SlideShare une entreprise Scribd logo
1  sur  2
Télécharger pour lire hors ligne
8th
International Conference on Networks and Security (NSEC 2024)
June 29 ~ 30, 2024, Copenhagen, Denmark
https://inwes2024.org/nsec/index
Scope & Topics
8th
International Conference on Networks and Security (NSEC 2024) will provide an excellent
international forum for sharing knowledge and results in theory, methodology and applications of
Networks and Communications security. The aim of the conference is to provide a platform to the
researchers and practitioners from both academia as well as industry to meet and share cutting-edge
development in the field.
Authors are solicited to contribute to the conference by submitting articles that illustrate research results,
projects, surveying works and industrial experiences that describe significant advances in the following
areas, but are not limited to.
Topics of interest include, but are not limited to, the following:
 Access control, Anonymity, Audit and audit reduction & Authentication and authorization
 Algorithms and Bioinformatics
 Applied cryptography, Cryptanalysis, Digital Signatures
 Big Data Security, Privacy and Trust
 Bio metric security
 Blockchain and Distributed Ledger
 Boundary control devices
 Certification and accreditation
 Cross-layer design for security
 Data and System Integrity, Database security
 Data Mining
 Defensive Information Warfare
 Distributed Systems Security
 Electronic Commerce
 E-mail Security, Spam, Phishing, E-mail fraud, Virus, Worms, Trojan Protection
 Grid Security
 Information Hiding and Watermarking & Information Survivability
 Insider Threat Protection, Integrity
 Intellectual Property Protection
 Internet of Things (IoT) Security
 Internet/Intranet Security
 Key Management and key Recovery
 Language-based Security
 Machine Learning & AI based Security
 Mobile and Wireless Security
 Mobile, Ad Hoc and Sensor Network Security
 Monitoring and Surveillance
 Multimedia Security ,Operating System Security, Peer-To-Peer Security
 NLP for Security
 Performance Evaluations of Protocols & Security Application
 Privacy and Data Protection
 Product Evaluation Criteria and Compliance
 Risk Evaluation and Security certification
 Risk/vulnerability Assessment
 Security & Network Management
 Security and Information Hiding in Data Mining
 Security Models & Protocols
 Security Threats & Countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
 Trusted Computing
 Ubiquitous Computing Security
Paper Submission
Authors are invited to submit papers through the conference Submission System by May 11, 2024.
Submissions must be original and should not have been published previously or be under consideration
for publication while being evaluated for this conference. The proceedings of the conference will be
published by Computer Science Conference Proceedings in Computer Science & Information
Technology (CS & IT) series (Confirmed).
Selected papers from NSEC 2024, after further revisions, will be published in the special issues of the
following journals
 International Journal of Computer Networks & Communications (IJCNC) - ERA, WJCI,
Scopus Indexed
 International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI,
Indexed
 Information Technology in Industry (ITII)
Important Dates
 Submission Deadline : May 11, 2024
 Authors Notification : June 18, 2024
 Registration & Camera-Ready Paper Due : June 22, 2024

Contact Us
Here's where you can reach us : nsec@inwes2024.org or nsecconf@gmail.com
Submission Link:
https://inwes2024.org/submission/index.php

Contenu connexe

Similaire à 8th International Conference on Networks and Security (NSEC 2024)

Similaire à 8th International Conference on Networks and Security (NSEC 2024) (20)

12th International Conference on Communications Security & Information Assura...
12th International Conference on Communications Security & Information Assura...12th International Conference on Communications Security & Information Assura...
12th International Conference on Communications Security & Information Assura...
 
12th International Conference on Communications Security & Information Assura...
12th International Conference on Communications Security & Information Assura...12th International Conference on Communications Security & Information Assura...
12th International Conference on Communications Security & Information Assura...
 
11th International Conference on Cryptography and Information Security (CRYPI...
11th International Conference on Cryptography and Information Security (CRYPI...11th International Conference on Cryptography and Information Security (CRYPI...
11th International Conference on Cryptography and Information Security (CRYPI...
 
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
 
11th International Conference on Cryptography and Information Security (CRYPI...
11th International Conference on Cryptography and Information Security (CRYPI...11th International Conference on Cryptography and Information Security (CRYPI...
11th International Conference on Cryptography and Information Security (CRYPI...
 
Call for Papers - 9th International Conference on Cryptography and Informatio...
Call for Papers - 9th International Conference on Cryptography and Informatio...Call for Papers - 9th International Conference on Cryptography and Informatio...
Call for Papers - 9th International Conference on Cryptography and Informatio...
 
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
 
Call For papers - CRYPIS 2022 : 11th International Conference on Cryptography...
Call For papers - CRYPIS 2022 : 11th International Conference on Cryptography...Call For papers - CRYPIS 2022 : 11th International Conference on Cryptography...
Call For papers - CRYPIS 2022 : 11th International Conference on Cryptography...
 
International Conference on Cryptography and Blockchain (CRBL 2021)
International Conference on Cryptography and Blockchain (CRBL 2021)International Conference on Cryptography and Blockchain (CRBL 2021)
International Conference on Cryptography and Blockchain (CRBL 2021)
 
International Conference on Cryptography and Blockchain (CRBL 2021) will act ...
International Conference on Cryptography and Blockchain (CRBL 2021) will act ...International Conference on Cryptography and Blockchain (CRBL 2021) will act ...
International Conference on Cryptography and Blockchain (CRBL 2021) will act ...
 
15th International Conference on Network Security & Applications (CNSA 2022)
15th International Conference on Network Security & Applications (CNSA 2022)15th International Conference on Network Security & Applications (CNSA 2022)
15th International Conference on Network Security & Applications (CNSA 2022)
 
Call for Papers - 15th International Conference on Network Security & Applica...
Call for Papers - 15th International Conference on Network Security & Applica...Call for Papers - 15th International Conference on Network Security & Applica...
Call for Papers - 15th International Conference on Network Security & Applica...
 
11th International Conference on Cryptography and Information Security (CRYP...
11th International Conference on Cryptography and Information  Security (CRYP...11th International Conference on Cryptography and Information  Security (CRYP...
11th International Conference on Cryptography and Information Security (CRYP...
 
International Conference on Cryptography and Blockchain (CRBL 2021)
International Conference on Cryptography and Blockchain (CRBL 2021) International Conference on Cryptography and Blockchain (CRBL 2021)
International Conference on Cryptography and Blockchain (CRBL 2021)
 
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
 
International Conference on Cryptography and Blockchain (CRBL 2021)
International Conference on Cryptography and Blockchain (CRBL 2021)International Conference on Cryptography and Blockchain (CRBL 2021)
International Conference on Cryptography and Blockchain (CRBL 2021)
 
International Conference on Cryptography and Blockchain (CRBL 2021)
International Conference on Cryptography and Blockchain (CRBL 2021) International Conference on Cryptography and Blockchain (CRBL 2021)
International Conference on Cryptography and Blockchain (CRBL 2021)
 
13th International Conference on Network Security & Applications (CNSA 2020)
13th International Conference on Network Security &  Applications (CNSA 2020)13th International Conference on Network Security &  Applications (CNSA 2020)
13th International Conference on Network Security & Applications (CNSA 2020)
 
Call for Paper - 3rd International Conference on IOT, Big Data and Security (...
Call for Paper - 3rd International Conference on IOT, Big Data and Security (...Call for Paper - 3rd International Conference on IOT, Big Data and Security (...
Call for Paper - 3rd International Conference on IOT, Big Data and Security (...
 
Call for papers - 13th International Conference on Network Security & Appli...
Call for papers -  13th International Conference on Network Security &  Appli...Call for papers -  13th International Conference on Network Security &  Appli...
Call for papers - 13th International Conference on Network Security & Appli...
 

Plus de ClaraZara1

Plus de ClaraZara1 (20)

3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
 
International Journal of Security, Privacy and Trust Management (IJSPTM)
International Journal of Security, Privacy and Trust Management (IJSPTM)International Journal of Security, Privacy and Trust Management (IJSPTM)
International Journal of Security, Privacy and Trust Management (IJSPTM)
 
International Journal of Security, Privacy and Trust Management (IJSPTM)
International Journal of Security, Privacy and Trust Management (IJSPTM)International Journal of Security, Privacy and Trust Management (IJSPTM)
International Journal of Security, Privacy and Trust Management (IJSPTM)
 
10th International Conference on Software Engineering (SOFT 2024)
10th International Conference on Software Engineering (SOFT 2024)10th International Conference on Software Engineering (SOFT 2024)
10th International Conference on Software Engineering (SOFT 2024)
 
A New Framework for Securing Personal Data Using the Multi-Cloud
A New Framework for Securing Personal Data Using the Multi-CloudA New Framework for Securing Personal Data Using the Multi-Cloud
A New Framework for Securing Personal Data Using the Multi-Cloud
 
International Journal of Security, Privacy and Trust Management (IJSPTM)
International Journal of Security, Privacy and Trust Management (IJSPTM)International Journal of Security, Privacy and Trust Management (IJSPTM)
International Journal of Security, Privacy and Trust Management (IJSPTM)
 
10th International Conference on Artificial Intelligence and Soft Computing (...
10th International Conference on Artificial Intelligence and Soft Computing (...10th International Conference on Artificial Intelligence and Soft Computing (...
10th International Conference on Artificial Intelligence and Soft Computing (...
 
DOCUMENT SELECTION USING MAPREDUCE Yenumula B Reddy and Desmond Hill
DOCUMENT SELECTION USING MAPREDUCE Yenumula B Reddy and Desmond HillDOCUMENT SELECTION USING MAPREDUCE Yenumula B Reddy and Desmond Hill
DOCUMENT SELECTION USING MAPREDUCE Yenumula B Reddy and Desmond Hill
 
10th International Conference on Data Mining (DaMi 2024)
10th International Conference on Data Mining (DaMi 2024)10th International Conference on Data Mining (DaMi 2024)
10th International Conference on Data Mining (DaMi 2024)
 
12th International Conference of Artificial Intelligence and Fuzzy Logic (AI ...
12th International Conference of Artificial Intelligence and Fuzzy Logic (AI ...12th International Conference of Artificial Intelligence and Fuzzy Logic (AI ...
12th International Conference of Artificial Intelligence and Fuzzy Logic (AI ...
 
An Effective Semantic Encrypted Relational Data Using K-Nn Model
An Effective Semantic Encrypted Relational Data Using K-Nn ModelAn Effective Semantic Encrypted Relational Data Using K-Nn Model
An Effective Semantic Encrypted Relational Data Using K-Nn Model
 
10th International Conference on Software Engineering (SOFT 2024)
10th International Conference on Software Engineering (SOFT 2024)10th International Conference on Software Engineering (SOFT 2024)
10th International Conference on Software Engineering (SOFT 2024)
 
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
 
2nd International Conference on Computer Science, Engineering and Artificial ...
2nd International Conference on Computer Science, Engineering and Artificial ...2nd International Conference on Computer Science, Engineering and Artificial ...
2nd International Conference on Computer Science, Engineering and Artificial ...
 
10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...
 
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
 
10th International Conference on Artificial Intelligence and Soft Computing (...
10th International Conference on Artificial Intelligence and Soft Computing (...10th International Conference on Artificial Intelligence and Soft Computing (...
10th International Conference on Artificial Intelligence and Soft Computing (...
 
Using Lattice To Dynamically Prevent Information Leakage For Web Services
Using Lattice To Dynamically Prevent Information Leakage For Web ServicesUsing Lattice To Dynamically Prevent Information Leakage For Web Services
Using Lattice To Dynamically Prevent Information Leakage For Web Services
 
10th International Conference on Software Engineering (SEC 2024)
10th International Conference on Software Engineering (SEC 2024)10th International Conference on Software Engineering (SEC 2024)
10th International Conference on Software Engineering (SEC 2024)
 
2nd International Conference on Education in Post Pandemic (EDUPAN 2024)
2nd International Conference on Education in Post Pandemic (EDUPAN 2024)2nd International Conference on Education in Post Pandemic (EDUPAN 2024)
2nd International Conference on Education in Post Pandemic (EDUPAN 2024)
 

Dernier

21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx
rahulmanepalli02
 
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..
MaherOthman7
 
Microkernel in Operating System | Operating System
Microkernel in Operating System | Operating SystemMicrokernel in Operating System | Operating System
Microkernel in Operating System | Operating System
Sampad Kar
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
IJECEIAES
 
1893-part-1-2016 for Earthquake load design
1893-part-1-2016 for Earthquake load design1893-part-1-2016 for Earthquake load design
1893-part-1-2016 for Earthquake load design
AshishSingh1301
 

Dernier (20)

Lab Manual Arduino UNO Microcontrollar.docx
Lab Manual Arduino UNO Microcontrollar.docxLab Manual Arduino UNO Microcontrollar.docx
Lab Manual Arduino UNO Microcontrollar.docx
 
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
 
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1
 
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..
 
Raashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashid final report on Embedded Systems
Raashid final report on Embedded Systems
 
Microkernel in Operating System | Operating System
Microkernel in Operating System | Operating SystemMicrokernel in Operating System | Operating System
Microkernel in Operating System | Operating System
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...
 
Diploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdfDiploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdf
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
"United Nations Park" Site Visit Report.
"United Nations Park" Site  Visit Report."United Nations Park" Site  Visit Report.
"United Nations Park" Site Visit Report.
 
Autodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxAutodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptx
 
handbook on reinforce concrete and detailing
handbook on reinforce concrete and detailinghandbook on reinforce concrete and detailing
handbook on reinforce concrete and detailing
 
Passive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.pptPassive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.ppt
 
1893-part-1-2016 for Earthquake load design
1893-part-1-2016 for Earthquake load design1893-part-1-2016 for Earthquake load design
1893-part-1-2016 for Earthquake load design
 
Vip ℂall Girls Karkardooma Phone No 9999965857 High Profile ℂall Girl Delhi N...
Vip ℂall Girls Karkardooma Phone No 9999965857 High Profile ℂall Girl Delhi N...Vip ℂall Girls Karkardooma Phone No 9999965857 High Profile ℂall Girl Delhi N...
Vip ℂall Girls Karkardooma Phone No 9999965857 High Profile ℂall Girl Delhi N...
 

8th International Conference on Networks and Security (NSEC 2024)

  • 1. 8th International Conference on Networks and Security (NSEC 2024) June 29 ~ 30, 2024, Copenhagen, Denmark https://inwes2024.org/nsec/index Scope & Topics 8th International Conference on Networks and Security (NSEC 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Networks and Communications security. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field. Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to. Topics of interest include, but are not limited to, the following:  Access control, Anonymity, Audit and audit reduction & Authentication and authorization  Algorithms and Bioinformatics  Applied cryptography, Cryptanalysis, Digital Signatures  Big Data Security, Privacy and Trust  Bio metric security  Blockchain and Distributed Ledger  Boundary control devices  Certification and accreditation  Cross-layer design for security  Data and System Integrity, Database security  Data Mining  Defensive Information Warfare  Distributed Systems Security  Electronic Commerce  E-mail Security, Spam, Phishing, E-mail fraud, Virus, Worms, Trojan Protection  Grid Security  Information Hiding and Watermarking & Information Survivability  Insider Threat Protection, Integrity  Intellectual Property Protection  Internet of Things (IoT) Security  Internet/Intranet Security  Key Management and key Recovery  Language-based Security  Machine Learning & AI based Security  Mobile and Wireless Security  Mobile, Ad Hoc and Sensor Network Security  Monitoring and Surveillance  Multimedia Security ,Operating System Security, Peer-To-Peer Security
  • 2.  NLP for Security  Performance Evaluations of Protocols & Security Application  Privacy and Data Protection  Product Evaluation Criteria and Compliance  Risk Evaluation and Security certification  Risk/vulnerability Assessment  Security & Network Management  Security and Information Hiding in Data Mining  Security Models & Protocols  Security Threats & Countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)  Trusted Computing  Ubiquitous Computing Security Paper Submission Authors are invited to submit papers through the conference Submission System by May 11, 2024. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & Information Technology (CS & IT) series (Confirmed). Selected papers from NSEC 2024, after further revisions, will be published in the special issues of the following journals  International Journal of Computer Networks & Communications (IJCNC) - ERA, WJCI, Scopus Indexed  International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI, Indexed  Information Technology in Industry (ITII) Important Dates  Submission Deadline : May 11, 2024  Authors Notification : June 18, 2024  Registration & Camera-Ready Paper Due : June 22, 2024  Contact Us Here's where you can reach us : nsec@inwes2024.org or nsecconf@gmail.com Submission Link: https://inwes2024.org/submission/index.php