{"id":79,"date":"2025-01-22T08:53:05","date_gmt":"2025-01-22T08:53:05","guid":{"rendered":"https:\/\/cyber-conf.com\/icspn2025\/?page_id=79"},"modified":"2025-01-22T08:57:02","modified_gmt":"2025-01-22T08:57:02","slug":"call-for-papers","status":"publish","type":"page","link":"https:\/\/cyber-conf.com\/icspn2025\/call-for-papers\/","title":{"rendered":"Call For Papers"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"79\" class=\"elementor elementor-79\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a8af74d e-flex e-con-boxed e-con e-parent\" data-id=\"a8af74d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d62f23b e-con-full e-flex e-con e-child\" data-id=\"d62f23b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-232150b e-con-full e-flex e-con e-child\" data-id=\"232150b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b8ba6cb elementor-widget elementor-widget-heading\" data-id=\"b8ba6cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Call For Papers<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6ec5790 elementor-widget elementor-widget-text-editor\" data-id=\"6ec5790\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We solicit original research and technical papers not published elsewhere. The papers can be theoretical, practical and application oriented on the following conference tracks but not limited to:<\/p><ul><li>Track #1: Cyber Security and Privacy<\/li><li>Track #2: Next Generation Computing and Networking Technology<\/li><li>Track #3: Data Analytics and Cloud Computing<\/li><li>Track #4: Artificial Intelligence and Machine Learning<\/li><li>Track #5: Business Management Technology: a Cybersecurity impact on Digitalization<\/li><\/ul><p><br \/>4th International Conference on Cyber Security, Privacy and Networking (ICSPN 2024) is going to organize during September 28-30, 2024 in Dubai, UAE. The ICSPN 2024 aims to bring the researchers, academicians, industry, and government personnel together to share and discuss the various aspects of Cyber Security. The conference will witness multiple eminent keynote speakers from academia and industry from all over the world along with the presentation of accepted peer-reviewed articles. The scope of this conference encompasses, but is not restricted to, the following topics:<\/p><ul><li>Security and Privacy<\/li><li>Authentication, Privacy and Security Models<\/li><li>Intelligent data analysis for Security<\/li><li>Big data intelligence in security and privacy<\/li><li>Deep Learning in security and privacy<\/li><li>Identity and Trust Management<\/li><li>Statistical learning for security and privacy<\/li><li>AI and Machine Learning for Security<\/li><li>Data mining for security and privacy<\/li><li>Computational intelligence in security and privacy<\/li><li>Intrusion, anomaly and fraud detection<\/li><li>Data-driven access control<\/li><li>Secure cloud computing<\/li><li>Secure multi-party computation<\/li><li>Data privacy<\/li><li>Sensitive data collection Privacy-preserving data mining<\/li><li>Privacy-preserving data publishing<\/li><li>Cloud Computing<\/li><li>Distributed Computing<\/li><li>Fog Computing<\/li><li>Mobile Computing<\/li><li>Cellular Network<\/li><li>Cognitive Network<\/li><li>Delay Tolerant Network<\/li><li>4G\/5G Networks<\/li><li>Satellite Communication<\/li><li>Group Communication<\/li><li>Radio Frequency Identification (RFID)<\/li><li>Neurocomputing<\/li><li>Big Data for Networks<\/li><li>Reliability and Robustness<\/li><li>Security and privacy of mobile cloud computing<\/li><li>Security, privacy and reliability issues of MCC and IoT<\/li><li>Security and privacy of IoT<\/li><li>Security and privacy management in MCC<\/li><li>MCC intrusion detection systems<\/li><li>Secure data management, data processing and analytics in Automotive<\/li><li>Security life-cycle management of cars<\/li><li>Secure over the air update of software<\/li><li>Cyber-security detection and prevention in Automotive<\/li><li>Critical infrastructures resilience and security in Automotive<\/li><li>Security of pricing and billing for mobile cloud computing services<\/li><li>Security of mobile, peer-to-peer and pervasive services in clouds<\/li><li>Security of mobile commerce and mobile Internet of Things<\/li><li>Security of mobile social networks<\/li><li>Security and privacy in smartphone devices<\/li><li>Security and privacy in social applications and networks<\/li><li>Security of Mobile, peer-to-peer and pervasive services in clouds<\/li><li>Security of Mobile commerce and mobile internet of things<\/li><li>Security of Operating system and middleware support for mobile computing<\/li><li>Security and privacy in sensor networks<\/li><li>Security and privacy in social applications and networks<\/li><li>Web service security<\/li><li>Security of 3G\/4G systems, Wi-MAX, Ad-hoc<\/li><li>Security of Mobile social networks<\/li><li>Near field communication services<\/li><li>Service-oriented architectures, service portability, P2P<\/li><li>Network virtualisation and cloud-based radio access networks<\/li><li>Cyber-Physical System and Cryptographic Algorithms<\/li><li>Trust Management<\/li><li>Authentication and Key Management<\/li><li>Blockchain<\/li><li>Public Key Infrastructure (PKI) and Quantum Cryptography<\/li><li>Web Security<\/li><li>Android Security<\/li><li>Vulnerability Assessment and Cyber Forensic<\/li><li>Secure Techniques for Big Data<\/li><li>Honeypot Technologies<\/li><li>Secure and privacy-preserving V2X communication in Automotive<\/li><li>Security in intelligent mobile App for transport service<\/li><li>Secure cloud\/edge computing architectures for Automotive<\/li><li>Interoperable security for transport service platform<\/li><li>Location verification in Automotive<\/li><li>Secure sensor and RFID applications in Automotive<\/li><\/ul><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1f8895d e-con-full e-flex e-con e-child\" data-id=\"1f8895d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Call For Papers We solicit original research and technical papers not published elsewhere. The papers can be theoretical, practical and application oriented on the following conference tracks but not limited to: Track #1: Cyber Security and Privacy Track #2: Next Generation Computing and Networking Technology Track #3: Data Analytics and Cloud Computing Track #4: Artificial<a class=\"more-link\" href=\"https:\/\/cyber-conf.com\/icspn2025\/call-for-papers\/\">Continue reading <span class=\"screen-reader-text\">&#8220;Call For Papers&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-79","page","type-page","status-publish","hentry","entry"],"_links":{"self":[{"href":"https:\/\/cyber-conf.com\/icspn2025\/wp-json\/wp\/v2\/pages\/79","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyber-conf.com\/icspn2025\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyber-conf.com\/icspn2025\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyber-conf.com\/icspn2025\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyber-conf.com\/icspn2025\/wp-json\/wp\/v2\/comments?post=79"}],"version-history":[{"count":4,"href":"https:\/\/cyber-conf.com\/icspn2025\/wp-json\/wp\/v2\/pages\/79\/revisions"}],"predecessor-version":[{"id":84,"href":"https:\/\/cyber-conf.com\/icspn2025\/wp-json\/wp\/v2\/pages\/79\/revisions\/84"}],"wp:attachment":[{"href":"https:\/\/cyber-conf.com\/icspn2025\/wp-json\/wp\/v2\/media?parent=79"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}