• Have any questions?
  • +91-944 334 5035
  • info(at)scholarshipsinindia(dot)com

International Conference on Cybersecurity in Emerging Digital Era

International Conference on Cybersecurity in Emerging Digital Era

 

 

About the Conference

 

The Purpose of (ICCEDE-2020) is to bring together vibrant Cyber security stakeholders who share a passion for research, innovation, solution development partners, end-users and students around the world and explore the challenging prospects and resolutions in the emerging digital transformation.
Global digital transformation is creating new foundation of competitive advantage on all businesses, private/ and public services, and social front. In the present era ICT enabled applications and services with hyper connectivity and emerging computing power revolutionizing organizations practices. All the business models striving towards long term vision with converged mobile-computing enabled services, artificial intelligence based processes and algorithmic analysis along with increasing social media presence. However this digital transformation evolving with increased risks calls security solutions that can adapt changes with constant growth. Day by day digital applications and Services are growing in all the domains from public to private, commercial to human-centric where Cyber security and Trust Management is still big thrust for researchers, industry experts and solution providers.

Objective of ICCEDE2020

Following are the objectives to organize a 2 days conference

  •  To provide open platform for International community researchers and industry experts to share innovations for secure and trusted digital transformation.
  •  To reduce the gap between Cyber security understanding and practices.
  •  To bring together cyber security stakeholder like solution providers, researchers end-users by exhibiting cutting edge technologies to understand the gap between innovations and their implementation.
  •  Special Session for youth(School/College going students) to increase the awareness and recognize the value of cyber security and trust management in Digital age.
  •  Youth Motivation by cyber security Project/poster Presentations.

 

 

Call For Paper

 

Emerging Information and Communication Technologies (ICT) and underlying network infrastructure with increased size and complexity making difficult the assessment of security, investigation of the resiliency, safety and digital crimes. Cyber security exhibits a strong link between the computational and physical elements. Day by day new security breaches and hacks being reported and meantime new techniques, tools and practices for cyber security, cyber resilience, digital forensic and cyber welfare also being developed and deployed. There are some nature-inspired and social inspired solutions leading for self-secure and self-defending Despite the achievements, security, privacy, cyber-crime, social forensic, disaster management and vulnerabilities detection are key challenges in the technology enabled systems.

Objectives of ICCEDE2020 is to

  •  Provide open platform cybersecurity community researchers and reduce the gap between Cybersecurity understanding and practices.
  •  Bring together cybersecurity stakeholders like solution providers, researchers end- users by exhibiting cutting edge technologies to understand the gap between innovations and their implementation.
  •  Deliver Special Session for youth (School/College students) to increase the awareness and recognize the value of security and privacy in emerging digital transformation.
  •  Youth participation and Motivation by cybersecurity Project/poster Presentations

ICCEDE 2020 Conference invite submission of high quality, original research full/short papers posters and will host Keynote Lectures, Tutorial, Workshops, poster and project presentations on the theme.

Paper Submission Guidelines

  •  High quality, Original, Unpublished, research papers can be considered for publication. Full papers of between 12 to 15 pages and short papers of less than12 pages written in Springer’s CCIS one-column page format template. All the submissions will go through the plagiarism check and double-blind, peer review by at least three reviewers.
  •  All the submission will go through plagiarism check and double-blind peer review by at least three reviewers. Only accepted, registered & presented papers of the Conference by authors, will be submitted Springer series Communications in Computer and Information Science series (CCIS) for review and publication. CCIS is abstracted/indexed in DBLP, Google Scholar, EI-Compendex, Mathematical Reviews, SCImago, Scopus. CCIS volumes are also submitted for the inclusion in ISI Proceedings.
  •  For more details please refer to Springer’s CCIS series Webpage at http://www.springer.com/series/7899.
  •  Authors are asked to apply Springer conference paper templates, which can be find in the author’s instruction page here: http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0.
  •  The language of publication is exclusively English. Authors publishing in CCIS have to sign the Springer CCIS copyright transfer form, For the preparation of the camera-ready papers/files, authors have to strictly adhere to the Springer CCIS Authors’ Instructions and are strongly encouraged to use the CCIS LaTeX style files or templates.
  •  All the papers should be submitted through EasyChair, online conference management system. Submitted papers must be written in English only and provide sufficient details to allow conference Technical Program Committee (TPC) to assess the merits of the paper technical quality and relevance to the conference topics

Best Paper Award
Cash prizes as mentioned below will be awarded to two best papers presenters at the Valedictory Ceremony with the certificate.

 

Best Paper Award : Rs. 11,000/- Second Best Paper Award : Rs. 7,000/-

Poster Presentation
Posters are not formal publications hence, work submitted may be published in other events. Participants are required to prepare the poster as per the Conference Guidelines available on conference website Participants need to submit the abstract and need not submit the full-length paper Abstracts of posters (not exceeding 250 words) may be submitted online through the link provided on conference website. Deadline for Poster submission is 30 June 2020.
A panel of judges shall evaluate the posters on the basis of content, design, originality, and contribution to the theme of the conference.
Cash prizes as mentioned below will be awarded to two best poster presenters at the Valedictory Ceremony with the certificate along with certificate of participation.

 

Best Poster Award : Rs. 5,000/- Second Best Poster Award: Rs. 3,000/-

 

Important Dates:

    • Paper Submission Deadline: 15th July, 2020
    • Notice for acceptance: 31 August, 2020
    • Final camera ready submission: 15 September , 2020
    • Last Date of Registration: 20 September 2020

Perspective Authors are invited for submission of high quality, original research full/short papers posters for presentation on a broad range of topics including security and emerging digital era but not limited to listed, many more within the scope.

Conference Scope and Topics

      •  Cyber Security Evolution and Practices. structure and models
      •  Cyber Security Trends and Technology
      •  Cyber Security Requirement, -attacks and threats, Rights, Policy, Laws and Ethics
      •  Business security Polies, and Trust Management
      •  ICT Infrastructure, ERP CRM and other aligned application Security
      •  Data Communication and Computer Network, Wireless, Sensor and Mobile Ad hoc Network, 5G Networks and Distributed System, VPN and VOIP Security
      •  Security in Social Media, Human-Centric Applications, Pervasive Computing Applications Multimedia, and Future Networks
      •  Cryptography trends, Cybersecurity, Privacy
      •  Secure Software Development Architecture, Models and Protocols
      •  Emerging Technologies Issues and Challenges,
      •  Security in Cloud and Fog Computing, Big Data, Data/web mining and Information retrieval knowledge Discovery,
      •  Machine Learning and Deep Leaning, Image processing and Ethics bias in recognition accuracy
      •  IoT and edge cutting technologies, healthcare and Bioinformatics security
      •  Security and privacy in Block chain Technologies AR/VR systems, smart Environment and Smart cities
      •  Cyber Security Resilience in contemporary application and Competitive Agility
      • Security Concerns in Industry X.0, VLSI and Embedded System, Control, Instrumentation , SCADA and PLC Security

      •  Privacy and Protection in Automation and Robotics, Complex Systems, Crowdsourcing, and outsourcing
      •  Cybercrime, Digital Crime Digital Forensic, Legal Issues, Laws,, Socio-linguistic and Criminology
      •  Forensic process and Models, Database forensic, Data leakage and Protection
      •  Malware Forensic, Investigation, Cyber Risk Assessment and Evidence Management
      •  Steganography and water marking
      •  Drone Cybercrime and forensic
      •  Financial crime, money laundering, electronic payment, digital rights and intellectual property
      •  Cyber Harmony, Peace and Cyber Welfare, Human and Social engineering
      •  Surveillance Systems, Biometric, Authentication and Access Control
      •  Cyber Security and Talent Gap, Awareness and Edification

Springer Policy on Plagiarism

      •  Authors are requested to kindly refrain from plagiarism in any form. Authors should submit their original and unpublished research work not under consideration for publication elsewhere
      •  Papers found to be plagiarized during any stage of review shall be rejected.
      •  As per copyright transfer agreement, Authors are deemed to be individually and collectively responsible for the content of manuscripts published by them.
      •  Hence, it is the responsibility of each author to strive for the highest ethical standards with respect to plagiarism.

Download Template in Word File

 

Registration

 

Registration Fee

Indian Authors and Delegates

Foreign Authors and Delegates

Industry Experts

7500/-*

$ 250.00*

Academician/Industry Members

6500/-*

$ 200.00*

Full time Research Scholar(PHD)

5000/-*

$ 150.00*

Post graduate/Graduate students

4000/*

$ 130.00*

Conference Attendees

2000/-

$ 50.00

* 10% Discount for IEEE/CSI/ACM Professional Society Members

 

Contact US

Dr. Madhu S Gaur | +91-7835005110

  • G.L. Bajaj Institute of Technology & Management
  •  Plot No. 2, Knowledge Park III,
  •  Greater Noida, Distt. G.B.Nagar
  • U.P., India Pin-201306

 

For more details refer the Official Website :    https://www.glbitm.org/

 

Information Document 

Tags:

 Vardhman Foundation Shakun Oswal Scholarship

10
Dec
 

Vardhman Foundation Shakun Oswal Scholarship

Last date : 10.12.2023

 Commonwealth Shared Scholarship Scheme 2024-25

14
Dec
 

Commonwealth Shared Scholarship Scheme 2024-25

Last Date : 14.12.2023

 BYPL Sashakt Scholarship 2023-24 Offered By BSES Yamuna Power Limited

15
Dec
 

BYPL Sashakt Scholarship 2023-24 Offered By BSES Yamuna Power Limited

Last Date : 15.12.2023

 ZScholars Program 2023-2024

15
Dec
 

ZScholars Program 2023-2024

Last Date : 15.12.2023

Your Response on International Conference on Cybersecurity in Emerging Digital Era

Leave a Reply

Your email address will not be published. Required fields are marked *

Get Timely alerts for Scholarships, Fellowships , Awards and Competitions, Internships  through SMS / Email / Whatsapp Join with US