International Conference on Computer Application and Information Technology 2020


ICNSCE 2020 is an opportunity for academics, students, scholars, scientists and engineers from around the world who are involved in the study, management, development and implementation of systems and concepts to combat information warfare or to improve Network Security and Computer Engineering to come together and exchange ideas. This conference is trying to establish itself as a key event for the understanding of threats and risks to information systems, the development of a strong security culture, and incident investigation.
Please consider submitting to this conference. We are interested in the entire range of concepts from theory to practice, including case studies, works-in-progress, and conceptual explorations.
Prospective authors are invited to submit original technical papers by the deadline for publication in the ICNSCE 2020 Conference Proceedings and for presentation(s) in the symposia listed below. Deadlines will be strictly matched and late papers will be summarily rejected. The conference welcomes papers on the following (but not limited to) research topics.


ICNSCE 2020 is an opportunity for academics, students, scholars, scientists and engineers from around the world who are involved in the study, management, development and implementation of systems and concepts to combat information warfare or to improve Network Security and Computer Engineering to come together and exchange ideas. This conference is trying to establish itself as a key event for the understanding of threats and risks to information systems, the development of a strong security culture, and incident investigation.
Please consider submitting to this conference. We are interested in the entire range of concepts from theory to practice, including case studies, works-in-progress, and conceptual explorations.
Prospective authors are invited to submit original technical papers by the deadline for publication in the ICNSCE 2020 Conference Proceedings and for presentation(s) in the symposia listed below. Deadlines will be strictly matched and late papers will be summarily rejected. The conference welcomes papers on the following (but not limited to) research topics.

Tracks of the Conference

  • Active Defense Systems
  • Adaptive Defense Systems
  • Analysis, Benchmark of Security Systems
  • Applied Cryptography
  • Authentication
  • Biometric Security
  • Complex Systems Security
  • Database and System Security
  • Data Protection
  • Data/System Integrity
  • Distributed Access Control
  • Distributed Attack Systems
  • Denial-of-Service
  • High Performance Network Virtualization
  • High Performance Security Systems
  • Hardware Security
  • Identity Management
  • Intelligent Defense Systems
  • Insider Threats
  • Internet and Network Forensics
  • Intrusion Detection and Prevention
  • Key Distribution and Management
  • Large-scale Attacks and Defense
  • Malware
  • Network Resiliency
  • Network Security
  • RFID Security and Privacy
  • Security Architectures
  • Security for Critical Infrastructures
This website uses cookies. By continuing to browse you agree to this and Conferize's terms of service.