Image description
Image description

BEST PAPER AWARD

The best paper will be selected by separate committee and will be the one that reports the most novel and promising research work that has a high potential impact in the real world. 

4th International Conference on 

Cyber Security 

and privacy in communication networks 

(ICCS) 2018

Image description

  Jaipur (Rajasthan) India


October 26-27, 2018

ALL ACCEPTED & PRESENTED papers will be included in 

ELSEVIER-SSRN Digital Library.

Bookmark and Share

D E A D L I N E S


Submission                        July 31, 2018

 Acceptance                    August 25, 2018

 Registration             September 25, 2018

   Camera Ready        September 25, 2018 

          

   Conference             October 26-27, 2018


I N D E X I N G

Post conference, proceedings will be made available to the following indexing services:


Call For Papers

ICCS 2018 is an opportunity for academics, students, scholars, scientists and engineers from around the world who are involved in the study, management, development and implementation of systems and concepts to combat information warfare or to improve information systems security to come together and exchange ideas.This conference is trying to establish itself as a key event for the understanding of threats and risks to information systems, the development of a strong security culture, and incident investigation.


Please consider submitting to this conference.  We are interested in the entire range of concepts from theory to practice, including case studies, works-in-progress, and conceptual explorations. Topics for submissions may include, but are not limited to:

 

Image description

Proposed Conference Tracks


Cyber security

  • Big Data Techniques in Cyber Security
  • Forensic Analysis of Cyber Crimes
  • Secure Design, Tooling, and Engineering
  • Security and Trust of Citizens

Database security

  • Big Data Communication and Analytics
  • Data Sharing and Infrastructures
  • Quality of Service (QoS)

Cloud security

  • Mobile Cloud
  • Cloud and Systems Management
  • Cloud Computing and Networking

Network Security

  • Digital Signature Techniques
  • Advance Persistent Threat
  • Network Protocols
  • Next-generation Communication Networks
  • Information-Centric Networking
  • Data Network Management
  • Network Architectures
  • Modeling & Simulation of communication networks and Systems
  • Network Monitoring and Control
  • Traffic Measurement, Analysis, Modeling and Visualization
  • Routing and Flow Control in LANs, WANs and PANs
  • Sensor Nets and Embedded Systems
  • Network applications (web, multimedia streaming, gaming, etc.)
  • Social Computing and Networks
  • Software-Defined Networking
  • Secure Routing, Naming/Addressing, Network Management
  • Security & Privacy in Pervasive and Ubiquitous Computing, e.g., RFIDs
  • Security & Privacy in Peer-to-Peer and Overlay Networks
  • Security & Privacy for Emerging Technologies: VoIP, Social Networks
  • Security & Isolation in Cloud, Data Center and Software-Defined Networks


Secure Key Distribution

  • Secret Sharing
  • Key Management
  • Authentication Systems: Public Key Infrastructures, Key Management, Credential Management
  • Secure User Authentication

Email security

  • Spam protection

Hardware Security

  • Cyber Physical System 

Mobile Security

  • E-wallet
    • e-wallet security and transaction reversal
    • interoperability issues in e-wallet
    • security of  biometric based transactions
    • Security in Mobile Networks
    • Mobile & Ubiquitous Communication Networks

IOT security

  • Security of IoT Services
  • IoT Service Architectures and Platforms
  •  Real-Time IoT Service Security Analytics and Forensics
  •  Organizational Privacy and Security Policies
  •  Governance for IoT Services
  •  Social Aspects of IoT Security
  •  Security and Privacy Threats to IoT Services and Users
  •  Accountability and Trust Management
  •  Legal Considerations and Regulations
  •  Case Studies and Applications

Securing Critical Infrastructure against Cyber Attacks

  • Control System Cyber security
  • Communications and Network Protocol Security in Control Systems and Instrumentation
  • Security of nuclear power plants
  • Energy Infrastructure Security
  • Transport Infrastructure Security

Security in Optical Networks

  • Optical Network Security
  • Convergence of optical and wireless access Networks
  • Storage Networks
  • Optical Network Virtualization
  • IP-WDM integration
  • Software-defined optical networks for grid computing 

Security of medical devices

  • Advances in Health-care IT security and privacy (including implantable medical devices and nano-sensors)
  • Human factors in biomedical security and privacy
  • Networked medical device security
  • Green cryptography for medical data security
  • Smart hospital security and spatial/temporal privacy preservation
  • Advances in cyber-physical medical systems security
  • Emerging cryptographic computing schemes for biomedical security
  • Post-quantum cryptography
  • Big data security and privacy-preserving medical data mining
  • Novel anonymous sensitive data handling and restricted computing methods for sensitive biomedical data
  • Novel deeply-embedded biomedical computing reliability