(Click here to download CFP in PDF format)

Cybersecurity is the set of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, security includes both cybersecurity and physical security.

Areas of interest include, but are not limited to:

  • Attacks on Virtualized Systems
  • Balancing Trust and Control
  • Blockchain technology and CyberSecurity
  • Cell Phones vulnerabilities
  • Cloud of Security
  • Cognitive Security
  • Concealing Malware (Trojan Horses-Root kits-Logic Bombs)
  • Cyber-attacks Cloud-oriented vs Cyber defense Cloud-oriented
  • Cybersecurity
  • Data Center Network Control, Security and Optimization
  • Demilitarization Zone (DMZ)
  • Designing a Security Policy
  • Disaster recovery plan
  • Enterprise Wireless Security
  • Hardware-Based Attacks
  • Host Network Intrusion Prevention Systems
  • Industrial control system information security
  • Infection Malware
  • Integrated Network Security Hardware
  • Internet Content Filters
  • Internet security issues
  • Network and operating system administration for security purposes
  • Network Attached Storage (NAS)
  • Network Intrusion Detection Systems (NIDS)
  • Network security design
  • Organizational Security Policies
  • Secure Network through Network Design
  • Security in Internet of Things
  • Security in Fog/edge Computing
  • Security of Virtual Machines
  • Security, trust and privacy challenges
  • Smart City Security
  • Smart Grid security
  • Cyber Physical System (CPS) security
  • Software-Based Attacks
  • System security for wired and wireless networks
  • Virtual firewalls
  • Privacy and responsibility in digital age
  • Cybersecurity and human rights

Submission Guidlines:

Submitted papers must represent original material that is not currently under review in any other conference or journal, and has not been previously published.

All submissions should be written in English with maximum of eight (8) printed pages (in Two-Column IEEE Conference Format), including text, figures and references.

Papers should be submitted through EDAS

https://edas.info/N27274

All accepted and presented papers will be published in IEEE Xplore Digital Library

Best papers will be considered for fast-track publication in the Annals of Telecommunications (Springer, ISI-indexed)

  • Technical Sponsors

     

  • Important dates

    • Paper Submission Due
      July 26, 2020 (Extended)
    • Paper Review Feedback
      September 17, 2020
    • Final Papers Due
      October 6, 2020
    • Conference Date
      October 21 – 23, 2020
  • Previous Conferences