ICCSDF2021: International Conference on Cyber Security and Digital Forensics 2021 The NorthCap University Gurugram, India, April 3-4, 2021 |
Conference website | https://iccsdf2021.ncuindia.edu/ |
Submission link | https://easychair.org/conferences/?conf=iccsdf2021 |
Poster | download |
Abstract registration deadline | February 5, 2021 |
Submission deadline | February 5, 2021 |
Acceptance Notification | February 20, 2021 |
Camera Ready Paper | March 5, 2021 |
ICCSDF-2021 is an international conference that aims to bring together leading academic scientists, researchers, and Industrialists to exchange and share their experiences and research results in all aspects of Cyber Security and Digital Forensics. This conference was conceived after analyzing the increase in the prevalence of cybercrime attacks on business organizations, government infrastructures, and individuals. In fact, Cyber Security is becoming an increasingly central facet of national security strategy. Both the private and public sectors are relying on cybersecurity professionals to keep personal and professional information safe.
There are a lot of people working collectively in the field of Cyber Security, finding out and diving deep into the ocean of cyber and its related threats and security. With this conference, we encourage the community of multinational researchers to showcase the research work done in their field of Cyber Security. The conference will provide opportunities for researchers to learn about the latest developments through scientific information interchange in the field of Cyber Security and Digital Forensics. The conference will also include keynote lectures and panel discussions by eminent speakers and industry people from different areas.
Strengths of our Conference
- It encourages national and international contribution and collaboration
- It recognizes the outstanding contributions of individuals, and organizations
- The presenters will get a chance to know interdisciplinary research in state-of-the-art methodologies and technologies
- It brings a competitive and motivating environment that will enhance their work towards the upcoming topics
Publications |
ICCSDF 2021 proceedings will be published by Springer in the book series “Lecture Notes on Data Engineering and Communications Technologies”.
Submission Guidelines |
Only original papers that have not been published or submitted for publication elsewhere will be considered. All accepted papers MUST be presented at the conference by at least one of the authors, else the paper will not be published in the proceedings. The maximum page limit of the conference paper is 8 pages.
VenueThe NorthCap University, Sector 23-A, Gurugram, Haryana, 122017 University Website: https://www.ncuindia.edu/ Conference Website: http://iccsdf2021.ncuindia.edu/ ContactAny Query related to submissions and registration should be emailed to iccsdf2021@ncuinida.edu or may contact following Organising Chairs Dr. Mehak Khurana: 9891599137, Dr. Pooja Sapra: 9582888389 Tracks and TopicsTopics of interest include but are not limited to: Track 1- Cryptology and Its Applications Privacy computing, Homomorphic encryption, Cryptographic obfuscation, Data Encryption Algorithms, Public and private key encryption techniques, Data Privacy and watermarking, Autonomous key management, Cloud and big data security, Security for software-defined and data center networks, Virtual Private Network (VPN), Tracing Techniques in the Internet, Data Leak Prevention (DLP), Denial and Distributed Denial of Service (DDoS), Cryptographic Processors and Co-Processors, Control Systems/SCADA Security Track 2- Cyber Security and Digital Forensic Cyber-risk management, Evidentiary Aspects of Digital Forensics, Computer and networks forensics, Digital forensics tools and applications, Network Forensics and Traffic Analysis, Hardware Vulnerabilities and Device Forensics, Anti-Forensics and Anti-Forensics Techniques, Data leakage, Data protection, and Database forensics, Privacy issues in network forensics, Malware forensics and Anti-Malware techniques, VAPT, Open Web Application Security, Vulnerability on social media spaces, Cybersecurity for digital vehicles, Hacking pacemakers, Prediction of cyberattacks, Ransomware cyberweapon, Hacking Techniques and Related Issues, Honeypot, Virus Issues (Detection, Prevention), Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), Cybersecurity, laws, and regulations. Track 3-Network and Mobile Security Transport-Level Security, Wireless Network Security, IP Security, Electronic Mail Security, Emails mining & authorship identification, Firewall Systems, Active Networks, Security in Grid, Embedded Systems Security, True and Pseudorandom Number Generators, Side-Channel Attacks, Fault Attacks, Android Security, IOS Security, Web Monitoring, Malware Analysis, Database security, Mobile App Privacy & Security Track 4-Blockchain and Software Technologies Blockchain and machine learning for cybersecurity, Anonymity of blockchain and cryptocurrencies, Threat categorization and threat detection, Blockchain and healthcare systems, Blockchain in supporting critical infrastructures, Digital Currency, Cryptocurrency, Privacy exposures, and violations, Security and privacy in online social networks, Software Security and Secure Coding, Risk Assessment and Analysis. Technical Partners
|