CSNET 2018 - 2nd Cyber Security In Networking Conference
Topics/Call fo Papers
Cybersecurity is the set of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, security includes both cybersecurity and physical security. In this conference we are interested in cybersecurity in networking
Areas of interest include, but are not limited to:
Attacks on Virtualized Systems
Balancing Trust and Control
Cell Phones vulnerabilities
Cloud of Security
Concealing Malware (Trojan Horses-Root kits-Logic Bombs)
Cyber-attacks Cloud-oriented vs Cyber defense Cloud-oriented
Cybersecurity
Data Center Network Control, Security and Optimization
Demilitarization Zone (DMZ)
Designing a Security Policy
Disaster recovery plan
Enterprise Wireless Security
Hardware-Based Attacks
Host Network Intrusion Prevention Systems
Industrial control system information security
Infection Malware
Integrated Network Security Hardware
Internet Content Filters
Internet security issues
Network and operating system administration for security purposes
Network Attached Storage (NAS)
Network Intrusion Detection Systems (NIDS)
Network security design
Organizational Security Policies
Secure Network through Network Design
Security of Virtual Machines
Security, trust and privacy challenges
Smart City Security
Smart Grid security
Software-Based Attacks
System security for wired and wireless networks
Virtual firewalls
Areas of interest include, but are not limited to:
Attacks on Virtualized Systems
Balancing Trust and Control
Cell Phones vulnerabilities
Cloud of Security
Concealing Malware (Trojan Horses-Root kits-Logic Bombs)
Cyber-attacks Cloud-oriented vs Cyber defense Cloud-oriented
Cybersecurity
Data Center Network Control, Security and Optimization
Demilitarization Zone (DMZ)
Designing a Security Policy
Disaster recovery plan
Enterprise Wireless Security
Hardware-Based Attacks
Host Network Intrusion Prevention Systems
Industrial control system information security
Infection Malware
Integrated Network Security Hardware
Internet Content Filters
Internet security issues
Network and operating system administration for security purposes
Network Attached Storage (NAS)
Network Intrusion Detection Systems (NIDS)
Network security design
Organizational Security Policies
Secure Network through Network Design
Security of Virtual Machines
Security, trust and privacy challenges
Smart City Security
Smart Grid security
Software-Based Attacks
System security for wired and wireless networks
Virtual firewalls
Other CFPs
Last modified: 2018-01-18 16:13:04