Call for Papers

ICCSDF2020 provides a platform for researchers, scientists and academia from Cyber Security and Digital Forensics to meet and exchange ideas, collaborate and work together. It also proposes to focus on all aspects of Information Security, Cryptography and Risk analysis with modern and emerging network security techniques.

Topics of interest include but are not limited to:

Track 1- CRYPTOLOGY AND ITS APPLICATIONS

  • Privacy computing
  • Homomorphic encryption
  • Cryptographic obfuscation
  • Data Encryption Algorithms
  • Public and private key encryption techniques
  • Data Privacy and watermarking
  • Autonomous key management
  • Cloud and big data security
  • Security for software-defined and data center networks
  • Virtual Private Network (VPN)
  • Tracing Techniques in Internet
  • Data Leak Prevention (DLP)
  • Denial and Distribute
  • Denial of Service (DDoS)
  • Cryptographic Processors and Co-Processors
  • Control Systems/SCADA Security

Track 2- CYBER AND DIGITAL FORENSIC

  • Cyber-risk management
  • Evidentiary Aspects of Digital Forensics
  • Computer and networks forensics
  • Digital forensics tools and applications
  • Network Forensics and Traffic Analysis
  • Hardware Vulnerabilities and Device Forensics
  •  Anti-Forensics and Anti-Forensics Techniques
  • Data leakage, Data protection and Database forensics
  • Privacy issues in network forensics
  • Malware forensics and Anti-Malware techniques
  • Vulnerability Assessment and Penetration Testing (VAPT)
  • Open Web Application Security
  • Vulnerability on social media spaces
  • Cybersecurity for digital vehicles
  • Hacking pacemakers
  • Prediction of cyber attacks
  • Ransomware cyber weapon
  • Hacking Techniques and Related Issues
  • Honeypot
  • Virus Issues (Detection, Prevention)
  • Intrusion Detection Systems (IDS)
  • Intrusion Prevention systems (IPS)
  • Cybersecurity, laws and regulations

Track 3-NETWORK AND MOBILE SECURITY

  • Transport-Level Security
  • Wireless Network Security
  • IP Security
  • Electronic Mail security
  • Emails mining & authorship identification
  • Firewall Systems
  • Active Networks
  • Security in Grid
  • Embedded Systems Security
  • True and Pseudorandom Number Generators
  • Side Channel Attacks
  • Fault Attacks
  • Android Security
  • IOS Security
  • Web Monitoring
  • Malware Analysis
  •  Database security
  • Mobile App Privacy & Security

Track 4-BLOCK-CHAIN AND SOFTWARE TECHNOLOGIES

  • Blockchain and machine learning for cybersecurity
  • Anonymity of blockchain and cryptocurrencies
  • Threat categorization and threat detection
  • Blockchain and healthcare systems
  • Blockchain in supporting critical infrastructures
  • Digital Currency
  • Cryptocurrency
  • Privacy exposures and violations
  • Security and privacy in online social networks
  • Software Security and Secure Coding
  • Risk Assessment and Analysis