2nd International Conference on Cyber Security and Computer Science

ICONCS 2020


Engineering & Computer Science (General)



The 2nd International Conference on Cyber Security and Computer Science (ICONCS 2020) will address the discipline of Cyber Security and Computer Science. It will be held on February 15-16, 2020 in the Permanent Campus of Daffodil International University, Ashulia, Savar, Dhaka, Bangladesh.
The conference caters to both practitioners and academics, providing a forum to exchange ideas and experiences on technology, methodology, applications, study cases, and practical experiences.
PAPER PRESENTATION:
All submitted manuscripts will be subject to the three blind peer-reviewing process. All accepted papers must be presented as orally or through Skype during the scheduled time of the event for publication.
INDEXING:
All accepted papers will be included in the Conference proceedings that will also be published in the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST) by Springer (Indexed by SCOPUS).
Volumes published as part of the LNICST series are made available to the following indexing services:
- Conference Proceedings Citation Index (CPCI), part of Clarivate Analytics’ Web of Science
- EI Engineering Index (Compendex and Inspec databases)
- ACM Digital Library
- DBLP
- Google Scholar
- IO-Port
- MathSciNet
- Scopus
- Zentralblatt MATH
IMPORTANT DATES:
§ Full paper submission: 25th November 2019
§ Notification acceptance for full paper: 15th December 2019
§ Last Date of Registration: 13th January, 2020
§ Date of Conference: 15th – 16th February, 2020
Conference Scope:
Cyber Security
Access control
Application security
Attacks and defenses
Computer security
Cryptography
Biometric and watermarking
Security aspects of alternative currencies
Cloud and web security
Distributed systems security
Design and deployment of secure services
Digital forensics
Embedded systems security
Hardware security
Information risk management
Internet of things (IOT) security
Intrusion detection and prevention system
Language-based security
Malware
Mobile security
Network security
New exploits
Privacy and anonymity
Protocol security
Security architectures
Secure composition and adaptation of services
Security and usability
Security aspects of web application deployment
Security architecture in web application development
Security automation tools
Security in continuous deployment
Static and dynamic analysis for security
System security
Side channel attacks
Surveillance and anti-surveillance
Trust management
Vulnerability detection model/ techniques
Vulnerability prevention techniques
Web application security requirements
Web application security testing
Computer Science
Algorithms
Fuzzy logic
Genetic algorithms
Artificial intelligence
Big data and data mining
Bioinformatics and scientific
Blockchain Technology
Computer based education
Computing ethics
Computer networks
Censorship and censorship-resistance
Data communication systems
Expert systems
E-commerce and e-governance
Human-computer interaction
Image processing
Information systems and Management
Knowledge data engineering
Photonic
Reverse-engineering and code obfuscation
Technology management
Verification and assurance techniques for security properties
Wireless communications