|
||
When: Dec 10, 2020 - Dec 13, 2020 Submission Deadline: Oct 01, 2020 | ||
This workshop aims to bring together the experts from the agriculture, IoT, CPS, AI, and smart applications domain to develop synergy and exchange ideas to ensure secure smart agriculture applications... | ||
SMART FARMING AGRICULTURE CYBER SECURITY COOPERATIVE FARMING | ||
ASHES 2020 : Fourth Workshop on Attacks and Solutions in Hardware SecurityOrlando, Florida, USA |
||
When: Nov 13, 2020 - Nov 13, 2020 Submission Deadline: Jul 03, 2020 | ||
ASHES deals with any aspects of hardware security, including both theory and practice,and welcomes any contributions in this area. Among others, it particularly highlights emerging techniques and meth... | ||
HARDWARE SECURITY IP PROTECTION | ||
|
||
When: Sep 17, 2020 - Sep 19, 2020 Submission Deadline: Jun 21, 2020 | ||
Cybersecurity workshop solicits previously unpublished research papers in any aspect of cybersecurity, such as vulnerability analysis, cryptographic, risk assessment, network security, data secur... | ||
SECURITY BLOCKCHAIN INTERNET OF THINGS | ||
|
||
When: Dec 10, 2020 - Dec 13, 2020 Submission Deadline: Sep 15, 2020 | ||
The big data paradigm has become an inevitable aspect of today's digital forensics investigations. Acquiring a forensic copy of seized data mediums already takes several hours due to the increasin... | ||
DIGITAL FORENSICS MACHINE LEARNING CYBER SECURITY CYBER CRIME | ||
|
||
When: Aug 25, 2020 - Aug 28, 2020 Submission Deadline: May 17, 2020 | ||
Internet-of-Things (IoT) are becoming increasingly prevalent in our society, as the backbone of interconnected smart homes, smart hospitals, smart cities, smart wearables and other smart environments.... | ||
SECURITY DIGITAL FORENSICS INTERNET OF THINGS | ||
|
||
When: Dec 10, 2020 - Dec 13, 2020 Submission Deadline: Oct 16, 2020 | ||
As cyber-crimes against critical infrastructure and large organizations increase and evolve, automated systems to supplement human analysis are required. In addition, hunting for breaches is like look... | ||
INFORMATION SECURITY NETWORK SECURITY CYBER SECURITY | ||
|
||
When: Oct 01, 2020 - Oct 04, 2020 Submission Deadline: Jun 15, 2020 | ||
Blockchain enables a distributed and tamper-resistant ledger platform which allows transactions and any other digital data to be securely stored and verified without the need of a centralized authorit... | ||
SECURITY PRIVACY DISTRIBUTED LEDGER BLOCKCHAIN | ||
WoSCA 2020 : 1st International Workshop on Smart Contract AnalysisLos Angeles, California, United States |
||
When: Jul 18, 2020 - Jul 22, 2020 Submission Deadline: May 22, 2020 | ||
Smart contracts are versatile instruments that can not only facilitate and verify transactions in financial services, but also track the movement of physical goods and intellectual property. Security ... | ||
BLOCKCHAIN SECURITY SOFTWARE ENGINEERING | ||
|
||
When: Aug 31, 2020 - Sep 03, 2020 Submission Deadline: Apr 25, 2020 | ||
After the successful organization of CNCPS with IEEE WoWMoM 2019, IEEE Globecom 2018, IEEE ICC 2018, ICDCS 2017, and IPCCC 2016, we are pleased to organize the 5th IEEE International workshop on Commu... | ||
COMPUTER SCIENCE SECURITY | ||
|
||
When: Sep 14, 2020 - Sep 18, 2020 Submission Deadline: Jun 28, 2020 | ||
CPS4CIP’20 is the first workshop dedicated to the cyber-physical security for protecting critical infrastructures that support finance, energy, health, air transport, communication, gas, and wat... | ||
CYBER SECURITY | ||
|
||
When: Jul 07, 2020 - Jul 07, 2020 Submission Deadline: Apr 25, 2020 | ||
A blockchain protocol is employed to implement a tamper free distributed ledger which stores transactions created by the nodes of a P2P network and agreed upon through a distributed consensus algorith... | ||
BLOCKCHAIN DISTRIBUTED SYSTEMS NETWORKING INFORMATION SECURITY | ||
LPW 2020 : Second Location Privacy WorkshopDublin, Ireland |
||
When: Aug 25, 2020 - Aug 28, 2020 Submission Deadline: May 01, 2020 | ||
Location and mobility data are highly sensitive, as they can be used to infer a number of other personal and sensitive data on an individual. However, human mobility is highly predictable, and locatio... | ||
SECURITY PRIVACY CRYPTOGRAPHY | ||
|
||
When: Oct 19, 2020 - Oct 22, 2020 Submission Deadline: Jun 22, 2020 | ||
In recent years, Artificial Intelligence (AI) has got a lot of attention, especially, for the success of deep learning to address problems that were considered hard before. Big players such as Google,... | ||
SECURITY INTERNET OF THINGS ARTIFICIAL INTELLIGENCE COMPUTER SCIENCE | ||
|
||
When: Sep 14, 2020 - Sep 18, 2020 Submission Deadline: Jun 20, 2020 | ||
CyberICPS is the result of the merging of the CyberICS and WOS-CPS workshops that were held for the first time in conjunction with ESORICS 2015. • Cyber-physical systems (CPS) are physical and en... | ||
SECURITY CYBER SECURITY | ||
|
||
When: Sep 18, 2020 - Sep 18, 2020 Submission Deadline: Jun 25, 2020 | ||
The Internet of Things (IoT) technology is widely adopted by the vast majority of businesses and is impacting every aspect of the world. However, the natures of the Internet, communication, embedded O... | ||
SECURITY PRIVACY INTERNET OF THINGS | ||
|
||
When: Aug 25, 2020 - Aug 28, 2020 Submission Deadline: May 10, 2020 | ||
The increased sophistication of cyber-attacks has created a technology arms race between attackers and defenders. However, this arm race is not fought in equal terms. Defenders are falling behind due ... | ||
CYBER SECURITY | ||
|
||
When: Jun 29, 2020 - Jul 01, 2020 Submission Deadline: Apr 07, 2020 | ||
The scientific evolution of digital, analog, and physical devices and their interactions with the networked systems created the Cyber-Physical Systems (CPS). Today, the boundary between cyber and phys... | ||
SECURITY | ||
|
||
When: Nov 10, 2020 - Nov 13, 2020 Submission Deadline: May 10, 2020 | ||
The 3rd International Workshop on Blockchain Systems and Applications (BlockchainSys2020), in Conjunction with IEEE TrustCom 2020 aims to provide a unique platform for multi-disciplinary researchers a... | ||
TRUST SECURITY PRIVACY | ||
|
||
When: Jun 22, 2020 - Jun 22, 2020 Submission Deadline: Apr 24, 2020 | ||
The use of graphical security models to represent and analyse the security of systems has gained an increasing research attention over the last two decades. Formal methods and computer security resear... | ||
SECURITY FORMAL METHODS VISUALIZATION COMPUTER SCIENCE | ||
MPS 2020 : 3rd International Workshop on Multimedia Privacy and SecurityGuildford, Surrey, UK |
||
When: Sep 18, 2020 - Sep 18, 2020 Submission Deadline: May 31, 2020 | ||
We focus on the security and privacy issues that have developed as our society has become more interconnected, specifically with respect to multimedia data generated by the Internet of Things (IoT) an... | ||
CYBER SECURITY PRIVACY MULTIMEDIA | ||
COMPSAC-SDIM 2020 : The 3rd IEEE International Workshop on Secure Digital Identity ManagementMadrid, Spain (Digital Conference) |
||
When: Jul 13, 2020 - Jul 17, 2020 Submission Deadline: Apr 24, 2020 | ||
The workshop is dedicated to the security and privacy aspects of identity management (IDM) in smart devices, the cloud, or blockchain and distributed ledger environment. Topics are articulated around ... | ||
SECURITY PRIVACY BLOCKCHAIN | ||
|
||
When: Jul 27, 2020 - Jul 31, 2020 Submission Deadline: Jun 15, 2020 | ||
A Blockchain is a distributed ledger for recording transactions, maintained by many nodes without central authority through a distributed cryptographic protocol. Smart contracts on top of a blockchain... | ||
BLOCKCHAIN SMART CONTRACTS SOFTWARE SECURITY | ||
|
||
When: Aug 25, 2020 - Aug 28, 2020 Submission Deadline: May 10, 2020 | ||
Behavioral features are getting in the last years an increasing attention from both IT research and industrial world. Human behavioral aspects are extremely valuable pieces of information, exploited b... | ||
COMPUTER SCIENCE SECURITY | ||
|
||
When: Aug 25, 2020 - Aug 28, 2020 Submission Deadline: May 20, 2020 | ||
This workshop desires to foster the progress in research on the scientific methodology of information security, to improve the links between sub-domains of information security research and to advance... | ||
SECURITY COMPUTER SCIENCE COMMUNICATION NETWORKING | ||
|
||
When: Sep 07, 2020 - Sep 10, 2020 Submission Deadline: Jun 01, 2020 | ||
The purpose of this workshop is to investigate issues related to the ICT-based management of failures, including cyber-security aspects, the ability to quantify the quality of the data collected from ... | ||
SMART GRID CYBER SECURITY CYBER-PHYSICAL SYSTEMS | ||
|
||
When: Jul 09, 2021 - Jul 11, 2021 Submission Deadline: Apr 20, 2020 | ||
2021 International Workshop on Cryptography, Security and Privacy (IWCSP 2021) will be held in Budapest, Hungary during July 9-11, 2021. The conference is dedicated to prov... | ||
CRYPTOGRAPHY SECURITY PRIVACY | ||
Blockchain 2020 : The Second Workshop on BlockchainChongqing, China |
||
When: Sep 17, 2020 - Sep 19, 2020 Submission Deadline: Apr 21, 2020 | ||
Blockchain is a peer-to-peer (P2P) distributed ledger technology for establishing trust and consensus in trustless networks; it was proposed in 2009 as the fundamental technology of crypto-currency Bi... | ||
BLOCKCHAIN SECURITY PRIVACY ARTIFICIAL INTELLIGENCE | ||
|
||
When: Jul 01, 2020 - Jul 01, 2020 Submission Deadline: Apr 03, 2020 | ||
Cloud computing is today the reference paradigm for large-scale data storage and processing due to the convenient and efficient network access to configurable resources that can be easily adjusted acc... | ||
SECURITY PRIVACY CLOUD COMPUTING | ||
|
||
When: Aug 09, 2020 - Aug 12, 2020 Submission Deadline: Mar 31, 2020 | ||
The Second International Workshop on Emerging Networks and Communications (IWENC 2020) will be held on August 9-12 2020 in Leuven, Belgium in conjunction with The 15th International Conference on Futu... | ||
SDN SECURITY IOT BIG DATA | ||
|
||
When: Jun 22, 2020 - Jun 25, 2020 Submission Deadline: Mar 25, 2020 | ||
As applications are one of the most critical assets, application security aims to take proper actions to improve the security of an application by identifying and fixing application vulnerabilities. A... | ||
SECURITY PRIVACY BLOCKCHAIN APPLICATION INTELLIGENCE | ||
Find and Compare Upcoming Security Workshops in 2020. Check Important Dates, Venue, Speaker, Location, Address, Exhibitor Information, Timing, Schedule, Discussion Topics, Agenda, Visitors Profile, and Other Important Details.