SlideShare a Scribd company logo
International Conference on Security & Applications (SECURA 2023)
August 12-13, 2023, Virtual Conference
https://secura2023.org/
Scope &Topics
International Conference on Security & Applications (SECURA 2023) focuses on all
technical and practical aspects of Security and its Applications. The goal of this conference is
to bring together researchers and practitioners from academia and industry to focus on
understanding modern security research trends and applications to establishing new
collaborations in these areas.
Authors are solicited to contribute to the conference by submitting articles that illustrate
research results, projects, surveying works and industrial experiences that describe significant
advances in the areas of Security & its applications.
Topics of interest include, but are not limited to, the following
• Applied Cryptography
• Artificial intelligence, Machine Learning for Security
• Blockchain and Distributed Systems
• Blockchain Technology, Cryptocurrencies and Cyber Security
• Cloud, Fog, Edge & Cognitive Security
• Cyber Physical System (CPS) Security (autonomous vehicles, industrial control
systems)
• Data Center Network Control, Security and Optimization
• Database and System Security
• E-mail security, Spam, Phishing, E-mail fraud
• Ethics in computer security
• Formal Methods and Programming Languages
• Hardware-Based Attacks
• Internet of Things (IoT) Security
• Internet Security & Applications (Social networking, crowd sourcing and Web based
applications, services security)
• Intrusion Detection and Prevention
• Mobile, Ad Hoc and Sensor Network Security
• Network and Wireless Network Security
• Peer-to-Peer Network Security
• Performance Evaluations of Protocols & Security Application
• Physical layer security
• Privacy and Anonymity
• Security & Network Management
• Security for emerging networks (SDN, Home Networks, Body-area Networks,
VANETs)
• Security of Virtual Machines
• Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack
etc,)
• Security, Trust and Privacy Challenges
• Smart City, Grid, Electronic Voting Security
• Software Security
• Ubiquitous Computing Security
• Virus, worms, Trojan Protection
• Web Security
Paper Submission
Authors are invited to submit papers through the conference Submission System by July 15,
2023. Submissions must be original and should not have been published previously or be
under consideration for publication while being evaluated for this conference. The
proceedings of the conference will be published by International Journal on Cybernetics &
Informatics (IJCI)
Selected papers from SECURA2023, after further revisions, will be published in the special
issues of the following journals
▪ International Journal of Computer Networks & Communications (IJCNC) - ERA,
Scopus, WJCI Indexed
▪ International Journal of Network Security & Its Applications (IJNSA) - ERA,WJCI
Indexed
▪ International Journal on Cryptography and Information Security (IJCIS)
▪ International Journal of Security, Privacy and Trust Management (IJSPTM)
▪ International Journal of Software Engineering & Applications (IJSEA)
▪ Information Technology in Industry (ITII)
Important Dates
• Submission Deadline : July 15, 2023
• Authors Notification : August 01, 2023
• Registration & Camera-Ready Paper Due : August 05, 2023
Contact Us
Here's where you can reach us :secura@secura2023.org (or) securaconf@yahoo.com

More Related Content

Similar to International Conference on Security & Applications (SECURA 2023)

Submit Your Research Papers - International Journal of Network Security & Its...
Submit Your Research Papers - International Journal of Network Security & Its...Submit Your Research Papers - International Journal of Network Security & Its...
Submit Your Research Papers - International Journal of Network Security & Its...IJNSA Journal
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...IJNSA Journal
 
Call for Papers - 9th International Conference on Cryptography and Informatio...
Call for Papers - 9th International Conference on Cryptography and Informatio...Call for Papers - 9th International Conference on Cryptography and Informatio...
Call for Papers - 9th International Conference on Cryptography and Informatio...ijgca
 
Call for Research Articles - International Journal of Network Security & Its ...
Call for Research Articles - International Journal of Network Security & Its ...Call for Research Articles - International Journal of Network Security & Its ...
Call for Research Articles - International Journal of Network Security & Its ...IJNSA Journal
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...IJNSA Journal
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...IJNSA Journal
 
Call for Paper - 3rd International Conference on IOT, Big Data and Security (...
Call for Paper - 3rd International Conference on IOT, Big Data and Security (...Call for Paper - 3rd International Conference on IOT, Big Data and Security (...
Call for Paper - 3rd International Conference on IOT, Big Data and Security (...ijmnct
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...IJNSA Journal
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...IJNSA Journal
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...IJNSA Journal
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...IJNSA Journal
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...IJNSA Journal
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...IJNSA Journal
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...IJNSA Journal
 
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...IJNSA Journal
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...IJNSA Journal
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...IJNSA Journal
 
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...IJNSA Journal
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...IJNSA Journal
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...IJNSA Journal
 

Similar to International Conference on Security & Applications (SECURA 2023) (20)

Submit Your Research Papers - International Journal of Network Security & Its...
Submit Your Research Papers - International Journal of Network Security & Its...Submit Your Research Papers - International Journal of Network Security & Its...
Submit Your Research Papers - International Journal of Network Security & Its...
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
Call for Papers - 9th International Conference on Cryptography and Informatio...
Call for Papers - 9th International Conference on Cryptography and Informatio...Call for Papers - 9th International Conference on Cryptography and Informatio...
Call for Papers - 9th International Conference on Cryptography and Informatio...
 
Call for Research Articles - International Journal of Network Security & Its ...
Call for Research Articles - International Journal of Network Security & Its ...Call for Research Articles - International Journal of Network Security & Its ...
Call for Research Articles - International Journal of Network Security & Its ...
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
Call for Paper - 3rd International Conference on IOT, Big Data and Security (...
Call for Paper - 3rd International Conference on IOT, Big Data and Security (...Call for Paper - 3rd International Conference on IOT, Big Data and Security (...
Call for Paper - 3rd International Conference on IOT, Big Data and Security (...
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 

Recently uploaded

fluid mechanics gate notes . gate all pyqs answer
fluid mechanics gate notes . gate all pyqs answerfluid mechanics gate notes . gate all pyqs answer
fluid mechanics gate notes . gate all pyqs answerapareshmondalnita
 
The Ultimate Guide to External Floating Roofs for Oil Storage Tanks.docx
The Ultimate Guide to External Floating Roofs for Oil Storage Tanks.docxThe Ultimate Guide to External Floating Roofs for Oil Storage Tanks.docx
The Ultimate Guide to External Floating Roofs for Oil Storage Tanks.docxCenterEnamel
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwoodseandesed
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
 
Online blood donation management system project.pdf
Online blood donation management system project.pdfOnline blood donation management system project.pdf
Online blood donation management system project.pdfKamal Acharya
 
Scaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltageScaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltageRCC Institute of Information Technology
 
Construction method of steel structure space frame .pptx
Construction method of steel structure space frame .pptxConstruction method of steel structure space frame .pptx
Construction method of steel structure space frame .pptxwendy cai
 
Digital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdfDigital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdfAbrahamGadissa
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdfAhmedHussein950959
 
Online resume builder management system project report.pdf
Online resume builder management system project report.pdfOnline resume builder management system project report.pdf
Online resume builder management system project report.pdfKamal Acharya
 
Natalia Rutkowska - BIM School Course in Kraków
Natalia Rutkowska - BIM School Course in KrakówNatalia Rutkowska - BIM School Course in Kraków
Natalia Rutkowska - BIM School Course in Krakówbim.edu.pl
 
Explosives Industry manufacturing process.pdf
Explosives Industry manufacturing process.pdfExplosives Industry manufacturing process.pdf
Explosives Industry manufacturing process.pdf884710SadaqatAli
 
Furniture showroom management system project.pdf
Furniture showroom management system project.pdfFurniture showroom management system project.pdf
Furniture showroom management system project.pdfKamal Acharya
 
Laundry management system project report.pdf
Laundry management system project report.pdfLaundry management system project report.pdf
Laundry management system project report.pdfKamal Acharya
 
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...Amil baba
 
A case study of cinema management system project report..pdf
A case study of cinema management system project report..pdfA case study of cinema management system project report..pdf
A case study of cinema management system project report..pdfKamal Acharya
 
Hall booking system project report .pdf
Hall booking system project report  .pdfHall booking system project report  .pdf
Hall booking system project report .pdfKamal Acharya
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdfKamal Acharya
 
KIT-601 Lecture Notes-UNIT-3.pdf Mining Data Stream
KIT-601 Lecture Notes-UNIT-3.pdf Mining Data StreamKIT-601 Lecture Notes-UNIT-3.pdf Mining Data Stream
KIT-601 Lecture Notes-UNIT-3.pdf Mining Data StreamDr. Radhey Shyam
 

Recently uploaded (20)

fluid mechanics gate notes . gate all pyqs answer
fluid mechanics gate notes . gate all pyqs answerfluid mechanics gate notes . gate all pyqs answer
fluid mechanics gate notes . gate all pyqs answer
 
The Ultimate Guide to External Floating Roofs for Oil Storage Tanks.docx
The Ultimate Guide to External Floating Roofs for Oil Storage Tanks.docxThe Ultimate Guide to External Floating Roofs for Oil Storage Tanks.docx
The Ultimate Guide to External Floating Roofs for Oil Storage Tanks.docx
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Online blood donation management system project.pdf
Online blood donation management system project.pdfOnline blood donation management system project.pdf
Online blood donation management system project.pdf
 
Scaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltageScaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltage
 
Construction method of steel structure space frame .pptx
Construction method of steel structure space frame .pptxConstruction method of steel structure space frame .pptx
Construction method of steel structure space frame .pptx
 
Digital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdfDigital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdf
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Online resume builder management system project report.pdf
Online resume builder management system project report.pdfOnline resume builder management system project report.pdf
Online resume builder management system project report.pdf
 
Natalia Rutkowska - BIM School Course in Kraków
Natalia Rutkowska - BIM School Course in KrakówNatalia Rutkowska - BIM School Course in Kraków
Natalia Rutkowska - BIM School Course in Kraków
 
Explosives Industry manufacturing process.pdf
Explosives Industry manufacturing process.pdfExplosives Industry manufacturing process.pdf
Explosives Industry manufacturing process.pdf
 
Furniture showroom management system project.pdf
Furniture showroom management system project.pdfFurniture showroom management system project.pdf
Furniture showroom management system project.pdf
 
Laundry management system project report.pdf
Laundry management system project report.pdfLaundry management system project report.pdf
Laundry management system project report.pdf
 
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
 
A case study of cinema management system project report..pdf
A case study of cinema management system project report..pdfA case study of cinema management system project report..pdf
A case study of cinema management system project report..pdf
 
Hall booking system project report .pdf
Hall booking system project report  .pdfHall booking system project report  .pdf
Hall booking system project report .pdf
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
KIT-601 Lecture Notes-UNIT-3.pdf Mining Data Stream
KIT-601 Lecture Notes-UNIT-3.pdf Mining Data StreamKIT-601 Lecture Notes-UNIT-3.pdf Mining Data Stream
KIT-601 Lecture Notes-UNIT-3.pdf Mining Data Stream
 

International Conference on Security & Applications (SECURA 2023)

  • 1. International Conference on Security & Applications (SECURA 2023) August 12-13, 2023, Virtual Conference https://secura2023.org/ Scope &Topics International Conference on Security & Applications (SECURA 2023) focuses on all technical and practical aspects of Security and its Applications. The goal of this conference is to bring together researchers and practitioners from academia and industry to focus on understanding modern security research trends and applications to establishing new collaborations in these areas. Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Security & its applications. Topics of interest include, but are not limited to, the following • Applied Cryptography • Artificial intelligence, Machine Learning for Security • Blockchain and Distributed Systems • Blockchain Technology, Cryptocurrencies and Cyber Security • Cloud, Fog, Edge & Cognitive Security • Cyber Physical System (CPS) Security (autonomous vehicles, industrial control systems) • Data Center Network Control, Security and Optimization • Database and System Security • E-mail security, Spam, Phishing, E-mail fraud • Ethics in computer security • Formal Methods and Programming Languages • Hardware-Based Attacks • Internet of Things (IoT) Security • Internet Security & Applications (Social networking, crowd sourcing and Web based applications, services security) • Intrusion Detection and Prevention • Mobile, Ad Hoc and Sensor Network Security • Network and Wireless Network Security • Peer-to-Peer Network Security • Performance Evaluations of Protocols & Security Application • Physical layer security • Privacy and Anonymity • Security & Network Management • Security for emerging networks (SDN, Home Networks, Body-area Networks, VANETs) • Security of Virtual Machines
  • 2. • Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,) • Security, Trust and Privacy Challenges • Smart City, Grid, Electronic Voting Security • Software Security • Ubiquitous Computing Security • Virus, worms, Trojan Protection • Web Security Paper Submission Authors are invited to submit papers through the conference Submission System by July 15, 2023. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by International Journal on Cybernetics & Informatics (IJCI) Selected papers from SECURA2023, after further revisions, will be published in the special issues of the following journals ▪ International Journal of Computer Networks & Communications (IJCNC) - ERA, Scopus, WJCI Indexed ▪ International Journal of Network Security & Its Applications (IJNSA) - ERA,WJCI Indexed ▪ International Journal on Cryptography and Information Security (IJCIS) ▪ International Journal of Security, Privacy and Trust Management (IJSPTM) ▪ International Journal of Software Engineering & Applications (IJSEA) ▪ Information Technology in Industry (ITII) Important Dates • Submission Deadline : July 15, 2023 • Authors Notification : August 01, 2023 • Registration & Camera-Ready Paper Due : August 05, 2023 Contact Us Here's where you can reach us :secura@secura2023.org (or) securaconf@yahoo.com