Scope

13th International Conference on Network Security & Applications (CNSA 2020)

Topics

Network and Wireless Network Security,Mobile, Ad Hoc and Sensor Network Security,Peer-to-Peer Network Security.

Submission System

Authors are invited to submit papers through the Conference Submission System.

Proceedings

Hard copy of the proceedings will be distributed during the Conference.

Welcome to CNSA 2020!

Scope   Call for ParticipationNew Program ScheduleNew

13th International Conference on Network Security & Applications (CNSA 2020) focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this conference is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and counter measures and establishing new collaborations in these areas.

Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Security & its applications.

Important Dates

Second Batch : (Submissions after November 03, 2019)

Submission Deadline

March 07, 2020 (Last Call)

Authors Notification

March 20, 2020

Registration & Camera-Ready Paper Due

March 22, 2020

After February 22 deadline, papers of authors who do not require a visa to enter Australia are only considered for the review process

Topics of Interest

  • Attacks on Virtualized Systems
  • Blockchain Technology and Cyber Security
  • Cloud Security
  • Cognitive Security
  • Cryptographic Protocols
  • Cyber Physical System (CPS) security
  • Database and System Security
  • Data Center Network Control, Security and Optimization
  • Designing a Security Policy
  • E-mail Security, Spam, Phishing, E-mail fraud
  • Hardware-Based Attacks
  • Internet of Things (IoT) Security
  • Internet Security, Applications Security & Network Managementv
  • Intrusion Detection and Prevention
  • Network and Wireless Network Security
  • Peer-to-Peer Network Security
  • Performance Evaluations of Protocols & Security Applications
  • Security in Fog / edge Computing
  • Security of Virtual Machines
  • Security threats & Countermeasures (DDoS, MiM, Session Hijacking, Replay attack, Phishing, Scams etc,)
  • Security, trust and privacy challenges
  • Smart City Security
  • Smart Grid security
  • Ubiquitous Computing Security
  • Virus, Worms, Trojan Protection
  • Web 2.0 security

Proceedings

The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & Information Technology (CS & IT) series (Confirmed). Hard copy of the proceedings will be distributed during the Conference.

Speakers



Peng Liu
Southeast University, China

Takahiro Nishigaki
Aoyama Gakuin University, Japan

Yusuke Nozaki
Meijo University, Japan

Nickolaos Koroniotis
UNSW Canberra, Australia

Shaikh Farhad Hossain
Nara Institute of Science and Technology (NAIST), Japan

Nguyen Dao Xuan Hai
HCMC University of Technology and Education, Vietnam

Jianing Tan
Southeast University, China

Duaa Bukhari
Long Island University, USA

Jelena Vasiljevic
University of Belgrade, Serbia

Simi Bajaj
Western Sydney University, Australia

Dhinaharan Nagamalai
Wireill, Australia

Rajeev Kanth
Savonia University of Applied Sciences, Finland

Rituparna Datta
University of South Alabama, USA