Conferences

Conference Year
Conference Month
 

Upcoming MDPI Conferences (0)

No conferences found for the selection.

Future Internet announces selected third-party conferences. In case you would like to announce your own event on the Future Internet website, please fill out the following form to apply for the announcement of a conference or other academic event (seminar, workshop).

Conference Year
Conference Month
 

Upcoming Partner Conferences (2)

23–24 July 2022 11th International Conference on Cryptography and Information Security

Toronto, Canada

The 11th International Conference on Cryptography and Information Security (CRYPIS 2022) focuses on cutting-edge results in applied cryptography and information security. It aims to bring together scientists, researchers, and students to exchange novel ideas and results in all aspects of cryptography, coding, and information security.

Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works, and industrial experiences that describe significant advances in the following areas but are not limited to:

  • Cryptographic Protocols
  • Cryptography and Coding
  • Untraceability
  • Privacy and Authentication
  • Key Management
  • Authentication
  • Trust Management
  • Quantum Cryptography
  • Computational Intelligence in Security
  • Artificial Immune Systems
  • Biological and Evolutionary Computation
  • Intelligent Agents and Systems
  • Reinforcement and Unsupervised Learning
  • Autonomy-Oriented Computing
  • Coevolutionary Algorithms
  • Fuzzy Systems
  • Biometric Security
  • Trust Models and Metrics
  • Regulation and Trust Mechanisms
  • Data Integrity
  • Models for Authentication, Trust, and Authorization
  • Access Control and Intrusion Detection
  • Intrusion Detection and Vulnerability Assessment
  • Authentication and Non-Repudiation
  • Identification and Authentication
  • Security and Privacy in Web Services
  • Security and Privacy Policies
  • Security Area Control
  • Security Deployment
  • Security Engineering
  • Security for Grid Computing
  • Security in Distributed Systems
  • Insider Threats and Countermeasures
  • Intrusion Detection and Prevention
  • Secure Cloud Computing
  • Security Information Systems Architecture and Design and Security Patterns
  • Security Management
  • Security Requirements (Threats, Vulnerabilities, Risk, Formal Methods, etc.)
  • Sensor and Mobile Ad Hoc Network Security
  • Service and Systems Design and QoS Network Security
  • Software Security
  • Security and Privacy in Mobile Systems
  • Security and Privacy in Pervasive/Ubiquitous Computing

https://www.itcse2022.org/crypis/index

27–29 July 2022 2022 IEEE CSR Workshop on Data Science for Cyber Security (DS4CS)

Online

Over the years, cyber-threats have increased in numbers and sophistication; adversaries now use a vast set of tools and tactics to attack their victims with their motivations ranging from intelligence collection to destruction or financial gain. Lately, the introduction of IoT devices on a number of applications, ranging from home automation to monitoring of critical infrastructures, has created an even more complicated cyber-defense landscape. The sheer number of IoT devices deployed globally, most of which are readily accessible and easily hacked, allows threat actors to use them as the cyber-weapon delivery system of choice in many of today’s cyber-attacks, ranging from botnet-building for DDoS attacks, to malware spreading and spamming.

Staying on top of these evolving cyber-threats has become an increasingly difficult task that nowadays entails the collection, analysis, and leveraging of huge volumes of data and requires methodologies and techniques located at the intersection of statistics, data mining, machine learning, visualization, and big data. Although the application of data science methodology to the cyber security domain is a relatively new topic, it steadily gathers the interest of the research community as showcased by the utilization of data science techniques in a variety of cyber-defense facets that include proactive technologies (e.g., cyber-threat intelligence gathering and sharing), platform profiling (e.g., trust calculation and blacklisting), attack detection/mitigation (e.g., active network monitoring, situational awareness, and adaptable mitigation strategies), and others. This workshop aims to spotlight cutting-edge research in data science driven cyber-security in academia, business and government, as well as help in the alignment of these endeavors.

Topics include but are not limited to the following:

  • Big data-driven cyber-security (including analytics, management);
  • Machine and deep learning methods for cyber-security (including malware/phishing/botnet/spam/intrusion/anomaly detection);
  • Visualization methods (including visual situation awareness, VR & AR visualization, real-time visualization);
  • AI-driven cybersecurity;
  • Private information retrieval;
  • Cyber-threat intelligence collection, identification, and sharing at scale;
  • Private/sensitive information protection;
  • Machine-learning powered traffic analysis and attack modeling;
  • Machine learning-based platform profiling and trust management;
  • Advanced attack detection and mitigation.

https://www.ieee-csr.org/ds4cs/

Back to TopTop