Conference Information
BuildSEC 2024: Building a Secure & Empowered Cyberspace
https://www.buildsec.org/Submission Date: |
2024-08-09 Extended |
Notification Date: |
2024-09-13 |
Conference Date: |
2024-12-19 |
Location: |
New Delhi, India |
Viewed: 812 Tracked: 0 Attend: 0
Call For Papers
Tracks: Artificial Intelligence and Cybersecurity Suggested Topics of Interest but not limited to: Emerging cybersecurity threats due to Generative AI Defensive and adversarial approaches using LLMs Deepfake and misinformation detection Machine learning for Cybersecurity Applications of AI and Cybersecurity Unfairness in Synthetic Data Generation Tools Ethical Machine Unlearning LLMs and Biasness Security, Usability and Measurement Suggested Topics of Interest but not limited to: Field studies of security or privacy technology deployment Usability evaluations of new or existing security or privacy tools/features Security testing of new or existing usability features Longitudinal studies of deployed security or privacy features Studies of administrators or developers and support for security and privacy Organizational policy or procurement decisions and their impact on security and privacy Lessons learned from the deployment and use of usable privacy and security features Foundational principles of usable security or privacy Ethical, psychological, sociological, or anthropological aspects of usable security and privacy Usable security and privacy implications/solutions for specific domains (e.g., IoT, medical, vulnerable populations) Consumer perceptions of online privacy Security and Privacy Education Improving the adoption of security technologies Security of Critical Infrastructure Suggested Topics of Interest but not limited to: IT / OT Interdependencies and cascading effects in critical infrastructure Critical infrastructure resilience Software safety and reliability Risk mitigation and management Regulations, best practices and standards Incident management and threat mitigation Vulnerability assessment Malware analysis and intrusion detection Firmware security Hardware security and side channel attacks Asset management and protection Defence in-depth security Data privacy and securing data sharing Cryptography to secure ICS/OT assets Operational Resilience risk with a focus on cyber security controls and incident management Board cyber control reporting and compliance Scam management and prevention AI & Critical Infrastructure Security Supply chain security Quantum and Critical Infrastructure Security Governance, Risk, and Compliance Suggested Topics of Interest but not limited to: Cyber governance in the boardroom Cyber governance in government Regulation of cyber security Regulations, best practices and standards Board cyber control reporting and compliance Operational resilience risk in business Operational resilience risk for government GRC as a Service Managing supply chain Managing AI cybersecurity risks Privacy and Trust Suggested Topics of Interest but not limited to: Zero-Trust Networking Security-as-a-service (SECaaS) Security Operations Centre (SoC) Operations & Management Surveillance Capitalism and Censorship Privacy-preserving data mining techniques Privacy Laws and Regulations Trust in Online Transactions Deidentification attacks Blockchain and Security Suggested Topics of Interest but not limited to: Distributed Consensus & Fault Tolerance Algorithms Performance, Scalability & Sustainability Issues Blockchain-based Smart Applications & Services Security, Privacy, and Trust in Blockchain Decentralised Financial Services Blockchain for Internet of Things Blockchain for Cyber-Physical Systems Blockchain and Machine Learning Blockchain-Enabled Metaverse Systems Blockchain and Digital Twins Blockchain Interoperability in Critical Systems Decentralised App Development Emerging Blockchain Architecture Cross-Chain and Off-Chain Technology Smart Contracts Blockchain in Social Networking Blockchain-based Applications and Services Attacks and Defences of Blockchain Secure access control and Blockchain Blockchain in edge and Cloud computing Blockchain Integration in Edge and Cloud Computing Cybersecurity Technologies and Threats Suggested Topics of Interest but not limited to: Performance evaluation of Cybersecurity technologies Cybersecurity in the era of quantum computing Cybersecurity challenges in unconventional ICT domains Novel privacy-preserving technology deployment and experience Operational Security (OpSec) including learning lessons from practice Security of Critical Infrastructure Experience in IT/OT Security Integration AI and weaponization of Cybersecurity tools Ethical usage of AI for enhancing privacy, security, and trust Geopolitics and the impact on Security and Trust Nth supplier assessment, particularly for manufacturing and ubiquitous devices and applications Inherent bias in the recruitment agencies particularly those hindering women’s progress in security roles Active threat actors and impacts on national and global security Legal and Regulatory Frameworks and Policies in Cybersecurity and Privacy
Last updated by Dou Sun in 2024-08-07
Related Conferences
Short | Full Name | Submission | Conference |
---|---|---|---|
Diagrams | International Conference on the Theory and Application of Diagrams | 2016-01-04 | 2016-08-07 |
ICET'' | International Conference on Electronics Technology | 2025-01-20 | 2025-05-17 |
OSDOC | International Workshop Open Source and Design of Communication | 2012-06-11 | |
ICETE | International Joint Conference on e-business and Telecommunications | 2020-03-06 | 2020-07-08 |
ICARA | International Conference on Automation, Robotics and Applications | 2025-01-05 | 2025-02-12 |
ICICML | International Conference on Image Processing, Computer Vision and Machine Learning | 2024-10-21 | 2024-11-22 |
SSS | International Symposium on Stabilization, Safety, and Security of Distributed Systems | 2022-08-05 | 2022-11-15 |
ISAMSE | International Seminar on Advances in Materials Science and Engineering | 2019-08-13 | 2019-08-16 |
WOOT | USENIX Workshop on Offensive Technologies | 2020-05-27 | 2020-08-10 |
SENSORS | IEEE Sensors | 2018-06-18 | 2018-10-28 |
Related Journals
CCF | Full Name | Impact Factor | Publisher | ISSN |
---|---|---|---|---|
Artificial Intelligence and Autonomous Systems | ELSP | 2959-0744 | ||
Medical & Biological Engineering & Computing | 2.600 | Springer | 0140-0118 | |
IET Journal on Image Processing | IET | 1751-9659 | ||
Journal of Location Based Services | Taylor & Francis | 1748-9725 | ||
Computers and Geotechnics | 5.300 | Elsevier | 0266-352X | |
a | ACM Transactions on Computer-Human Interaction | 4.800 | ACM | 1073-0516 |
a | IEEE Transactions on Parallel and Distributed Systems | 5.600 | IEEE | 1045-9219 |
IEEE Transactions on Cognitive and Developmental Systems | 5.000 | IEEE | 2379-8920 | |
b | Journal of Computer Science and Technology | 1.200 | Springer | 1000-9000 |
Journal of Visual Languages and Computing | Elsevier | 1045-926X |
Full Name | Impact Factor | Publisher |
---|---|---|
Artificial Intelligence and Autonomous Systems | ELSP | |
Medical & Biological Engineering & Computing | 2.600 | Springer |
IET Journal on Image Processing | IET | |
Journal of Location Based Services | Taylor & Francis | |
Computers and Geotechnics | 5.300 | Elsevier |
ACM Transactions on Computer-Human Interaction | 4.800 | ACM |
IEEE Transactions on Parallel and Distributed Systems | 5.600 | IEEE |
IEEE Transactions on Cognitive and Developmental Systems | 5.000 | IEEE |
Journal of Computer Science and Technology | 1.200 | Springer |
Journal of Visual Languages and Computing | Elsevier |
Recommendation