International Conference on Frontiers in Information and Computer Security (FICS)

November 5th - 7th, 2020

Jaypee Institute of Information Technology, Noida, India


 

The Department of Computer Science Engineering, Jaypee Institute of Information Technology, Noida, Uttar Pradesh, India, is organizing International Conference on Frontiers in Information and Computer Security (FICS) from November 5-7th, 2020.

The goal of the International Conference on Frontiers in Information and Computer Security (FICS) is to bring together the researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of Information Security. The target is to focus on the latest trends, techniques and applications areas requiring security. As the world goes seamless today, everything has become easily available and hence, more vulnerable to exploitation. This has also extended the domains of protection from merely data and information to those of devices, networks, media, and largely to the web based products and applications. On this platform, we intend to bring together all these perspectives of modern day security.

The conference shall follow the standard reviewing process through popular conference management systems like EDAS. The UP IEEE/ACM section is expected to sponsor the conference technically. The accepted papers shall be available in conference proceedings, online in IEEE explore after presentation during the conference.


Important Dates

Authors are invited to submit manuscripts that demonstrate original, unpublished, and unplagiarized research. Important dates are:


Conference Tracks

The conference aims to cover the following broad aspects of Information Security.

  1. Cryptology and network security.
  2. Cyber and digital forensic
  3. Software security, reliability and assurance
  4. Security, privacy & trust in modern data management.
  5. Intelligent secure systems

Detailed conference tracks:

  1. Cryptology and network security
  1. Cyber and digital forensic
  1. Software security, reliability and assurance
  1. Security, privacy and trust in modern data management.
  1. Intelligent secure systems
  • Security Algorithms
  • Security for software-defined and data center networks
  • Mobile Network Security
  • Security in CDN (Contents Distribution Networks)
  • Virtual Private Network (VPN)
  • Tracing Techniques in Internet
  • Active Networks
  • Security in Grid
  • Web Monitoring
  • Control Systems/SCADA Security
  • Network Security Engineering
  • Transport-Level Security
  • Wireless Network Security
  • IP Security
  • Electronic Mail security
  • Firewall Systems
  • Hacking Techniques and Related Issues
  • Intrusion Detection System (IDS)
  • Honeypot
  • Virus Issues (Detection, Prevention ...)
  • Trusted Computing
  • Alert Correlation
  • Attack Graphs
  • Incident Responding
  • Malware Analysis
  • Intrusion Detection
  • Embedded Systems Security
  • Cryptographic Processors and Co-Processors
  • Security Architectures
  • True and Pseudorandom Number Generators
  • Side Channel Attacks
  • Fault Attacks
  • Cyber-risk management
  • Evidentiary Aspects of Digital Forensics
  • Face Recognition Systems
  • Signature Recognition Systems
  • Forensic Analysis
  • Digital Currency
  • Anti-Forensics and Anti-Anti-Forensics Techniques
  • Data leakage, Data protection and Database forensics
  • Executable Content and Content Filtering
  • Forensics of Virtual and Cloud Environments
  • Emails mining & authorship identification
  • Investigation of Insider Attacks
  • Behavioral biometrics
  • Malware forensics and Anti-Malware techniques
  • Biometric Technologies for Security
  • Feature Extraction and Matching Algorithms
  • Green digital forensics and cyber investigation
  • Privacy, security and trust in social media
  • Content protection and digital rights management
  • Identity and trust management
  • Security of embedded systems
  • Performance evaluation of biometric systems
  • Tools for cyber and digital forensics
  • Block-chain technologies
  • Privacy exposures and violations
  • Balancing digital investigations with privacy concerns
  • Collaboration models between government, industry and/or academia
  • Authorized access to encrypted information for forensic purpose
  • Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics
  • Sustainable cyber threat intelligence in IoT, smart grids, and modern networks
  • Secure software design/architecture
  • Secure software practices
  • Security in requirements engineering
  • Security analysis tools and methods
  • Security-Savvy Software Development
  • Security evaluation criteria and methodology
  • Vulnerability, threat, and risk analysis
  • Metrics, Measurements, and Analysis
  • Obfuscation and software security
  • Usability of secure/security software
  • Security awareness for software developers (Reliability, Security, Availability, and Safety of Software Systems)
  • Program Debugging and Comprehension
  • Security in Testing, Verification, and Validation
  • Fault Tolerance for Software Reliability Improvement
  • Information and Software Quality Assurance
  • Modeling, Prediction, Simulation, and Evaluation
  • Formal Methods
  • Benchmark, Tools, Industrial Applications, and Empirical Studies
  • Data Encryption
  • Data Privacy
  • Data Security
  • Data hiding and watermarking
  • Cloud and big data security
  • Digital right management and data protection
  • Database security
  • Mobile App Privacy & Security
  • Web trust
  • Trust in crowdsourcing
  • SLM oriented Trust
  • Critical Infrastructure (e.g. for Medical or Military Applications)
  • Data and Computation Integrity
  • Identity and Trust Management
  • Information Assurance
  • Information Filtering
  • Privacy Enhancing Technologies
  • Security Policies (Human-Computer Interaction and Human Behavior Impact)
  • Security Measurements
  • Smart Cities
  • Social Networks                               
  • Big Data Management
  • Cloud Systems

  • Soft computing algorithms and technologies applied to:
  • Cyber Security
  • Distributed and cooperative security solutions
  • Autonomous key management
  • Identity management
  • Military deployable applications
  • Threat forecasting
  • Fraud detection
  • Attack prevention
  • Secure routing
  • Self-optimization techniques in wireless network security
  • Anomaly detection
  • Soft security mechanisms
  • Trust analysis/measurement
  • Robustness and survivability
  • Bio-inspiring system in cyber security
  • Agent-based security architecture
  • Cloud computing security and privacy
  • Automated vulnerability assessment
  • Biometric identification and authentication
  • Biometric identifiers based on physiological, behavioural and other characteristics
  • Bio-enabled multi-factor authentication
  • Privacy in biometrics
  • Soft computing techniques of interest include, but are not limited to:
  • Swarm intelligence algorithms
  • Evolutionary algorithms
  • Artificial immune system
  • Neural networks
  • Fuzzy Logic
  • Machine learning based approaches

 

Conference Registration

 

CATEGORY 

INR

USD

NON-IEEE member

IEEE member/JIIT ALUMNI/ BOTH

NON-IEEE member

IEEE member/JIIT ALUMNI/ BOTH

(After 20% discount)

(After 20% discount)

AUTHOR

Professionals

Rs. 12000

Rs. 9600

US $  350

US $  280

Full Time Student

Rs. 6000

Rs. 4800

US $  175

US $  140

CO-AUTHOR (Second registration for a paper)

Professionals

Rs. 9600

Rs. 7600

US $  280

US $  220

Full Time Student

Rs. 4800

Rs. 3800

US $  140

US $  110

NON-AUTHOR PARTICIPANTS 

Professionals (3 Days)

Rs. 6000

Rs. 4800

-

-

Professionals (1 Day)

Rs. 2500

Rs. 2000

-

-

Full Time Student (3 Days)

Rs. 2500

Rs. 2000

-

-

Full Time Student (1 Day)

Rs. 1200

Rs. 900

-

-

  

Group discount of 20% will be applicable if 3 or more participants register with the same affiliation.  Please note:

  1. For each accepted paper, it is mandatory for at least one author to register their paper in conference. 
  2. Accepted papers, only when presented in the conference, by duly registered authors, will be submitted for inclusion to proceedings.
  3. Fee includes conference kit, admission to conference, lunch, networking breaks with refreshments.
  4. Fee does not include transportation and accommodation.

 


Submission Guidelines

  1. Submissions to be made through EDAS only. Please access the following link for submission: https://EDAS.org .
  2. Papers should be at most 6 pages including the bibliography and well-marked appendices. Papers must be received by the submission deadline. The submission should include an abstract of about 150-200 words.
  3. The papers should strictly follow the IEEE conference paper template. Visit conference website for downloading the template.

 

 


Organizing Committee

Chief Patrons:

  • Shri. Jaiprakash Gaur, Founder Chancellor, JIIT
  • Shri. Manoj Gaur, Executive Chairman, Jaypee Group

Patron:

  • Prof. S. C. Saxena, Vice Chancellor, JIIT, Noida

General Chair:

  • Prof. Hari Om Gupta, Director, JIIT, Noida
  • Prof. Deepak Khazanchi, University of Nebraska

Steering Committee:

  • Prof. Vikas Saxena
  • Prof. Krishna Asawa

Organizing Secretary:

  • Dr. Charu Gandhi

Organizing Joint-Secretary:

  • Dr. Devpriya Soni

Publicity Chair:

  • Dr. Mukesh Saraswat

Registration Chair:

  • Dr. Devpriya Soni

Publication Chair:

  • Dr. Chetna Gupta

 

 


Contact Information

Conference Venue

Dr. Charu Gandhi
Phone: 0120-4195892     Mob: +91-8800823600
E-mail: charu.gandhi@jiit.ac.in
Jaypee Institute of Information Technology,
A-10, Sector 62, Noida, India, Pin: 201307