Emerging Information and Communication Technologies (ICT) and underlying network infrastructure with increased size and complexity making difficult the assessment of security, investigation of the resiliency, safety and digital crimes. Cyber security exhibits a strong link between the computational and physical elements. Day by day new security breaches and hacks being reported and meantime new techniques, tools and practices for cyber security, cyber resilience, digital forensic and cyber welfare also being developed and deployed. There are some nature-inspired and social inspired solutions leading for self-secure and self-defending Despite the achievements, security, privacy, cyber-crime, social forensic, disaster management and vulnerabilities detection are key challenges in the technology enabled systems.
Objectives of ICCEDE2020 is to
- Provide open platform cybersecurity community researchers and reduce the gap between Cybersecurity understanding and practices.
- Bring together cybersecurity stakeholders like solution providers, researchers end-
users by exhibiting cutting edge technologies to understand the gap between innovations and their implementation.
- Deliver Special Session for youth (School/College students) to increase the awareness and recognize the value of security and privacy in emerging digital transformation.
- Youth participation and Motivation by cybersecurity Project/poster Presentations
ICCEDE 2020 Conference invite submission of high quality, original research full/short papers posters and will host Keynote Lectures, Tutorial, Workshops, poster and project presentations on the theme.
Paper Submission Guidelines
- High quality, Original, Unpublished, research papers can be considered for publication. Full papers of between 12 to 15 pages and short papers of less than12 pages written in Springer’s CCIS one-column page format template. All the submissions will go through the plagiarism check and double-blind, peer review by at least three reviewers.
- All the submission will go through plagiarism check and double-blind peer review by at least three reviewers. Only accepted, registered & presented papers of the Conference by authors, will be submitted Springer series Communications in Computer and Information Science series (CCIS) for review and publication. CCIS is abstracted/indexed in DBLP, Google Scholar, EI-Compendex, Mathematical Reviews, SCImago, Scopus. CCIS volumes are also submitted for the inclusion in ISI Proceedings.
- For more details please refer to Springer's CCIS series Webpage at http://www.springer.com/series/7899.
- Authors are asked to apply Springer conference paper templates, which can be find in the author’s instruction page here: http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0.
- The language of publication is exclusively English. Authors publishing in CCIS have to sign the Springer CCIS copyright transfer form, For the preparation of the camera-ready papers/files, authors have to strictly adhere to the Springer CCIS Authors' Instructions and are strongly encouraged to use the CCIS LaTeX style files or templates.
- All the papers should be submitted through EasyChair, online conference management system. Submitted papers must be written in English only and provide sufficient details to allow conference Technical Program Committee (TPC) to assess the merits of the paper technical quality and relevance to the conference topics
Best Paper Award
Cash prizes as mentioned below will be awarded to two best papers presenters at the Valedictory Ceremony with the certificate.
Best Paper Award : Rs. 11,000/- |
Second Best Paper Award : Rs. 7,000/- |
Poster Presentation
Posters are not formal publications hence, work submitted may be published in other events. Participants are required to prepare the poster as per the Conference Guidelines available on conference website Participants need to submit the abstract and need not submit the full-length paper Abstracts of posters (not exceeding 250 words) may be submitted online through the link provided on conference website. Deadline for Poster submission is 30 June 2020.
A panel of judges shall evaluate the posters on the basis of content, design, originality, and contribution to the theme of the conference.
Cash prizes as mentioned below will be awarded to two best poster presenters at the Valedictory Ceremony with the certificate along with certificate of participation.
Best Poster Award : Rs. 5,000/- |
Second Best Poster Award: Rs. 3,000/- |
Important Dates:
- Paper Submission Deadline: 15th July, 2020
- Notice for acceptance: 31 August, 2020
- Final camera ready submission: 15 September , 2020
- Last Date of Registration: 20 September 2020
Perspective Authors are invited for submission of high quality, original research full/short papers posters for presentation on a broad range of topics including security and emerging digital era but not limited to listed, many more within the scope.
Conference Scope and Topics
- Cyber Security Evolution and Practices. structure and models
- Cyber Security Trends and Technology
- Cyber Security Requirement, -attacks and threats, Rights, Policy, Laws and Ethics
- Business security Polies, and Trust Management
- ICT Infrastructure, ERP CRM and other aligned application Security
- Data Communication and Computer Network, Wireless, Sensor and Mobile Ad hoc Network, 5G Networks and Distributed System, VPN and VOIP Security
- Security in Social Media, Human-Centric Applications, Pervasive Computing Applications Multimedia, and Future Networks
- Cryptography trends, Cybersecurity, Privacy
- Secure Software Development Architecture, Models and Protocols
- Emerging Technologies Issues and Challenges,
- Security in Cloud and Fog Computing, Big Data, Data/web mining and Information retrieval knowledge Discovery,
- Machine Learning and Deep Leaning, Image processing and Ethics bias in recognition accuracy
- IoT and edge cutting technologies, healthcare and Bioinformatics security
- Security and privacy in Block chain Technologies AR/VR systems, smart Environment and Smart cities
- Cyber Security Resilience in contemporary application and Competitive Agility
Security Concerns in Industry X.0, VLSI and Embedded System, Control, Instrumentation , SCADA and PLC Security
- Privacy and Protection in Automation and Robotics, Complex Systems, Crowdsourcing, and outsourcing
- Cybercrime, Digital Crime Digital Forensic, Legal Issues, Laws,, Socio-linguistic and Criminology
- Forensic process and Models, Database forensic, Data leakage and Protection
- Malware Forensic, Investigation, Cyber Risk Assessment and Evidence Management
- Steganography and water marking
- Drone Cybercrime and forensic
- Financial crime, money laundering, electronic payment, digital rights and intellectual property
- Cyber Harmony, Peace and Cyber Welfare, Human and Social engineering
- Surveillance Systems, Biometric, Authentication and Access Control
- Cyber Security and Talent Gap, Awareness and Edification
Springer Policy on Plagiarism