jeong Jin Hong, Manager, Data Scientist, Applied Materials, USA
Assoc.Prof. Xin-She Yang, Middlesex University London, UK
Hans Ulrik Staehr, CEO, MarketScape, Denmark

★Program Preview/ Program at a glance
November 17, 2020: Registration + Icebreaker Reception
November 18, 2020: Opening Ceremony+ KN Speech+ Technical Sessions 
November 19, 2020: Technical Sessions+ Half day tour/Lab tours

★Paper Submission
1. PDF version submit via CMT: https://cmt3.research.microsoft.com/ICFICS2020
2.Submit Via email directly to: icsfrontiers@iased.org

★CONTACT US
Ms. Jane X. Q. Keung
Email: icsfrontiers@iased.org
Website: www.icsfrontiers.org


Call for papers(http://www.icsfrontiers.org/cfp.html):

Topics of interest for submission include, but are not limited to:

Access control

Language-based security

Anonymity

Malware and Anti-malware

Anti-virus and anti-worms

Mobile computing security and privacy

Applied cryptography

Network Functions Virtualization security

Authentication and authorization

Network security

Biometric security

Operating systems security

Blockchain and digital currency security

Post-snowden cryptography

Cloud security

Privacy protection

Computer and digital forensics

Privacy-preserving data mining

Cyber-physical systems security

Risk assessment

Data and system integrity

Risk evaluation and security

Database security

Security and privacy of Big Data

Databased security

Security for mobile computing

Digital currency

Security in wearable computing and Internet of things

Distributed systems security

Security management

E-Commerce security and trust issues

Security models

Electronic commerce security

Security models, metrics, and policies

Embedded systems security

Security of Critical Infrastructure

Engineering issues of cryptographic and security systems

Security protocols

Engineering issues of cryptographic protocols and security systems

Social networks security, privacy, and trust

Fraud and cyber-crime

Software Defined Networking security

Hardware security

Trust and reputation systems

Identity access management

Trusted computing and trustworthy computing technologies

Industrial Control Systems security

Trusted computing and trustworthy computing technology

Information hiding and watermarking

Underground economy

Insider threat detection

Usable security

Intellectual property protection

Usable security and privacy

Intrusion detection

Verification of security protocols

IoT security and privacy

Web security

Key management and key recovery

Wireless security

Related Resources

ACM ICNCC 2024   ACM--2024 The 13th International Conference on Networks, Communication and Computing (ICNCC 2024)
ISEEIE 2024   2024 4th International Symposium on Electrical, Electronics and Information Engineering (ISEEIE 2024)
ACM ICCNS 2024   ACM--2024 14th International Conference on Communication and Network Security (ICCNS 2024)
ACM-Ei/Scopus-CNIOT 2024   2024 5th International Conference on Computing, Networks and Internet of Things (CNIOT 2024) -EI Compendex
ICCNS 2024   ACM--2024 14th International Conference on Communication and Network Security (ICCNS 2024)
ICEST 2024   59th International Scientific Conference on Information, Communication and Energy Systems and Technologies
FCSIT 2024   2024 3rd Eurasian Conference on Frontiers of Computer Science and Information Technology
Information, Medium & Society 2024   Information, Medium & Society: Twenty-second International Conference on Publishing Studies
InCIT 2024   The 8th International Conference on Information Technology
ICT-DM 2024   The 9th International Conference on Information and Communication Technologies for Disaster Management