International Conference on Emerging Trends in Cybersecurity & Blockchain (ICECB 2022) aims at promoting original and unpublished research works covering science, technologies, applications, and related categories on emerging trends in cyber security intelligence and Blockchain technology. It is worth noting that effectual cyber-attacks may disable an entire country's infrastructure and harm its economy. Indeed, cyber security is today acknowledged as a global issue that transcends national boundaries. The complexity of the problem, quick progress, and technical nature of cyber-attacks all contribute to a growing skills gap. There is an urgent need in the region for a domain-specialized scientific platform to provide a knowledge exchange forum in order to raise cyber security awareness and ensure information spillover to society. On the other hand, blockchain can bring solutions in several ways for the current cybersecurity issues with its distributed-ledger characteristics. The application of blockchain will exhibit a variety of complicated problems and new requirements, which brings more open issues and challenges for research communities. Blockchain will play an important role in secure decentralization in such emerging fields as the Internet of Things, Cyber-Physical Systems, edge computing, social networking, crowdsourcing, next-generation wireless communications, and even more other fields. Moreover, its advance should be further evolved in terms of scalability, security, privacy, efficiency, flexibility, availability, real decentralization, and high dependability.
The conference invites high-quality papers in the broad areas related to ubiquitous intelligence in cyber security, cyber security challenges, cyber intelligence, analytics, and Blockchain technology from different layers of a network, cloud security and big data, and the people towards the Cyber Space. Proposals for tutorials, special sessions, workshops, forums, demos, exhibitions are also extremely welcome.
Hacking
Phishing
Supply Chain Risks
Man-in-the-Middle Attack
DNS Tunnelling
Malware and Ransomware
DoS and DDoS
Cloud and Insider Threats
Cybersecurity Awareness
Expert Support in Cybersecurity
Updating Systems and software
Prevent Database Exposure
Spyware
Strategic Threat Intelligence
Tactical Threat Intelligence
Operational Threat Intelligence
Technical Threat Intelligence
Information Gathering
Sniffing
Spoofing
Structured Query Language (SQL) Injection
Ransomeware
Scamming
Exploitation of Devices or Networks
Automatic License Plate Recognition
Automatic Traffic Control Signals and System
Digital Control System of networks in Tunnels
Passenger Announcement System
Guideway Intrusion Detection System
Closed-Circuit Television with Cyber Defence Solutions
Ticketing System
Access Control System
Distributed Control System and Operations Zone
Sensor Jamming
Blinding
Spoofing,
Saturation
Information Disclosure of Sensitive Personal and AI Data
DDoS Attacks
Manipulation of Communication Equipment
State of Cloud Security
Manual Configurations
No Disaster Recovery Plan
Domain Hijacking
Inventory Management
Bad Logging and Monitoring
Misconfigured Networks
Broken Access Control
Improper Use of Default Configs
Publicly Accessible Storage
Insecure Developer Credentials
Theories of blockchain and distributed ledger technology
New blockchain architecture
Distributed consensus and fault tolerance mechanisms
Security privacy and trust of blockchain and distributed ledger technology
Decentralization, scalability, and security tradeoff
Performance analysis and optimization
Simulation and performance evaluation techniques
Smart contract and chain code
Applications and services based on blockchain
Protocols and algorithms based on blockchain
Blockchain in the Internet of things (IoT)
Blockchain in cyber physical systems
Blockchain in social networking
Blockchain in supply chain management
Blockchain in agriculture
Blockchain in connected and autonomous vehicles
Blockchain in crowdsourcing and crowdsensing
Blockchain in mobile cellular networks
Blockchain in edge and cloud computing
Blockchain in next-generation communications and networks
Blockchain and Cryptocurrency
Blockchain and artificial intelligence
Blockchain and game theory
Blockchain and industry 4.0
Authors are invited to submit papers through the Conference Link by March 24, 2022. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Conference Proceedings in this Journal series.
Local Fees: GBP 300
Overseas Fees: USD 400
Local Fees: GBP 330
Overseas Fees: USD 450
Prof. Dr. Prashant Pillai, Director of Wolverhampton Cyber Research Institute, University of Wolverhampton, UK
Dr. Arafatur Rahman, Senior Lecturer, University of Wolverhampton
Dr. A. Taufiq Asyhari, Birmingham City University, UK
Xiaokang Wang, St. Francis Xavier University, Canada
Dr. Md Saiful Azad, Green University, Bangladesh
Subrta Chowdhury, SVCET Engineering college Andra Pradesh, India
Hai Tao, Baoji University of Arts and Science, China
Eklas Hossain, Oregon Institute of Technology, USA
S M Nazmus Sadat, Universiti Malaysia Pahang, Malaysia
Md. Saef Ullah Miah, Universiti Malaysia Pahang, Malaysia
Abu Jafar Muhammad Muzahid, Universiti Malaysia Pahang, Malaysia
Fazlullah Khan, RoZetta Institute, NSW, Australia
Gunasekaran Manogaran, University of California, Davis, USA
Mohammed Nazmus Shakib, Green University, Bangladesh
Ibnu Febry Kurniawan, State University of Surabaya, Indonesia
Dr. Mohammad Patwary, Director of Digital Innovation & Solution Centre, University of Wolverhampton
Md Mustafizur Rahman, Universiti Malaysia Pahang
Hamdan Bin Daniyal, Universiti Malaysia Pahang
Sabira Khatun, RiTECHS
Md Rafiqul Islam, International Islamic University Malaysia
A. H. M. Zahirul Alam, International Islamic University Malaysia
Naveen Chilamkurt, SMIEEE La Trobe University, Melbourne, Australia
Md Jasim Uddin, Cardiff Metropolitan University, UK
Andultahman Ahmed Mohammed Al-Sewari, Universiti Malaysia Pahang, Malaysia
Dr Muhammad Kamran Naeem, University of Wolverhampton, UK
Taha Hussein Rassem (TPC Co-Chair), Universiti Malaysia Pahang, Malaysia
Celia Shahnaz, Bangladesh University of Engineering & Technology(BUET), Bangladesh
Lounis Chermak, University of London (Birkbeck College), UK
Paul Yoo, University of London (Birkbeck College), UK
B.K. Kaushik, IIT Roorkee, India
Debajani Mitra, IIT(ISM) Dhanbad, India
Mohammad M. Hassan, King Saud University, Riyadh, KSA
Xiong Li, Hunan University of Science and Technology, China
Zubair Md. Fadlullah, Tohoku University, Sendai, Japan
Khoirul Anwar, Telkom University, Indonesia
Valentina E. Balas, Aurel Vlaicu university of Arad, Romania
Musfiq Rahman, Thompson Rivers University, Canada
Mohd Mawardi Bin Saari, Universiti Malaysia Pahang, Malaysia
Roshahliza M Ramli, Universiti Malaysia Pahang, Malaysia
Sikder M Kamruzzaman, Ryerson University, Canada
Eklas Hossain, Oregon Institute of Technology, USA
Mohammad Osiur Rahman, University of Chittagong, Bangladesh
Ganesh Gopal, Galgotias University, India
Anton Satria Prabuwono, King Abdulaziz University, Saudi Arabia
Deepak Gupta, Maharaja Agrasen Institute of Technology, Delhi, India
Waheb AbdulJabar, Universiti Malaysia Pahang, Malaysia
Muhammad Akmal Bin Ramli, University Malaysia Kelantan, Malaysia
Syifak Izhar Hisham, Universiti Malaysia Pahang, Malaysia
Belal Abdullah Al-Fuhaidi, University of Science and Technology, Yemen
Ashish Khanna, Maharaja Agrasen Institute of Technology, Delhi, India
Gandeva Bayu Satrya, Telkom University, Indonesia
Vitaliy Mezhuyev, FH JOANNEUM University of Applied Sciences, Austria
Krishna Kant Singh, GL BAJAJ Institute of Technology and Management, Greater Noida, India
B. Balamurugan, Galgotias University, India
Akansha Singh, Galgotias University, India
Nadia Refat, Universiti Malaysia Pahang, Malaysia
Safwan Mahmood Yahya Ghaleb, University Malaysia Terengganu, Malaysia Ramdan bin Razali, RiTECHS, Malaysia Ihsan Ullah, National University of Ireland, Galway, Ireland