| |||||||||||||||
ICSFrontiers 2020 : 2020 2nd International Conference on Frontiers of Information and Communications Security (ICSFrontiers 2020) | |||||||||||||||
Link: http://www.icsfrontiers.org/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
★2020 2nd International Conference on Frontiers of Information and Communications Security (ICSFrontiers 2020) - Ei Compendex & Scopus—Call for paper
November 17-19, 2020|Newcastle upon Tyne, UK|Website: www.icsfrontiers.org ★Venue:Newcastle University, Newcastle upon Tyne, UK Newcastle University (formally the University of Newcastle upon Tyne) is a public research university in Newcastle upon Tyne in the North East of England. The university can trace its origins to a School of Medicine and Surgery (later the College of Medicine), established in 1834, and to the College of Physical Science (later renamed Armstrong College), founded in 1871. These two colleges came to form one division of the federal University of Durham, with the Durham Colleges forming the other. The Newcastle colleges merged to form King's College in 1937. In 1963, following an Act of Parliament, King's College became the University of Newcastle upon Tyne. ★Researchers, scientists, engineers and industry professionals will join together this year at ICSFrontiers 2020, where the latest research will be unveiled and groundbreaking research projects will be presented. The field of Frontiers of Information and Communications Security is entering an era of unprecedented change and innovation. ICSFrontiers 2020 presents one of 2020’s premiere opportunities to hear from and network with an international array of experts on the ever evolving state of the field. ★Publication and Indexing All accepted papers will be published in the digital conference proceedings which will send to be indexed by all major citation databases such as Ei Compendex, Scopus, CPCI, CPCI, Google Scholar, Cambridge Scientific Abstracts (CSA), Inspec, SCImago Journal & Country Rank (SJR), EBSCO, CrossRef, Thomson Reuters (WoS), etc. Selected papers after significant extension will be recommended to be published in Journals. ★Keynote Speakers Dr. JIE ZHANG, Newcastle University, UK Dr. Jeong Jin Hong, Manager, Data Scientist, Applied Materials, USA Assoc.Prof. Xin-She Yang, Middlesex University London, UK Hans Ulrik Staehr, CEO, MarketScape, Denmark ★Program Preview/ Program at a glance November 17, 2020: Registration + Icebreaker Reception November 18, 2020: Opening Ceremony+ KN Speech+ Technical Sessions November 19, 2020: Technical Sessions+ Half day tour/Lab tours ★Paper Submission 1. PDF version submit via CMT: https://cmt3.research.microsoft.com/ICFICS2020 2.Submit Via email directly to: icsfrontiers@iased.org ★CONTACT US Ms. Jane X. Q. Keung Email: icsfrontiers@iased.org Website: www.icsfrontiers.org Call for papers(http://www.icsfrontiers.org/cfp.html): Topics of interest for submission include, but are not limited to: Access control Language-based security Anonymity Malware and Anti-malware Anti-virus and anti-worms Mobile computing security and privacy Applied cryptography Network Functions Virtualization security Authentication and authorization Network security Biometric security Operating systems security Blockchain and digital currency security Post-snowden cryptography Cloud security Privacy protection Computer and digital forensics Privacy-preserving data mining Cyber-physical systems security Risk assessment Data and system integrity Risk evaluation and security Database security Security and privacy of Big Data Databased security Security for mobile computing Digital currency Security in wearable computing and Internet of things Distributed systems security Security management E-Commerce security and trust issues Security models Electronic commerce security Security models, metrics, and policies Embedded systems security Security of Critical Infrastructure Engineering issues of cryptographic and security systems Security protocols Engineering issues of cryptographic protocols and security systems Social networks security, privacy, and trust Fraud and cyber-crime Software Defined Networking security Hardware security Trust and reputation systems Identity access management Trusted computing and trustworthy computing technologies Industrial Control Systems security Trusted computing and trustworthy computing technology Information hiding and watermarking Underground economy Insider threat detection Usable security Intellectual property protection Usable security and privacy Intrusion detection Verification of security protocols IoT security and privacy Web security Key management and key recovery Wireless security |
|