International Conference on Network Security and Computer Engineering 2020


ICNSCE 2020 is an opportunity for academics, students, scholars, scientists and engineers from around the world who are involved in the study, management, development and implementation of systems and concepts to combat information warfare or to improve Network Security and Computer Engineering to come together and exchange ideas. This conference is trying to establish itself as a key event for the understanding of threats and risks to information systems, the development of a strong security culture, and incident investigation.
Please consider submitting to this conference. We are interested in the entire range of concepts from theory to practice, including case studies, works-in-progress, and conceptual explorations.


ICNSCE 2020 is an opportunity for academics, students, scholars, scientists and engineers from around the world who are involved in the study, management, development and implementation of systems and concepts to combat information warfare or to improve Network Security and Computer Engineering to come together and exchange ideas. This conference is trying to establish itself as a key event for the understanding of threats and risks to information systems, the development of a strong security culture, and incident investigation.
Please consider submitting to this conference. We are interested in the entire range of concepts from theory to practice, including case studies, works-in-progress, and conceptual explorations.

Tracks of the Conference

  • Active Defense Systems
  • Adaptive Defense Systems
  • Analysis, Benchmark of Security Systems
  • Applied Cryptography
  • Authentication
  • Biometric Security
  • Complex Systems Security
  • Database and System Security
  • Data Protection
  • Data/System Integrity
  • Distributed Access Control
  • Distributed Attack Systems
  • Denial-of-Service
  • High Performance Network Virtualization
  • High Performance Security Systems
  • Hardware Security
  • Identity Management
  • Intelligent Defense Systems
  • Insider Threats
  • Internet and Network Forensics
  • Intrusion Detection and Prevention
  • Key Distribution and Management
  • Large-scale Attacks and Defense
  • Malware
  • Network Resiliency
  • Network Security
  • RFID Security and Privacy
  • Security Architectures
  • Security for Critical Infrastructures
  • Security in P2P systems
  • Security in Cloud and Grid Systems
  • Security in E-Commerce
  • Security in Pervasive/Ubiquitous Computing
  • Security and Privacy in Smart Grid
  • Security and Privacy in Wireless Networks
  • Secure Mobile Agents and Mobile Code
  • Security Policy
  • Security Protocols
  • Security Simulation and Tools
  • Security Theory and Tools
  • Standards and Assurance Methods
  • Trusted Computing
  • Trust Management
  • World Wide Web Security
  • Computer Architecture
  • Computer Modeling
  • Computer-aided Design
  • Automated Software Engineering
  • Computer Networks
  • Digital System and Logic Design
  • Multimedia Applications
  • Wireless Sensor Network
  • Network Security and Cryptography
  • Bioinformatics and Scientific Computing
  • Computer Animation
  • Digital Signal and Image Processing
  • Expert Systems
  • Internet and Web Applications
  • Social Media
This website uses cookies. By continuing to browse you agree to this and Conferize's terms of service.