posted by organizer: Carrie || 1167 views || tracked by 2 users: [display]

ICSFrontiers 2020 : 2020 2nd International Conference on Frontiers of Information and Communications Security (ICSFrontiers 2020)

FacebookTwitterLinkedInGoogle

Link: http://www.icsfrontiers.org/
 
When Aug 10, 2020 - Aug 12, 2020
Where Newcastle upon Tyne, UK
Submission Deadline May 31, 2020
Notification Due May 31, 2020
Final Version Due May 31, 2020
Categories    information   communications security
 

Call For Papers

★2020 2nd International Conference on Frontiers of Information and Communications Security (ICSFrontiers 2020)  - Ei Compendex & Scopus—Call for paper 
August 10-12, 2020|Newcastle upon Tyne, UK|Website: www.icsfrontiers.org

★Venue:Newcastle University, Newcastle upon Tyne, UK
Newcastle University (formally the University of Newcastle upon Tyne) is a public research university in Newcastle upon Tyne in the North East of England. The university can trace its origins to a School of Medicine and Surgery (later the College of Medicine), established in 1834, and to the College of Physical Science (later renamed Armstrong College), founded in 1871. These two colleges came to form one division of the federal University of Durham, with the Durham Colleges forming the other. The Newcastle colleges merged to form King's College in 1937. In 1963, following an Act of Parliament, King's College became the University of Newcastle upon Tyne.

★Researchers, scientists, engineers and industry professionals will join together this year at ICSFrontiers 2020, where the latest research will be unveiled and groundbreaking research projects will be presented. The field of Frontiers of Information and Communications Security is entering an era of unprecedented change and innovation. ICSFrontiers 2020 presents one of 2020’s premiere opportunities to hear from and network with an international array of experts on the ever evolving state of the field.

★Publication and Indexing
All accepted papers will be published in the digital conference proceedings which will send to be indexed by all major citation databases such as Ei Compendex, Scopus, Google Scholar, Cambridge Scientific Abstracts (CSA), Inspec, SCImago Journal & Country Rank (SJR), EBSCO, CrossRef, Thomson Reuters (WoS), etc.
A selection of papers will be recommended to be published in journals.

★Keynote Speakers
Dr. JIE ZHANG, Newcastle University, UK
Dr. Jeong Jin Hong, Manager, Data Scientist, Applied Materials, USA
Assoc.Prof. Xin-She Yang, Middlesex University London, UK

★Program Preview/ Program at a glance
August 10, 2020: Registration + Icebreaker Reception
August 11, 2020: Opening Ceremony+ KN Speech+ Technical Sessions 
August 12, 2020: Technical Sessions+ Half day tour/Lab tours

★Paper Submission
1. PDF version submit via CMT: https://cmt3.research.microsoft.com/ICFICS2020
2.Submit Via email directly to: icsfrontiers@iased.org

★CONTACT US
Ms. Jane X. Q. Keung
Email: icsfrontiers@iased.org
Website: www.icsfrontiers.org


Call for papers(http://www.icsfrontiers.org/cfp.html):

Topics of interest for submission include, but are not limited to:

Access control

Language-based security

Anonymity

Malware and Anti-malware

Anti-virus and anti-worms

Mobile computing security and privacy

Applied cryptography

Network Functions Virtualization security

Authentication and authorization

Network security

Biometric security

Operating systems security

Blockchain and digital currency security

Post-snowden cryptography

Cloud security

Privacy protection

Computer and digital forensics

Privacy-preserving data mining

Cyber-physical systems security

Risk assessment

Data and system integrity

Risk evaluation and security

Database security

Security and privacy of Big Data

Databased security

Security for mobile computing

Digital currency

Security in wearable computing and Internet of things

Distributed systems security

Security management

E-Commerce security and trust issues

Security models

Electronic commerce security

Security models, metrics, and policies

Embedded systems security

Security of Critical Infrastructure

Engineering issues of cryptographic and security systems

Security protocols

Engineering issues of cryptographic protocols and security systems

Social networks security, privacy, and trust

Fraud and cyber-crime

Software Defined Networking security

Hardware security

Trust and reputation systems

Identity access management

Trusted computing and trustworthy computing technologies

Industrial Control Systems security

Trusted computing and trustworthy computing technology

Information hiding and watermarking

Underground economy

Insider threat detection

Usable security

Intellectual property protection

Usable security and privacy

Intrusion detection

Verification of security protocols

IoT security and privacy

Web security

Key management and key recovery

Wireless security

Related Resources

IJGCA 2020   International Journal of Grid Computing & Applications
FCSIT 2020   2020 2nd Euro-Asia Conference on Frontiers of Computer Science and Information Technology (FCSIT 2020)
EI-ICoTSC 2020   2020 International Conference on Transport and Smart Cities (ICoTSC 2020)
EI-IARCE 2020   2020 International Conference on Industrial Automation, Robotics and Control Engineering( IARCE 2020)
ER 2020   39th International Conference on Conceptual Modeling
NISecurity 2021   2021 International Conference on Network and Information Security (NISecurity 2021)
IEEE HotICN--Ei, scopus 2020   2020 3rd IEEE International Conference on Hot Information-Centric Networking (IEEE HotICN 2020)--Ei Compendex, scopus
IEEE 21st IRI 2020   IEEE 21st International Conference on Information Integration and Reuse
ICNT--Ei Compendex and Scopus 2020   2020 3rd International Conference on Network Technology (ICNT 2020)--Ei Compendex, Scopus
ICCNS--Ei Compendex and Scopus 2020   2020 the 10th International Conference on Communication and Network Security (ICCNS 2020)--EI Compendex, Scopus