Call For Papers
Daffodil International University (DIU) is going to organize an international conference, named International Conference on Cyber Security and Computer Science (ICONCS 2020). This conference devotes a platform for academics, researchers and industrial entities to share knowledge and ideas, and increases networking possibilities within research communities. In this platform researchers present their research findings related to theoretical and fundamental interest concerning industrial applications, emerging instrumental techniques which have some practical application to an aspect of human endeavor and explore any other potential benefits that might be contribute to the better future.
ICONCS 2020 dedicated to publish original, unpublished (not under consideration for publication elsewhere, even submit for review) and quality research. Following are the scope of ICONCS 2020.
Download Poster: Click here
Major tracks of interest include, but not limited to, are:
Cyber Security
- Access control
- Application security
- Attacks and defenses
- Computer security
- Cryptography
- Biometric and watermarking
- Security aspects of alternative currencies
- Cloud and web security
- Distributed systems security
- Design and deployment of secure services
- Digital forensics
- Embedded systems security
- Hardware security
- Information risk management
- Internet of things (IOT) security
- Intrusion detection and prevention system
- Language-based security
- Malware
- Mobile security
- Network security
- New exploits
- Privacy and anonymity
- Protocol security
- Security architectures
- Secure composition and adaptation of services
- Security and usability
- Security aspects of web application deployment
- Security architecture in web application development
- Security automation tools
- Security in continuous deployment
- Static and dynamic analysis for security
- System security
- Side channel attacks
- Surveillance and anti-surveillance
|
- Trust management
- Vulnerability detection model/ techniques
- Vulnerability prevention techniques
- Web application security requirements
- Web application security testing
Computer Science
- Algorithms
- Fuzzy logic
- Genetic algorithms
- Artificial intelligence
- Big data and data mining
- Bioinformatics and scientific
- Blockchain Technology
- Computer based education
- Computing ethics
- Computer networks
- Censorship and censorship-resistance
- Data communication systems
- Expert systems
- E-commerce and e-governance
- Human-computer interaction
- Image processing
- Information systems and Management
- Knowledge data engineering
- Photonic
- Reverse-engineering and code obfuscation
- Technology management
- Verification and assurance techniques for security properties
- Wireless communications
- Software Engineering Technologies and Applications
|