CUCN-2025: Cybersecurity Unlocked: Cryptography, Network Security, Data Protection |
Submission link | https://easychair.org/conferences/?conf=cucn2025 |
Abstract registration deadline | January 30, 2025 |
Submission deadline | March 31, 2025 |
The aim of this Book is to provide an overview of recent advances, applications, future directions and challenges in Cyber Security. It offers an opportunity for researchers and practitioners to identify new promising research directions and to present the latest achievements, ideas, and innovations in these areas.
The book primarily concentrated on modern developments and numerous effective and expanding concepts, supported by global academics. These concepts will assist the audience in addressing their real-time issues by implementing suitable security measures. We are interested in publishing numerous applications to assist researchers, network managers, academicians, industry engineers in computer science, artificial intelligence, IT professionals, and professionals in cybersecurity. These concepts will assist the audience in addressing their real-time issues by implementing suitable security measures. The book presents numerous applications to assist researchers, network managers, academicians, industry engineers in computer science, artificial intelligence, IT professionals, and professionals in cybersecurity.
Submission Guidelines
All papers must be original and not simultaneously submitted to another journal or conference. Each abstract must be in the range of 200-300 words, and the manuscript pages must be more than 20 and a maximum of 35 pages with double-spaced lines. The book shall be submitted to major abstract and indexing Scopus.
Table of Contents (but not limited too)
- Introduction to Cybersecurity:
- Fundamentals of Cybersecurity
- Understanding Cyber Threats and Attacks
- Network Security Essentials
- Applied mathematics in data security
- Applied cryptography
- Threats and Attacks with novel insights, techniques, or results
- Gamification in cybersecurity
- Network security and measurement
- Cryptography and Encryption Techniques
- Endpoint Security:
- Cloud Security
- Advanced Threat Detection and Response
- Zero Trust Architecture:
- Artificial Intelligence and Machine Learning in Cybersecurity
- Zero Trust Networking for IoT: Safeguarding Wireless Sensor, Edge, and Cloud Environments
- Biometric Authentication Methods for Mobile Devices: Exploring Fingerprint, Face Recognition, and Iris Scanning
- Two-Factor Authentication (2FA) and Multi-Factor Authentication (MFA) Solutions for Secure Mobile Data Communication
- Context-Aware Authentication Approaches for Mobile Devices: Leveraging Location, Time, and User Behaviour
- Cryptographic Authentication Techniques for Secure Data Transmission: Digital Signatures, Certificates, and Key Exchange Protocols
- Post-Quantum Cryptography for Enhanced Authentication in Mobile Data Communication: Resilience against Quantum Attacks
- Practical Security Measures
- Case Studies and Real-World Applications
Important Dates
- One-page write-up (Abstract with title) ……………….25-01-2025
- Abstract acceptance/rejection notification …………..30-01-2025
- Full chapter submission ………………………………………..30-03-2025
- First review notification ……………………………………....30-04-2025
- First review submission ………………………………………..15-05-2025
- Acceptance notification …………………………………….....30-05-2025
- Camera-ready submission ……………………………….....15-06-2025
Book Editors
- Dr. Bhanu Chander
- Dr. Santhos A
- Dr. Ravi A
Contact
All questions about submissions should be emailed to Dr. Bhanu Chander (email: bhanu@iiitkottayam.ac.in)