Conference Information
CSIA 2019: International Conference on Communications Security & Information Assurance
Submission Date:
2019-11-17 Extended
Notification Date:
Conference Date:
Dubai, UAE
Viewed: 3728   Tracked: 1   Attend: 0

Conference Location
Call For Papers
Scope & Topics

10th International Conference on Communications Security & Information Assurance (CSIA-2019) Focuses On All Technical and Practical Aspects of Communications Security & Information Assurance for Wired and Wireless Networks. The Goal of This Conference Is To Bring Together Researchers and Practitioners from Academia and Industry to Focus on Understanding Modern Security Threats and Countermeasures, and Establishing New Collaborations in These Areas

Authors Are Solicited To Contribute To The Conference By Submitting Articles That Illustrate Research Results, Projects, Surveying Works And Industrial Experiences That Describe Significant Advances In The Areas Of Communication Security & Information Assurance But Are Not Limited To, The Following :

Topics of interest include, but are not limited to, the following:

    Access Control, Anonymity, Audit and Audit Reduction & Authentication and Authorization
    Applied Cryptography, Cryptanalysis, Digital Signatures
    Biometric Security
    Boundary Control Devices
    Certification and Accreditation
    Cross-Layer Design for Security
    Data and System Integrity, Database Security
    Defensive Information Warfare
    Denial of Service Protection, Intrusion Detection, Anti-Malware
    Distributed Systems Security
    Electronic Commerce
    E-mail Security, Spam, Phishing, E-mail Fraud, Virus, Worms, Trojan Protection
    Grid Security
    Information Hiding and Watermarking & Information Survivability
    Insider Threat Protection, Integrity
    Intellectual Property Protection
    Internet/Intranet Security
    Key Management and Key Recovery
    Language-based Security
    Mobile and Wireless Security
    Mobile, Ad Hoc and Sensor Network Security
    Monitoring and Surveillance
    Multimedia Security ,Operating System Security, Peer-to-Peer Security
    Performance Evaluations of Protocols & Security Application
    Privacy and Data Protection
    Product Evaluation Criteria and Compliance
    Risk Evaluation and Security Certification
    Risk/Vulnerability Assessment
    Security & Network Management
    Security Threats Like DDoS, MiM, Session Hijacking, Replay Attack etc & Countermeasures
    Trusted Computing
    Ubiquitous Computing Security
    Virtualization Security, VoIP Security, Web 2.0 Security
Last updated by richert kevin in 2019-11-15
Related Conferences