2021 International Workshop on Cyber Security (CSW) 2021
Event submitted on Monday, October 12th 2020, approved by Henry Dalzel ✓
This event has been tagged as follows:
If you are a Cybersecurity Professional in Stockholm, Sweden then we would highly recommend this conference, which is organized by IAEEEE. This event brings together researchers and professionals to exchange and share their experiences and research results in this field.
The following description was either submitted by the Conference Organizer on Monday, October 12th 2020, or created by us.
2021 International Workshop on Cyber Security (CSW 2021) will be held on 13-15 August 2021 in Stockholm, Sweden.
CSW 2021 aims to bring together leading academic scientists, researchers, and research scholars to exchange and share their experiences and research results in the field of Cyber Security.
With the theme “Cyber Security”, CSW 2021 aspires to keep up with advances and changes to a consistently morphing field. Leading researchers and industry experts from around the globe will be presenting the latest studies through papers and oral presentations.
CSW 2021 is organized by IAEEEE.
Submissions are solicited in, but not limited to, the following areas:
-Anti-malware techniques: detection, analysis, and prevention
-Security and privacy of mobile and smartphone platforms
-Anti-phishing, anti-blackmailing, anti-fraud techniques
-Security and privacy of systems based on machine learning and AI
-APTs, botnets, DDoS
-Security for cloud and edge computing
-Autonomous vehicles, industrial control systems
-Security for cyber-physical systems
-Cyber attack prevention, detection, investigation, and response
-Security for emerging networks
-Cyber-crime defense and forensics
-Security for future Internet architectures and designs
-Electronic voting, smart grid
-Security for large-scale, critical infrastructures
-Home networks, IoT, body-area networks, VANETs
-Security of Web-based applications and services
-Implementation, deployment, and management of network security policies
-Social networking, crowd-sourcing
-Integrating security in network protocols
-Software and firmware analysis, customization, and transformation for systems security
-Privacy and anonymity in networks and distributed systems
-Public key infrastructures, key management, certification, and revocation
-Tradeoffs between security and efficiency, usability, cost, and ethics
-Routing, naming, and management
-Trustworthy Computing software and hardware to secure networks and distributed systems
-Security and privacy for blockchains and cryptocurrencies
-Usable Security and privacy