ISCS 2024 - International Conference on Intelligent Systems for Cyber Security,2024
Date2024-05-03 - 2024-05-04
Deadline2024-02-29
VenueThe NorthCap University ,Gurugram, India
KeywordsCybersecurity; Machine Learning; IoT and Cloud Security
Topics/Call fo Papers
Track 1- AI and Machine Learning for Cybersecurity
Machine Learning Models for Intrusion Detection
Behavioral Analysis and Anomaly Detection with AI
Deep Learning for Malware Detection
Natural Language Processing in Threat Intelligence
AI-Driven Security Information and Event Management (SIEM)
Explainable AI in Cybersecurity
Adversarial Machine Learning in Evasion Attacks
Predictive Analytics for Cyber Threat Forecasting
Machine Learning for Secure User Authentication
AI-Enhanced Security Operations Centers (SOCs)
Track 2- IoT and Cloud Security
IoT Device Authentication and Access Control
Edge Computing Security Frameworks
Threat Detection in Industrial IoT (IIoT)
Privacy and Compliance in IoT Environments
Secure Firmware and Software Updates for IoT
Cloud-Native Security Solutions
Identity and Access Management in Cloud Environments
Cloud Workload Protection Platforms (CWPP)
Security Implications of Serverless Computing
Data Encryption and Access Control in Cloud Services
Track 3-Quantum Cybersecurity and Post-Quantum Cryptography
Quantum-Safe Cryptographic Algorithms
Quantum Cryptanalysis
Quantum-safe Implementation and Standardization
Quantum Key Distribution (QKD) for Secure Communication
Quantum-Resistant Blockchain Solutions
Cryptographic Protocols for Quantum Networks
Quantum-Secure Data Storage
Post-Quantum Cryptography Implementations
Quantum-Safe Public Key Infrastructure (PKI)
Quantum-Resistant Authentication Methods
Challenges in Quantum Cryptanalysis
Quantum-Secure Cloud Computing
Track 4-Blockchain and Machine Learning for Secure Decentralized Networks
Smart Contracts and Security Audits
Machine Learning for Blockchain Anomaly Detection
Decentralized Identity Management on the Blockchain
Privacy-Preserving Techniques in Blockchain
Transactions Blockchain for Supply Chain Security
Cryptocurrencies and Wallet Security
Consensus Algorithms in Secure Decentralized Networks
Machine Learning in Blockchain Analytics
Cross-Chain Interoperability and Security
Secure Tokenization and Asset Management on the Blockchain
Track 5: Emerging Trends in Cybersecurity and Intelligent Systems
Zero-Day Vulnerabilities and Exploit Prevention
AI-Generated Cyber Threats and Countermeasures
Threats to Critical Infrastructure Security
Ethical Hacking and Penetration Testing
Human Factors in Cybersecurity Awareness
Incident Response and Cyber Forensics
Privacy and Data Protection Regulations
Cybersecurity Workforce Development and Training
Security Challenges in Emerging Technologies
Collaborative Threat Intelligence and Sharing
Machine Learning Models for Intrusion Detection
Behavioral Analysis and Anomaly Detection with AI
Deep Learning for Malware Detection
Natural Language Processing in Threat Intelligence
AI-Driven Security Information and Event Management (SIEM)
Explainable AI in Cybersecurity
Adversarial Machine Learning in Evasion Attacks
Predictive Analytics for Cyber Threat Forecasting
Machine Learning for Secure User Authentication
AI-Enhanced Security Operations Centers (SOCs)
Track 2- IoT and Cloud Security
IoT Device Authentication and Access Control
Edge Computing Security Frameworks
Threat Detection in Industrial IoT (IIoT)
Privacy and Compliance in IoT Environments
Secure Firmware and Software Updates for IoT
Cloud-Native Security Solutions
Identity and Access Management in Cloud Environments
Cloud Workload Protection Platforms (CWPP)
Security Implications of Serverless Computing
Data Encryption and Access Control in Cloud Services
Track 3-Quantum Cybersecurity and Post-Quantum Cryptography
Quantum-Safe Cryptographic Algorithms
Quantum Cryptanalysis
Quantum-safe Implementation and Standardization
Quantum Key Distribution (QKD) for Secure Communication
Quantum-Resistant Blockchain Solutions
Cryptographic Protocols for Quantum Networks
Quantum-Secure Data Storage
Post-Quantum Cryptography Implementations
Quantum-Safe Public Key Infrastructure (PKI)
Quantum-Resistant Authentication Methods
Challenges in Quantum Cryptanalysis
Quantum-Secure Cloud Computing
Track 4-Blockchain and Machine Learning for Secure Decentralized Networks
Smart Contracts and Security Audits
Machine Learning for Blockchain Anomaly Detection
Decentralized Identity Management on the Blockchain
Privacy-Preserving Techniques in Blockchain
Transactions Blockchain for Supply Chain Security
Cryptocurrencies and Wallet Security
Consensus Algorithms in Secure Decentralized Networks
Machine Learning in Blockchain Analytics
Cross-Chain Interoperability and Security
Secure Tokenization and Asset Management on the Blockchain
Track 5: Emerging Trends in Cybersecurity and Intelligent Systems
Zero-Day Vulnerabilities and Exploit Prevention
AI-Generated Cyber Threats and Countermeasures
Threats to Critical Infrastructure Security
Ethical Hacking and Penetration Testing
Human Factors in Cybersecurity Awareness
Incident Response and Cyber Forensics
Privacy and Data Protection Regulations
Cybersecurity Workforce Development and Training
Security Challenges in Emerging Technologies
Collaborative Threat Intelligence and Sharing
Other CFPs
- International Meeting of Cardiovascular Disease Prevention
- VII Correspondence International Scientific and Practical Conference «Scientific researches and methods of their carrying out: world experience and domestic realities»
- 4th International Conference on Advances in Computing & Information Technologies (CACIT 2024)
- 19th International Symposium on Visual Computing
- Solve Disputes between Husband and Wife by Astrology http://dradodalovetemple.com
Last modified: 2024-02-13 18:22:11