International Conference
on
CyberSecurity in Emerging Digital Era
(ICCEDE 2020)
Organised by
Department of Master of Computer Application
G.L. Bajaj Institute of Technology & Management, Greater Noida
October 9th - 10th, 2020
• Cyber Security Evolution and Practices
• Cyberspace structure and models
• Cyber Security Trends and Technology
• Cyber-attacks and threats
• Cyber Security Requirement
• Cyber Rights, Policy, Laws and Ethics
• Cyber Resilient Business
• Business security Polies and Trust Management
• ICT Infrastructure, ERP CRM and other aligned application Security
• Cyber security Economics
• Data Communication and Computer Network
• Secure Software Development Architecture, Models and Protocols
• Cyber security in Social Media
• Sensor and Mobile Ad hoc Network Security
• Cryptography to Cybersecurity, Privacy and Trust
• Wireless and Telecommunication Network Security
• Privacy and VPN and VOIP
• Security in Human-Centric Applications
• Security in Future Networks
• Mobile and Distributed System Security
• Security in Pervasive Computing Applications
• Web, Multimedia and Mobile Network Security
• Trends in Cryptography security
• Emerging Technologies Issues and Challenges
• Security in Cloud and Fog Computing
• Security in Big Data, machine Learning and Deep Leaning
• Security in Block chain Technologies and Applications
• Security in IoT and edge cutting technologies
• Security in healthcare and wearable technologies
• Security in Data mining and Information retrieval knowledge Discovery
• Security and privacy in AR/VR systems
• Bioinformatics security
• Cyber Security Resilience in contemporary application
• Cyber security in smart Environment and Smart cities
• Ethnic bias in Image processing and recognition accuracy
• Cyber security Concerns in Industry X.0
• Security and Privacy in Competitive Agility
• Security and Privacy in Smart Grids
• VLSI and Embedded System Security
• Control, Instrumentation SCADA and PLC Security
• Privacy and Protection in Automation and Robotics
• Security and Protection Complex Systems
• Security and Protection Crowdsourcing
• Security and Protection in IT Outsourcing
• Cybercrime and Legal Issues
• Digital Crime and International Laws
• Socio-linguistic and Criminology
• Digital Forensic in emerging Technologies
• Forensic process and Models
• Database forensic, Data leakage and Protection
• Network Traffic Analysis and Vulnerabilities
• Hardware/Software, Network and Email forensic
• Digital Forensic Investigation and Evidence Management
• Contemporary Attack, Threat and Malware Forensic
• Anti-forensic in Steganography and water marking
• Cloud Forensic and legal challenges
• Drone Cybercrime and forensic
• Financial crime including money laundering and electronic payment
• Digital Rights and Protection of Intellectual Property
• Cyber Risk Assessment and prediction
• Dropping Cyber Security Talent Gap
• Zero Trust Security: A perspective
• Human and Social engineering
• Authentication and Access Control
• Recent Trends in Biometric
• Cyber peace and Social Media
• Surveillance Systems
• Standards and theories in Cyber security
• Security Awareness and Edification
• Cyber warfare