| |||||||||||||||
CSNet 2020 : 4th Cyber Security in Networking Conference | |||||||||||||||
Link: https://csnet-conference.org/2020/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Cybersecurity is the set of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, security includes both cybersecurity and physical security.
Areas of interest include, but are not limited to: Attacks on Virtualized Systems Balancing Trust and Control Blockchain technology and CyberSecurity Cell Phones vulnerabilities Cloud of Security Cognitive Security Concealing Malware (Trojan Horses-Root kits-Logic Bombs) Cyber-attacks Cloud-oriented vs Cyber defense Cloud-oriented Cybersecurity Data Center Network Control, Security and Optimization Demilitarization Zone (DMZ) Designing a Security Policy Disaster recovery plan Enterprise Wireless Security Hardware-Based Attacks Host Network Intrusion Prevention Systems Industrial control system information security Infection Malware Integrated Network Security Hardware Internet Content Filters Internet security issues Network and operating system administration for security purposes Network Attached Storage (NAS) Network Intrusion Detection Systems (NIDS) Network security design Organizational Security Policies Secure Network through Network Design Security in Internet of Things Security in Fog/edge Computing Security of Virtual Machines Security, trust and privacy challenges Smart City Security Smart Grid security Cyber Physical System (CPS) security Software-Based Attacks System security for wired and wireless networks Virtual firewalls Privacy and responsibility in digital age Cybersecurity and human rights Submission Guidlines: Submitted papers must represent original material that is not currently under review in any other conference or journal, and has not been previously published. All submissions should be written in English with maximum of eight (8) printed pages (in Two-Column IEEE Conference Format), including text, figures and references. Papers should be submitted through EDAS https://edas.info/N27274 All accepted and presented papers will be published in IEEE Xplore Digital Library Best papers will be considered for fast-track publication in the Annals of Telecommunications (Springer, ISI-indexed) |
|