Objective

The primary objective of the International Conference on Emerging Trends in Cybersecurity (ICETCS 2024) is to provide a global platform for researchers, academicians, industry professionals, and policymakers to converge, share insights, and collaboratively explore the latest advancements and emerging trends in the field of cybersecurity. This conference aims to facilitate discussions on cutting-edge research, innovative technologies, and practical solutions that address the evolving challenges posed by cyber threats in our interconnected world. By fostering interdisciplinary dialogue and knowledge exchange, the conference aims to contribute to the development of robust cybersecurity strategies, enhance collaboration between academia and industry, and ultimately strengthen collective resilience against cyber threats on a global scale. Please Note: All the accepted paper will be published in Journal of Cyber Security and Applications (Scopus Indexed Journal) 

Join Us

The conference invites high-quality papers in the broad areas related to ubiquitous intelligence in cyber security, cyber security challenges, cyber intelligence, analytics, and Blockchain technology from different layers of a network, cloud security and big data, and the people towards the Cyber Space. Proposals for tutorials, special sessions, workshops, forums, demos, exhibitions are also extremely welcome.

Major Tracks

Hacking

Phishing

Supply Chain Risks

Man-in-the-Middle Attack

DNS Tunnelling

Malware and Ransomware

DoS and DDoS

Cloud and Insider Threats

Cybersecurity Awareness

Expert Support in Cybersecurity

Updating Systems and software

Prevent Database Exposure

Spyware

Strategic Threat Intelligence

Tactical Threat Intelligence

Operational Threat Intelligence

Technical Threat Intelligence

Information Gathering

Sniffing

Spoofing

Structured Query Language (SQL) Injection

Ransomeware

Scamming

Exploitation of Devices or Networks

Automatic License Plate Recognition

Automatic Traffic Control Signals and System

Digital Control System of networks in Tunnels

Passenger Announcement System

Guideway Intrusion Detection System

Closed-Circuit Television with Cyber Defence Solutions

Ticketing System

Access Control System

Distributed Control System and Operations Zone

Sensor Jamming

Blinding

Spoofing,

Saturation

Information Disclosure of Sensitive Personal and AI Data

DDoS Attacks

Manipulation of Communication Equipment

State of Cloud Security

Manual Configurations

No Disaster Recovery Plan

Domain Hijacking

Inventory Management

Bad Logging and Monitoring

Misconfigured Networks

Broken Access Control

Improper Use of Default Configs

Publicly Accessible Storage

Insecure Developer Credentials

Theories of blockchain and distributed ledger technology

New blockchain architecture

Distributed consensus and fault tolerance mechanisms

Security privacy and trust of blockchain and distributed ledger technology

Decentralization, scalability, and security tradeoff

Performance analysis and optimization

Simulation and performance evaluation techniques

Smart contract and chain code

Applications and services based on blockchain

Protocols and algorithms based on blockchain

Challenges and Solutions in IoT Device Security

Cybersecurity in IoT-enabled Cyber-Physical Systems Securing Social Networks within IoT Frameworks

IoT Supply Chain Security and Blockchain Integration

Ensuring Cyber Resilience in IoT Agriculture Systems

Security Measures for Connected and Autonomous Vehicles

Crowdsourcing and Crowdsensing Security in IoT Environments

Securing Mobile Cellular Networks in IoT Landscapes

Edge and Cloud Computing Security for IoT Infrastructure

Next-Generation Communications and Networks Security in IoT

Cryptocurrency Security in IoT Transactions

Artificial Intelligence and its Role in IoT Security

Game Theory Applications for IoT Cybersecurity

Industry 4.0 Security Challenges in IoT Implementations

Paper Submission

Why will you submit your paper to ICETCS 2024?

  • Papers accepted for publication will be featured in a Scopus-indexed journal (https://www.sciencedirect.com/journal/cyber-security-and-applications).
  • Authors of accepted papers will receive complimentary access to a workshop on "How to Write a Quality Journal Paper".
  • Registered authors are eligible to participate in a complimentary CPD course titled "Introduction to Cybersecurity" with the issuance of a certificate upon completion.
  • Authors can opt to enroll in additional CPD courses, such as Cybersecurity Essentials, Cybersecurity for the Board, and GDPR, by paying an extra fee of 200 USD per course. (For Registration: Please Click Here)

Papers Submission Process

Authors interested in submitting their papers or manuscripts are kindly requested to contact us via email no later than June 02, 2024 for the direct submission link. Please include the abstract and title of your paper in your email.

For further information or to obtain the submission link, please contact:

We look forward to receiving your submissions.

Paper Submission Template: Please Click Here

Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published in Journal of Cyber Security and Applications (Scopus Indexed Journal).


Call for Poster Presentations

We invite researchers and practitioners to showcase their innovative work at our upcoming poster session, scheduled for the second day of the conference. This session provides a vibrant platform for presenters to engage with conference attendees and share their insights and findings in a visually engaging format.

Posters will be evaluated and categorized into Gold, Silver, and Bronze sections, each representing different levels of achievement and innovation in the field.

Submission Fee: The registration fee for the authors presenting their posters is $50.

To participate, please submit your proposals via the conference website. Ensure your submission includes a brief description of the content and the main objectives of your work. We look forward to your contributions and to an exciting and informative poster session!

Poster Template: Please Click Here

Poster Submission: Please email your poster to Dr. Arafat Rahman at [email protected] or Dr. Muhammad Naeem at [email protected]

Registration

Please always keep on update with any news through our website. Registration fees are stated as below. Special doscount of $50 for RiTECHS Members. Please use this link (https://ritechs.org/joinus) for free RiTECHS membership. Any requirements please do contact us.

Local Fees: USD 350

Overseas Fees: USD 400

Local Fees: USD 400

Overseas Fees: USD 450

Event Speakers / meet with greaters

Dr. David Oswald

Professor in Cyber Security

University of Birmingham

Dr. Kim-Kwang Raymond Choo

Professor

University of Texas at San Antonio, U.S.

Dr. Zakirul Alam Bhuiyan

Associate Professor

Fordham University, USA

Dr. Zeeshan Pervez

Professor in Cyber Security

University of Wolverhampton

Event Organizer

Organising Committee

Prof. Dr. Prashant Pillai, Pro Vice-Chancellor for Research and Knowledge Exchange and Director of Wolverhampton Cyber Research Institute, University of Wolverhampton, UK

Prof. Dr. Mohammed Atiquzzaman, Hitachi Chair, Presidential Professor of Computer Science, University of Oklahoma and Advisor of RITECHs, UK

Dr. Arafatur Rahman, Reader in Cyber Security, University of Wolverhampton, UK

Prof. Dr. P. Vijayakumar, University College of Engineering Tindivanam, Anna University Chennai, India.

Dr. Muhammad Kamran Naeem, Lecturer in Computer Science, University of Northampton, UK

Dr. Zakirul Alam Bhuiyan, Fordham University, USA

Mohammed Nazmus Shakib, Green University, Bangladesh

Benzir Huq Mou

Dr. S M Nazmus Sadat, Universiti Malaysia Pahang, Malaysia

Hai Tao, Baoji University of Arts and Science, China

Gunasekaran Manogaran, University of California, Davis, USA

Nour Moustafa, UNSW, Australia

Fazlullah Khan, RoZetta Institute, NSW, Australia

Mohammed Alenazi, King Saud University, Saudi Arabia

Consolee Mbarushimana, University of Wolverhampton, UK

Dr. A. Taufiq Asyhari, Monash University, Australia

Xiaokang Wang, St. Francis Xavier University, Canada

Prof. Zeeshan Pervez, University of Wolverhampton, UK

Dr. Ahmad Firdaus bin Zainal Abidin, Universiti Malaysia Pahang Al-Sultan Abdullah , Malaysia

Md Jasim Uddin, Cardiff Metropolitan University, UK

Andultahman Ahmed Mohammed Al-Sewari, Universiti Malaysia Pahang, Malaysia

Dr Muhammad Kamran Naeem, University of Northampton, UK

Taha Hussein Rassem (TPC Co-Chair), Universiti Malaysia Pahang, Malaysia

Celia Shahnaz, Bangladesh University of Engineering & Technology(BUET), Bangladesh

Lounis Chermak, University of London (Birkbeck College), UK

Paul Yoo, University of London (Birkbeck College), UK

B.K. Kaushik, IIT Roorkee, India

Debajani Mitra, IIT(ISM) Dhanbad, India

Mohammad M. Hassan, King Saud University, Riyadh, KSA

Xiong Li, Hunan University of Science and Technology, China

Zubair Md. Fadlullah, Tohoku University, Sendai, Japan

Khoirul Anwar, Telkom University, Indonesia

Valentina E. Balas, Aurel Vlaicu university of Arad, Romania

Musfiq Rahman, Thompson Rivers University, Canada

Mohd Mawardi Bin Saari, Universiti Malaysia Pahang, Malaysia

Roshahliza M Ramli, Universiti Malaysia Pahang, Malaysia

Sikder M Kamruzzaman, Ryerson University, Canada

Eklas Hossain, Oregon Institute of Technology, USA

Mohammad Osiur Rahman, University of Chittagong, Bangladesh

Ganesh Gopal, Galgotias University, India

Anton Satria Prabuwono, King Abdulaziz University, Saudi Arabia

Deepak Gupta, Maharaja Agrasen Institute of Technology, Delhi, India

Waheb AbdulJabar, Universiti Malaysia Pahang, Malaysia

Muhammad Akmal Bin Ramli, University Malaysia Kelantan, Malaysia

Syifak Izhar Hisham, Universiti Malaysia Pahang, Malaysia

Belal Abdullah Al-Fuhaidi, University of Science and Technology, Yemen

Ashish Khanna, Maharaja Agrasen Institute of Technology, Delhi, India

Gandeva Bayu Satrya, Telkom University, Indonesia

Vitaliy Mezhuyev, FH JOANNEUM University of Applied Sciences, Austria

Krishna Kant Singh, GL BAJAJ Institute of Technology and Management, Greater Noida, India

B. Balamurugan, Galgotias University, India

Akansha Singh, Galgotias University, India

Nadia Refat, Universiti Malaysia Pahang, Malaysia

Safwan Mahmood Yahya Ghaleb, University Malaysia Terengganu, Malaysia

Ramdan bin Razali, RiTECHS, Malaysia

Ihsan Ullah, National University of Ireland, Galway, Ireland

Dr. Md Saiful Azad, Green University, Bangladesh

Subrta Chowdhury, SVCET Engineering college Andra Pradesh, India

Eklas Hossain, Oregon Institute of Technology, USA

DR. MOHD FAIZAL BIN AB RAZAK, Universiti Malaysia Pahang Al-Sultan Abdullah , Malaysia

Dr. Muhammad Ajmal Azad, Birmingham City University, UK

Dr. Shancang Li, Cardiff University, UK

Mohammed Jumah Alenazi, King Saud bin Abdulaziz University, Saudi Arabia

Dr. Syifak Izhar, Universiti Malaysia Pahang, Malaysia

Dr Abdul Ghani, De Montfort University, UK

Dr Faisal Saeed, Birmingham City University, UK

Dr Mohemed Farah, Birmingham City University, UK

Essa Q. Shahra, Birmingham City University, UK

Dalia Elbanna, Birmingham City University, UK

Haitham Mahmoud, Birmingham City University, UK

Fuad Ghaleb, Birmingham City University, UK

Junaid Arshad, Birmingham City University, UK

Edlira Vakaj, Birmingham City University, UK

Dr Raouf Abozariba, Birmingham City University, UK

Abdurrahman Alsewari , Birmingham City University, UK

Muhammad Towfiqur Rahman, University of Asia Pacific, Bangladesh

Dr. Mohammad Patwary, Director of Digital Innovation & Solution Centre, University of Wolverhampton

Md Mustafizur Rahman, Universiti Malaysia Pahang

Hamdan Bin Daniyal, Universiti Malaysia Pahang

Sabira Khatun, RiTECHS

Md Rafiqul Islam, International Islamic University Malaysia

A. H. M. Zahirul Alam, International Islamic University Malaysia

Naveen Chilamkurt, SMIEEE La Trobe University, Melbourne, Australia

Contact Us / lorem ipsum