ICCS 2018 4th International Conference on Cyber Security
Suresh Gyan Vihar University

Jaipur Rajasthan

26 October 2018 - 27 October 2018

http://easychair.org/cfp/ICCS_2018

ICCS 2018 4th International Conference on Cyber Security

Event Description

4TH INTERNATIONAL CONFERENCE ON CYBER SECURITY (ICCS) 2018 is an opportunity for academics, students, scholars, scientists and engineers from around the world who are involved in the study, management, development and implementation of systems and concepts to combat information warfare or to improve information systems security to come together and exchange ideas.This conference is trying to establish itself as a key event for the understanding of threats and risks to information systems, the development of a strong security culture, and incident investigation.

ll papers must be original and not simultaneously submitted to another journal or conference. Full paper manuscripts must be in English of up to 7 pages as per instructions given below (Pages can be more than 7, by paying extra charges).

Manuscripts should include author names and contact information. 

The text should be double column, single-spaced, using a standard paper size (8-1/2” x 11” or A4), with 12-point font. 

Footnotes and “notes” for tables and figures can be single spaced and in smaller font (no less than 10 point). 

List of Topics

  • Cyber security

  • Big Data Techniques in Cyber Security
  • Forensic Analysis of Cyber Crimes
  • Secure Design, Tooling, and Engineering
  • Security and Trust of Citizens
  • Database security

  • Big Data Communication and Analytics
  • Data Sharing and Infrastructures
  • Quality of Service (QoS)
  • Cloud security

  • Mobile Cloud
  • Cloud and Systems Management
  • Cloud Computing and Networking
  • Network Security

  • Digital Signature Techniques
  • Advance Persistent Threat
  • Network Protocols
  • Next-generation Communication Networks
  • Information-Centric Networking
  • Data Network Management
  • Network Architectures
  • Modeling & Simulation of communication networks and Systems
  • Network Monitoring and Control
  • Traffic Measurement, Analysis, Modeling and Visualization
  • Routing and Flow Control in LANs, WANs and PANs
  • Sensor Nets and Embedded Systems
  • Network applications (web, multimedia streaming, gaming, etc.)
  • Social Computing and Networks
  • Software-Defined Networking
  • Secure Routing, Naming/Addressing, Network Management
  • Security & Privacy in Pervasive and Ubiquitous Computing, e.g., RFIDs
  • Security & Privacy in Peer-to-Peer and Overlay Networks
  • Security & Privacy for Emerging Technologies: VoIP, Social Networks
  • Security & Isolation in Cloud, Data Center and Software-Defined Networks
  •  

    Secure Key Distribution

  • Secret Sharing
  • Key Management
  • Authentication Systems: Public Key Infrastructures, Key Management, Credential Management
  • Secure User Authentication
  • Email security

  • Spam protection
  • Hardware Security

  • Cyber Physical System 
  • Mobile Security

  • E-wallet
    • e-wallet security and transaction reversal
    • interoperability issues in e-wallet
    • security of  biometric based transactions
    • Security in Mobile Networks
    • Mobile & Ubiquitous Communication Networks
  • IOT security

  • Security of IoT Services
  • IoT Service Architectures and Platforms
  •  Real-Time IoT Service Security Analytics and Forensics
  •  Organizational Privacy and Security Policies
  •  Governance for IoT Services
  •  Social Aspects of IoT Security
  •  Security and Privacy Threats to IoT Services and Users
  •  Accountability and Trust Management
  •  Legal Considerations and Regulations
  •  Case Studies and Applications
  • Securing Critical Infrastructure against Cyber Attacks

  • Control System Cyber security
  • Communications and Network Protocol Security in Control Systems and Instrumentation
  • Security of nuclear power plants
  • Energy Infrastructure Security
  • Transport Infrastructure Security
  • Security in Optical Networks

  • Optical Network Security
  • Convergence of optical and wireless access Networks
  • Storage Networks
  • Optical Network Virtualization
  • IP-WDM integration
  • Software-defined optical networks for grid computing 
  • Security of medical devices

  • Advances in Health-care IT security and privacy (including implantable medical devices and nano-sensors)
  • Human factors in biomedical security and privacy
  • Networked medical device security
  • Green cryptography for medical data security
  • Smart hospital security and spatial/temporal privacy preservation
  • Advances in cyber-physical medical systems security
  • Emerging cryptographic computing schemes for biomedical security
  • Post-quantum cryptography
  • Big data security and privacy-preserving medical data mining
  • Novel anonymous sensitive data handling and restricted computing methods for sensitive biomedical data
  • Novel deeply-embedded biomedical computing reliability 

Committees

Program Committee

  • Dr. E. S. Pilli, MNIT, Jaipur
  • Dr. Neeraj Kumar, SGVU, Jaipur
  • Dr. O S Lamba, SGVU, Jaipur
  • Dr.  Nagendra Swarnkar, SGVU, Jaipur
  • Dr. Mukesh Kr, Gupta, SGVU, Jaipur
  • Dr. Rashid Hussain, SGVU, Jaipur

Visit Fest Website...

Departments That Are Eligible for Participated In this Fest :
  • Computer Science and Engineering
  • Information Technology
Event Categories In This Fest:
  • Conference

Event Organizers Details

..,

faculty convener,

contact no: ..,

email-id: iccs@iaasse.org,

Facebook Link


Events by Departments