SlideShare a Scribd company logo
1 of 2
Download to read offline
International Conference on Security & Applications (SECURA 2023)
August 12-13, 2023, Virtual Conference
https://secura2023.org/
Scope &Topics
International Conference on Security & Applications (SECURA 2023) focuses on all
technical and practical aspects of Security and its Applications. The goal of this conference is
to bring together researchers and practitioners from academia and industry to focus on
understanding modern security research trends and applications to establishing new
collaborations in these areas.
Authors are solicited to contribute to the conference by submitting articles that illustrate
research results, projects, surveying works and industrial experiences that describe significant
advances in the areas of Security & its applications.
Topics of interest include, but are not limited to, the following
• Applied Cryptography
• Artificial intelligence, Machine Learning for Security
• Blockchain and Distributed Systems
• Blockchain Technology, Cryptocurrencies and Cyber Security
• Cloud, Fog, Edge & Cognitive Security
• Cyber Physical System (CPS) Security (autonomous vehicles, industrial control
systems)
• Data Center Network Control, Security and Optimization
• Database and System Security
• E-mail security, Spam, Phishing, E-mail fraud
• Ethics in computer security
• Formal Methods and Programming Languages
• Hardware-Based Attacks
• Internet of Things (IoT) Security
• Internet Security & Applications (Social networking, crowd sourcing and Web based
applications, services security)
• Intrusion Detection and Prevention
• Mobile, Ad Hoc and Sensor Network Security
• Network and Wireless Network Security
• Peer-to-Peer Network Security
• Performance Evaluations of Protocols & Security Application
• Physical layer security
• Privacy and Anonymity
• Security & Network Management
• Security for emerging networks (SDN, Home Networks, Body-area Networks,
VANETs)
• Security of Virtual Machines
• Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack
etc,)
• Security, Trust and Privacy Challenges
• Smart City, Grid, Electronic Voting Security
• Software Security
• Ubiquitous Computing Security
• Virus, worms, Trojan Protection
• Web Security
Paper Submission
Authors are invited to submit papers through the conference Submission System by June 24,
2023. Submissions must be original and should not have been published previously or be
under consideration for publication while being evaluated for this conference. The
proceedings of the conference will be published by International Journal on Cybernetics &
Informatics (IJCI)
Selected papers from SECURA2023, after further revisions, will be published in the special
issues of the following journals
▪ International Journal of Computer Networks & Communications (IJCNC) - ERA,
Scopus, WJCI Indexed
▪ International Journal of Network Security & Its Applications (IJNSA) - ERA,WJCI
Indexed
▪ International Journal on Cryptography and Information Security (IJCIS)
▪ International Journal of Security, Privacy and Trust Management (IJSPTM)
▪ International Journal of Software Engineering & Applications (IJSEA)
▪ Information Technology in Industry (ITII)
Important Dates
• Submission Deadline : June 24, 2023
• Authors Notification : July 08, 2023
• Registration & Camera-Ready Paper Due : July 15, 2023
Contact Us
Here's where you can reach us :secura@secura2023.org (or) securaconf@yahoo.com

More Related Content

Similar to International Conference on Security & Applications (SECURA 2023)

Call for Papers - 9th International Conference on Cryptography and Informatio...
Call for Papers - 9th International Conference on Cryptography and Informatio...Call for Papers - 9th International Conference on Cryptography and Informatio...
Call for Papers - 9th International Conference on Cryptography and Informatio...ijgca
 
8th International Conference on Networks and Security (NSEC 2024)
8th International Conference on Networks and Security (NSEC 2024)8th International Conference on Networks and Security (NSEC 2024)
8th International Conference on Networks and Security (NSEC 2024)ClaraZara1
 
Submit Your Research Papers - International Journal of Network Security & Its...
Submit Your Research Papers - International Journal of Network Security & Its...Submit Your Research Papers - International Journal of Network Security & Its...
Submit Your Research Papers - International Journal of Network Security & Its...IJNSA Journal
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...IJNSA Journal
 
Call for Research Articles - International Journal of Network Security & Its ...
Call for Research Articles - International Journal of Network Security & Its ...Call for Research Articles - International Journal of Network Security & Its ...
Call for Research Articles - International Journal of Network Security & Its ...IJNSA Journal
 
Call for Paper - 3rd International Conference on IOT, Big Data and Security (...
Call for Paper - 3rd International Conference on IOT, Big Data and Security (...Call for Paper - 3rd International Conference on IOT, Big Data and Security (...
Call for Paper - 3rd International Conference on IOT, Big Data and Security (...ijmnct
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...IJNSA Journal
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...IJNSA Journal
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...IJNSA Journal
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...IJNSA Journal
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...IJNSA Journal
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...IJNSA Journal
 
Submit Your Research Papers - International Journal of Network Security & Its...
Submit Your Research Papers - International Journal of Network Security & Its...Submit Your Research Papers - International Journal of Network Security & Its...
Submit Your Research Papers - International Journal of Network Security & Its...IJNSA Journal
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...IJNSA Journal
 
Submit Your Research Papers - International Journal of Network Security & Its...
Submit Your Research Papers - International Journal of Network Security & Its...Submit Your Research Papers - International Journal of Network Security & Its...
Submit Your Research Papers - International Journal of Network Security & Its...IJNSA Journal
 
Call for Research Articles - International Journal of Network Security & Its ...
Call for Research Articles - International Journal of Network Security & Its ...Call for Research Articles - International Journal of Network Security & Its ...
Call for Research Articles - International Journal of Network Security & Its ...IJNSA Journal
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...IJNSA Journal
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...IJNSA Journal
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...IJNSA Journal
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...IJNSA Journal
 

Similar to International Conference on Security & Applications (SECURA 2023) (20)

Call for Papers - 9th International Conference on Cryptography and Informatio...
Call for Papers - 9th International Conference on Cryptography and Informatio...Call for Papers - 9th International Conference on Cryptography and Informatio...
Call for Papers - 9th International Conference on Cryptography and Informatio...
 
8th International Conference on Networks and Security (NSEC 2024)
8th International Conference on Networks and Security (NSEC 2024)8th International Conference on Networks and Security (NSEC 2024)
8th International Conference on Networks and Security (NSEC 2024)
 
Submit Your Research Papers - International Journal of Network Security & Its...
Submit Your Research Papers - International Journal of Network Security & Its...Submit Your Research Papers - International Journal of Network Security & Its...
Submit Your Research Papers - International Journal of Network Security & Its...
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
Call for Research Articles - International Journal of Network Security & Its ...
Call for Research Articles - International Journal of Network Security & Its ...Call for Research Articles - International Journal of Network Security & Its ...
Call for Research Articles - International Journal of Network Security & Its ...
 
Call for Paper - 3rd International Conference on IOT, Big Data and Security (...
Call for Paper - 3rd International Conference on IOT, Big Data and Security (...Call for Paper - 3rd International Conference on IOT, Big Data and Security (...
Call for Paper - 3rd International Conference on IOT, Big Data and Security (...
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
Submit Your Research Papers - International Journal of Network Security & Its...
Submit Your Research Papers - International Journal of Network Security & Its...Submit Your Research Papers - International Journal of Network Security & Its...
Submit Your Research Papers - International Journal of Network Security & Its...
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
Submit Your Research Papers - International Journal of Network Security & Its...
Submit Your Research Papers - International Journal of Network Security & Its...Submit Your Research Papers - International Journal of Network Security & Its...
Submit Your Research Papers - International Journal of Network Security & Its...
 
Call for Research Articles - International Journal of Network Security & Its ...
Call for Research Articles - International Journal of Network Security & Its ...Call for Research Articles - International Journal of Network Security & Its ...
Call for Research Articles - International Journal of Network Security & Its ...
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 

Recently uploaded

Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfJNTUA
 
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisSeismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisDr.Costas Sachpazis
 
Dynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptxDynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptxMustafa Ahmed
 
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024EMMANUELLEFRANCEHELI
 
Artificial Intelligence in due diligence
Artificial Intelligence in due diligenceArtificial Intelligence in due diligence
Artificial Intelligence in due diligencemahaffeycheryld
 
What is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, FunctionsWhat is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, FunctionsVIEW
 
Databricks Generative AI Fundamentals .pdf
Databricks Generative AI Fundamentals  .pdfDatabricks Generative AI Fundamentals  .pdf
Databricks Generative AI Fundamentals .pdfVinayVadlagattu
 
Passive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.pptPassive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.pptamrabdallah9
 
engineering chemistry power point presentation
engineering chemistry  power point presentationengineering chemistry  power point presentation
engineering chemistry power point presentationsj9399037128
 
Introduction-to- Metrology and Quality.pptx
Introduction-to- Metrology and Quality.pptxIntroduction-to- Metrology and Quality.pptx
Introduction-to- Metrology and Quality.pptxProfASKolap
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxKarpagam Institute of Teechnology
 
Autodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxAutodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxMustafa Ahmed
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...archanaece3
 
Presentation on Slab, Beam, Column, and Foundation/Footing
Presentation on Slab,  Beam, Column, and Foundation/FootingPresentation on Slab,  Beam, Column, and Foundation/Footing
Presentation on Slab, Beam, Column, and Foundation/FootingEr. Suman Jyoti
 
Working Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdfWorking Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdfSkNahidulIslamShrabo
 
DBMS-Report on Student management system.pptx
DBMS-Report on Student management system.pptxDBMS-Report on Student management system.pptx
DBMS-Report on Student management system.pptxrajjais1221
 
Diploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdfDiploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdfJNTUA
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...josephjonse
 
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfInstruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfEr.Sonali Nasikkar
 
Circuit Breakers for Engineering Students
Circuit Breakers for Engineering StudentsCircuit Breakers for Engineering Students
Circuit Breakers for Engineering Studentskannan348865
 

Recently uploaded (20)

Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
 
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisSeismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
 
Dynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptxDynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptx
 
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
 
Artificial Intelligence in due diligence
Artificial Intelligence in due diligenceArtificial Intelligence in due diligence
Artificial Intelligence in due diligence
 
What is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, FunctionsWhat is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, Functions
 
Databricks Generative AI Fundamentals .pdf
Databricks Generative AI Fundamentals  .pdfDatabricks Generative AI Fundamentals  .pdf
Databricks Generative AI Fundamentals .pdf
 
Passive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.pptPassive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.ppt
 
engineering chemistry power point presentation
engineering chemistry  power point presentationengineering chemistry  power point presentation
engineering chemistry power point presentation
 
Introduction-to- Metrology and Quality.pptx
Introduction-to- Metrology and Quality.pptxIntroduction-to- Metrology and Quality.pptx
Introduction-to- Metrology and Quality.pptx
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptx
 
Autodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxAutodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptx
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...
 
Presentation on Slab, Beam, Column, and Foundation/Footing
Presentation on Slab,  Beam, Column, and Foundation/FootingPresentation on Slab,  Beam, Column, and Foundation/Footing
Presentation on Slab, Beam, Column, and Foundation/Footing
 
Working Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdfWorking Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdf
 
DBMS-Report on Student management system.pptx
DBMS-Report on Student management system.pptxDBMS-Report on Student management system.pptx
DBMS-Report on Student management system.pptx
 
Diploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdfDiploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdf
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfInstruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
 
Circuit Breakers for Engineering Students
Circuit Breakers for Engineering StudentsCircuit Breakers for Engineering Students
Circuit Breakers for Engineering Students
 

International Conference on Security & Applications (SECURA 2023)

  • 1. International Conference on Security & Applications (SECURA 2023) August 12-13, 2023, Virtual Conference https://secura2023.org/ Scope &Topics International Conference on Security & Applications (SECURA 2023) focuses on all technical and practical aspects of Security and its Applications. The goal of this conference is to bring together researchers and practitioners from academia and industry to focus on understanding modern security research trends and applications to establishing new collaborations in these areas. Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Security & its applications. Topics of interest include, but are not limited to, the following • Applied Cryptography • Artificial intelligence, Machine Learning for Security • Blockchain and Distributed Systems • Blockchain Technology, Cryptocurrencies and Cyber Security • Cloud, Fog, Edge & Cognitive Security • Cyber Physical System (CPS) Security (autonomous vehicles, industrial control systems) • Data Center Network Control, Security and Optimization • Database and System Security • E-mail security, Spam, Phishing, E-mail fraud • Ethics in computer security • Formal Methods and Programming Languages • Hardware-Based Attacks • Internet of Things (IoT) Security • Internet Security & Applications (Social networking, crowd sourcing and Web based applications, services security) • Intrusion Detection and Prevention • Mobile, Ad Hoc and Sensor Network Security • Network and Wireless Network Security • Peer-to-Peer Network Security • Performance Evaluations of Protocols & Security Application • Physical layer security • Privacy and Anonymity • Security & Network Management • Security for emerging networks (SDN, Home Networks, Body-area Networks, VANETs) • Security of Virtual Machines
  • 2. • Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,) • Security, Trust and Privacy Challenges • Smart City, Grid, Electronic Voting Security • Software Security • Ubiquitous Computing Security • Virus, worms, Trojan Protection • Web Security Paper Submission Authors are invited to submit papers through the conference Submission System by June 24, 2023. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by International Journal on Cybernetics & Informatics (IJCI) Selected papers from SECURA2023, after further revisions, will be published in the special issues of the following journals ▪ International Journal of Computer Networks & Communications (IJCNC) - ERA, Scopus, WJCI Indexed ▪ International Journal of Network Security & Its Applications (IJNSA) - ERA,WJCI Indexed ▪ International Journal on Cryptography and Information Security (IJCIS) ▪ International Journal of Security, Privacy and Trust Management (IJSPTM) ▪ International Journal of Software Engineering & Applications (IJSEA) ▪ Information Technology in Industry (ITII) Important Dates • Submission Deadline : June 24, 2023 • Authors Notification : July 08, 2023 • Registration & Camera-Ready Paper Due : July 15, 2023 Contact Us Here's where you can reach us :secura@secura2023.org (or) securaconf@yahoo.com