NEXT EVENT SESSION
29-30 May 2024
(Instant E-Certificate)
For Enquiries:
cybersecurity@researchw.com

 

Next Award Issue starts in 

About the Event

About the Award

International Research Awards on Cybersecurity and Cryptography is the Researchers and Research organizations around the world in the motive of Encouraging and Honoring them for their Significant contributions & Achievements for the Advancement in their field of expertise. Researchers and scholars of all nationalities are eligible to receive ScienceFather  Cyber Security  Awards. Nominees are judged on past accomplishments, research excellence, and outstanding academic achievements.

What does the award include

The profile of the award winners of each category be listed on our website and it will be maintained forever.

The certificate, medal, and Memento, and photographs will be a testimony. Further, this recognition and additional proof of hard work and achievements must be globally accessible for Researchers and hence will be available online 24/7.

It’s an indicator of success Enhances the reputation improves the benchmark –it’s a matter of pride – Motivation – Raises the visibility of the success.

Researcher Awards

Researcher Awards

Young Scientist Award: This Awarded to researchers who are in the early stage of their career for outstanding research in their field. This award is bestowed in the motive of identifying and Recognizing the young Researchers around the world who have the potential to become leaders n their field. The qualification of the nominee must be recognized and documented by corresponding successes in research contributions, such as Collaborations and Publications. Eligibility: A working professional can nominate for the Award. Research grants for medical students also awarded as scientist awards. He must be below 35 years of age as of the conference date.

Best Researcher Award: This Awarded to the Best researcher in any field for their significant contribution to the advancement in their field of expertise. The qualification of the nominee must be recognized and documented by corresponding successes in research contributions, such as Collaborations, Contracts, and Publications. Eligibility: A working professional can nominate for the Award. There is no age limit for Best Researcher Award category.

Outstanding Scientist Award: Exceptional research record of significant contribution to the institute/company. The qualification of the nominee must be recognized and documented by corresponding successes in research contributions, such as Grants, Patents, Collaborations, Contracts, books, and Publications. Eligibility: A working professional can nominate for the Award. He must be above 35 years of age as of the conference date.

Lifetime Achievement Award: This awards an Exceptional research record of significant contribution to the institute/company. The qualification of the nominee must be recognized and documented by corresponding successes in research contributions, such as Grants, Patents, Collaborations, Contracts, books, and Publications. Eligibility: A working professional can nominate for the Award. He must be above 35 years of age as of the conference date.

Women Researcher Award: Awarded to the Best women researcher in any field for their significant contribution to the advancement in their field of expertise. The qualification of the nominee must be recognized and documented by corresponding successes in research contributions, such as Collaborations, Contracts, and Publications. Eligibility: A working professional can nominate for the Award.

Best Innovation Award: This Awarded to researchers/institutes/Organizations who are in the early stage of their careers for outstanding innovation in their field. This award is bestowed with the motive of identifying and Recognizing the Researchers/institutes/organizations around the world who have the potential to become leaders n their field. The qualification of the nominee must be recognized and documented by corresponding successes in research contributions, such as Collaborations and Publications. Eligibility: A working professional/ Institute/ Organization can nominate for the Award.

Best Faculty Award: This Awarded to the Best Faculty in any field for their significant contribution to the advancement in their field of expertise. The qualification of the nominee must be recognized and documented by corresponding successes in research/ Academic contributions, such as Collaborations, Contracts, and Publications. Eligibility: A working professional can nominate for the Award. He must be under 45 years of age as of the conference date.

Best Scholar Award: This Awarded to Scholar/ Student who are in the early stage of their career for outstanding research in their field. This award is bestowed in the motive of identifying and Recognizing the young Researchers scholar/ Student around the world who have the potential to become leaders n their field. The qualification of the nominee must be recognized and documented by corresponding successes in research contributions, such as Publications. Eligibility: A scholar can nominate for the Award. He must be under 35 years of age as of the conference date.

Institute/ Organization Awards

Institute/ Organization Awards:

Excellence in Innovation: This Awarded to Institute/ Organization/ Business/ Industries who are in the early stage of their career for outstanding innovation in their field. This award is bestowed in the motive of identifying and Recognizing the Institute/ Organization/ Business/ Industries around the world who have the potential to become leaders n their field. The qualification of the nominee must be recognized and documented by corresponding successes in innovation contribution, such as Innovation, Patent, Entrepreneurship, and New project development. Eligibility: A Institute /Organization/ Industries can nominate for the Award.

Excellence in Research: This Awarded to Institute/ Organization/ Business/ Industries who are in the early stage of their career for outstanding research in their field. This award is bestowed in the motive of identifying and Recognizing the Institute/ Organization/ Business/ Industries around the world who have the potential to become leaders n their field. The qualification of the nominee must be recognized and documented by corresponding successes in research contribution, such as publication, research Grants, Research & developments, Entrepreneurship development. Eligibility: A Institute /Organization/ Industries can nominate for the Award.

Excellence Award (Any Scientific field): This Awarded to Institute/ Organization/ Business/ Industries who are in the early stage of their career for outstanding excellence in their field. This award is bestowed in the motive of identifying and Recognizing the Institute/ Organization/ Business/ Industries around the world who have the potential to become leaders n their field. The qualification of the nominee must be recognized and documented by corresponding successes in their field contribution, such as Advancement, New Technology, and Development. Eligibility: A Institute /Organization/ Industries can nominate for the Award.

Best Research /Innovation Extension activity: This Awarded to Institute/ Organization/ Business/ Industries who are in the early stage of their career for outstanding Research/ innovation in their field. This award is bestowed in the motive of identifying and Recognizing the Institute/ Organization/ Business/ Industries around the world who have the potential to become leaders n their field. The qualification of the nominee must be recognized and documented by corresponding successes in their field contribution, such as Extension, Public useful innovation /Research Activities, Innovative services, Awareness programs, and New Technology awareness Development. Eligibility :A Institute /Organization/ Industries can nominate for the Award.

How to Apply

How to Apply

The Candidates with eligibility can click the "Nominate /Submit Your Profile (CV) Now" button and fill up the online submission form and Submit it.

This section describes the total Research Awards processes in step by steps:

  1. Received Nomination documents will be sent for the screening process
  2. Acknowledgment intimation via email will be communicated to the Nominee
  3. The team may ask the proof for the credits mentioned in the Resume.
  4. Cross verifying the documents submitted & forwarding it to the Committee.
  5. The selected candidate indicated through email. Also, the selected nominees will be checked anytime on the website track of my submission.
  6. Event and Celebration Registration
  7. Release of the winners list in the official web page
  8. Award presentation ceremony
  9. Release of the Award winners and his profile Report.

Registration

Registration Details

Registration Covers

  • An exclusive web page for a highly rated profile of the award winners will always be available online.
  • Participation in Award event Session and Keynote session.
  • Certificate, Memento, and Photographs.
  • Event Kit, Tea, Coffee & Snacks.
  • Veg & Non-Veg Lunch during the Event.
  • Event and Celebration Registration
  • Release of the winners list in the official web page
  • Award presentation ceremony
  • Release of the Award winners and his profile Report.

Registration Procedure

Click the “Register Now” button at the conference page and enter your Submission ID in the Search Box
Your Submissions will be listed on that page. You can find the Register Now link beside your submission. Click the link and now you will be redirected to the Conference registration form where you can make your registration using credit/debit cards

General Instructions to Nominees

  1. The candidates with proper eligibility are requested to submit the online nomination form in order to get nominated for the award
  2. If your nomination is accepted by our Judges, we will send you an email regarding your profile selection
  3. Awardees must register for the event
  4. Dress Code: Award Recipients have to wear a formal dress. There are no restrictions on color or design. The audience attending only the ceremony can wear clothing of their own choice.
  5. General Information: Each winner's name will be called & asked to collect their Awards on the Stage with an official photographer to capture the moments.

 

Terms & Conditions

Terms & Conditions

ScienceFather Terms & Conditions Policy was last updated on June 25, 2022

Privacy Policy

This awards  Customer personal information for our legitimate business purposes, to process and respond to inquiries, and provide our services, to manage our relationship with editors, authors, institutional clients, service providers, and other business contacts, to market our services and subscription management. We do not sell, rent/ trade your personal information to third parties.

Relationship

Sciencefather awards Operate a Customer Association Management and email list program, which we use to inform customers and other contacts about our services, including our publications and events. Such marketing messages may contain tracking technologies to track subscriber activity relating to engagement, demographics, and other data, and to build subscriber profiles.

Disclaimer

 All editorial matters published on this website represent the opinions of the authors and not necessarily those of the Publisher with the publications. Statements and opinions expressed do not represent the official policies of the relevant associations unless so stated. Every effort has been made to ensure the accuracy of the material that appears on this website. Please ignore, however, that some errors may occur.

Responsibility

Delegates are personally responsible for their belongings at the venue. The Organizers will not be held accountable for any stolen or missing items belonging to Delegates, Speakers, or Attendees; due to any reason whatsoever.

Insurance

Registration fees that do not include insurance of any kind.

Press and Media

Press permission must be getting from the ScienceFather Conferences Organizing Committee before the event. The press will not quote speakers or delegates unless they have obtained their approval in writing. This conference is not associated with any commercial meeting company.

Transportation

Please note that any (or) all traffic and parking is the responsibility of the registrant.

Requesting an Invitation Letter

For security purposes, the letter of invitation will be sent only to those individuals who had registered for the conference. Once your registration is complete, please contact contact@ScienceFather.com to request a personalized letter of invitation.

Cancellation Policy

If cancel this event for any reason, you will receive a credit for 100% of the registration fee paid. You may use this credit for another Primary healthcare award which must occur within one year from the date of cancellation.

Postponement Policy

If postpone an event for any reason and you are unable or indisposed to attend on rescheduled dates, you will receive a credit for 100% of the registration fee paid. You may use this credit for another ScienceFather event which must occur within one year from the date of postponement.

Transfer of registration

All fully paid registrations are transferable to other persons from the same organization if the registered person is unable to attend the event. The registered person must make transfers in writing to contact@sciencefather.com. Details must include the full name of an alternative person, their title, contact phone number, and email address. All other registration details will be assigned to the new person unless otherwise specified. Registration can be transferred from one conference to another conference of ScienceFather if the person is unable to attend one of the meetings. However, Registration cannot be transferred if it will be intimated within 14 days of the particular conference. The transferred registrations will not be eligible for Refund.

Visa Information

Keeping given the increased security measures, we would like to request all the participants to apply for Visa as soon as possible. NESIN awards will not directly contact embassies and consulates on behalf of visa applicants. All delegates or invitees should apply for Business Visa only. Important note for failed visa applications: Visa issues cannot come under the consideration of the cancellation policy of NESIN awards, including the inability to obtain a visa.

Refund Policy

Regarding refunds, all bank charges will be for the registrant's account. All cancellations or modifications of registration must make in writing to contact@ScienceFather.com

If the registrant is unable to attend and is not in a position to transfer his/her participation to another person or event, then the following refund arrangements apply:

Keeping given advance payments towards Venue, Printing, Shipping, Hotels and other overheads, we had to keep Refund Policy is as following conditions,

Before 60 days of the Conference: Eligible for Full Refund less $100 Service Fee
Within 60-30 days of Conference: Eligible for 50% of payment Refund
Within 30 days of Conference: Not eligible for Refund
E-Poster Payments will not be refunded.

Accommodation Cancellation Policy

 Accommodation Providers such as hotels have their cancellation policies, and they generally apply when cancellations are made less than 30 days before arrival. Please contact us as soon as possible if you wish to cancel or amend your accommodation. ScienceFather will advise the cancellation policy of your accommodation provider, before withdrawing or changing your booking, to ensure you are fully aware of any non-refundable deposits.

Sponsorship

Sponsorship

Sciencefather warmly invites you to sponsor or exhibit at International Conference. We expect participants more than 200 numbers for our International conference will provide an opportunity to hear and meet/ads to Researchers, Practitioners, and Business Professionals to share expertise, foster collaborations, and assess rising innovations across the world in the core area of mechanical engineering.

Sponsorship Details

Diamond Sponsorship

  1. Acknowledgment during the opening of the conference
  2. Complimentary Booth of size 10 meters square
  3. Four (4) delegate’s complimentary registrations with lunch
  4. Include marketing document in the delegate pack
  5. Logo on Conference website, Banners, Backdrop, and conference proceedings
  6. One exhibition stand (1×1 meters) for the conference
  7. One full cover page size ad in conference proceedings
  8. Opportunities for Short speech at events
  9. Opportunity to sponsors conference kit
  10. Opportunity to sponsors conference lanyards, ID cards
  11. Opportunity to sponsors conference lunch
  12. Recognition in video ads
  13. 150-word company profile and contact details in the delegate pack

Platinum Sponsorship

  1. Three (3) delegate’s complimentary registrations with lunch
  2. Recognition in video ads
  3. Opportunity to sponsors conference lunch
  4. Opportunity to sponsors conference lanyards, ID cards
  5. Opportunity to sponsors conference kit
  6. Opportunities for Short speech at events
  7. One full-page size ad in conference proceedings
  8. One exhibition stand (1×1 meters) for the conference
  9. Logo on Conference website, Banners, Backdrop, and conference proceedings
  10. Include marketing document in the delegate pack
  11. Complimentary Booth of size 10 meters square
  12. Acknowledgment during the opening of the conference
  13. 100-word company profile and contact details in the delegate pack

Gold Sponsorship

  1. Two (2) delegate’s complimentary registrations with lunch
  2. Opportunities for Short speech at events
  3. Logo on Conference website, Banners, Backdrop, and conference proceedings
  4. Include marketing document in the delegate pack
  5. Complimentary Booth of size 10 meters square
  6. Acknowledgment during the opening of the conference
  7. 100-word company profile and contact details in the delegate pack
  8. ½ page size ad in conference proceedings

Silver Sponsorship

  1. Acknowledgment during the opening of the conference
  2. One(1) delegate’s complimentary registrations with lunch
  3. Include marketing document in the delegate pack
  4. Logo on Conference website, Banners, Backdrop, and conference proceedings
  5. ¼ page size ad in conference proceedings
  6. 100-word company profile and contact details in the delegate pack

Individual Sponsorship

  1. Acknowledgment during the opening of the conference
  2. One(1) delegate’s complimentary registrations with lunch

 

Sponsorship Registration Fees

Details Registration fees
Diamond Sponsorship USD 2999
Platinum Sponsorship USD 2499
Gold Sponsorship USD 1999
Silver Sponsorship USD 1499
Individual Sponsorship USD 999

Exhibitions

Exhibitions

Exhibit your Products & Services

Exhibit your Products & Services in our Event of the International Research Awards on Cybersecurity and Cryptography. Exhibitors are welcomed from Commercial and Non-Commercial Organizations related to Cybersecurity and Cryptography.

The best platform to develop new partnerships & collaborations.

Best location to speed up your route into every territory in the World.

Our exhibitor booths were visited 4-5 times by 80% of the attendees during the conference.

Network development with both Academia and Business.

 

Exhibitor benefits

Exhibit booth of Size-3X3 sqm.

Promotion of your logo/Company Name/Brand Name through the conference website.

Promotional video on company products during the conference (Post session and Breaks).

Logo recognition in the Scientific program, Conference banner, and flyer.

One A4 flyer inserts into the conference kit.

An opportunity to sponsor 1 Poster Presentation Award.

Contact Us

For Enquiries, Contact us through conference mail.

Popular Books

Popular Books

The Cuckoos Egg by Clifford Stoll | The Hacker Crackdown\" by Bruce Sterling | The Art of Deception\" by Kevin Mitnick | Ghost in the Wires by Kevin Mitnick | The Code Book by Simon Singh | The Cathedral and the Bazaar by Eric S. Raymond | Practical Malware Analysis by Michael Sikorski and Andrew Honig | Applied Cryptography by Bruce Schneier | Cryptography Engineering by Niels Ferguson, Bruce Schneier, and Tadayoshi Kohno | Hacking: The Art of Exploitation by Jon Erickson | Gray Hat Hacking by Shon Harris and Allen Harper | The Shellcoders Handbook by Chris Anley, John Heasman, Felix Lindner, and Gerardo Richarte | The Web Application Hacker\'s Handbook by Dafydd Stuttard and Marcus Pinto | Metasploit: The Penetration Tester\'s Guide by David Kennedy, Jim O\'Gorman, Devon Kearns, and Mati Aharoni | Black Hat Python by Justin Seitz | Penetration Testing: A Hands-On Introduction to Hacking by Georgia Weidman | The Basics of Hacking and Penetration Testing by Patrick Engebretson | Red Team Field Manual by Ben Clark | Blue Team Handbook: Incident Response Edition by Don Murdoch | The Practice of Network Security Monitoring by Richard Bejtlich | Applied Network Security Monitoring by Chris Sanders and Jason Smith | \"Network Forensics: Tracking Hackers through Cyberspace\" by Sherri Davidoff and Jonathan Ham | Windows Internals by Mark Russinovich and David Solomon | The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System by Bill Blunden | Malware Forensics: Investigating and Analyzing Malicious Code by Cameron H. Malin, Eoghan Casey, and James M. Aquilina | Computer Forensics and Digital Investigation with EnCase Forensic by Suzanne Widup | Linux Forensics by Philip Polstra | The Tao of Network Security Monitoring by Richard Bejtlich | Practical Packet Analysis by Chris Sanders | Network Warrior by Gary A. Donahue | TCP/IP Illustrated by Richard Stevens | Network Security Essentials by William Stallings | Information Security: Principles and Practices by Mark Merkow and Jim Breithaupt | Security Engineering by Ross Anderson | Security Metrics by Andrew Jaquith | Network Security: Private Communication in a Public World by Charlie Kaufman, Radia Perlman, and Mike Speciner | Security in Computing by Charles P. Pfleeger and Shari Lawrence Pfleeger | Threat Modeling: Designing for Security by Adam Shostack | The Future of Violence: Robots and Germs, Hackers and Drones - Confronting a New Age of Threat by Benjamin Wittes and Gabriella Blum | Cybersecurity and Cyberwar: What Everyone Needs to Know by P.W. Singer and Allan Friedman | Cybersecurity Law by Jeff Kosseff | The Cuckoo\'s Egg by Clifford Stoll | Neuromancer by William Gibson | The Art of Deception by Kevin Mitnick | Snow Crash by Neal Stephenson | The Hacker Crackdown by Bruce Sterling | Cryptonomicon by Neal Stephenson | Ghost in the Wires by Kevin Mitnick | The Dark Net by Jamie Bartlett | Black Hat Python by Justin Seitz | Masters of Deception by Michelle Slatalla and Joshua Quittner | The Code Book by Simon Singh | Zero Day by Mark Russinovich | Little Brother by Cory Doctorow | The Phoenix Project by Gene Kim, Kevin Behr, and George Spafford | Underground by Suelette Dreyfus | The Big Switch by Nicholas Carr | We Are Anonymous by Parmy Olson | Stealing the Network by Johnny Long | Hackers: Heroes of the Computer Revolution by Steven Levy | Dark Territory by Fred Kaplan | The Cyberiad by Stanislaw Lem | A Fire Upon The Deep by Vernor Vinge | The Diamond Age by Neal Stephenson | The Cathedral and the Bazaar by Eric S. Raymond | The Watchman by Robert Crais | The Shockwave Rider by John Brunne | Prince of Networks by Graham Harman | The Trusted Advisor by David H. Maister | How to Measure Anything by Douglas W. Hubbard | The Art of SEO by Eric Enge, Stephan Spencer, and Jessie Stricchiola | The Web Application Hacker\'s Handbook by Dafydd Stuttard and Marcus Pinto | Penetration Testing: A Hands-On Introduction to Hacking by Georgia Weidman | The Shellcoder\'s Handbook by Chris Anley, John Heasman, Felix Lindner, and Gerardo Richarte | The Rootkit Arsenal by Bill Blunden | Gray Hat Python by Justin Seitz | Hacking | Neuromancer by William Gibson | Snow Crash by Neal Stephenson | The Girl with the Dragon Tattoo by Stieg Larsson | Cryptonomicon by Neal Stephenson | Ready Player One by Ernest Cline | Little Brother by Cory Doctorow | The Diamond Age by Neal Stephenson | Cyberiad by Stanislaw Lem | Pattern Recognition by William Gibson | The Shockwave Rider by John Brunner | The Cuckoo\'s Egg by Clifford Stoll | The Hacker Crackdown by Bruce Sterling | The Art of Deception by Kevin Mitnick | The Phoenix Project by Gene Kim, Kevin Behr, and George Spafford | Ghost in the Shell by Masamune Shirow | The Singularity is Near by Ray Kurzweil | The Cathedral and the Bazaar by Eric S. Raymond | Snow Crash by Neal Stephenson | The Complete Idiot\'s Guide to Computer Basics by Joe Kraynak | Mind Performance Hacks by Ron Hale-Evans | The Art of Intrusion by Kevin Mitnick | The Dark Net by Jamie Bartlett | Hackers: Heroes of the Computer Revolution by Steven Levy | The C Programming Language by Brian W. Kernighan and Dennis M. Ritchie | The Soul of a New Machine by Tracy Kidder | Data and Goliath by Bruce Schneier | The Google Story by David A. Vise and Mark Malseed | The Innovators by Walter Isaacson | The Facebook Effect by David Kirkpatrick | The Big Switch by Nicholas Carr | The Future of the Internet--And How to Stop It by Jonathan Zittrain | The Net Delusion by Evgeny Morozov | The Code Book by Simon Singh | The New Rules of Marketing and PR by David Meerman Scott | The Lean Startup by Eric Ries | The Startup Owner\'s Manual by Steve Blank and Bob Dorf | The Design of Everyday Things by Don Norman | The Elements of User Experience by Jesse James Garrett | Don\'t Make Me Think by Steve Krug | A Book Apart: Design is a Job by Mike Monteiro | The Lean UX by Jeff Gothelf and Josh Seiden | The Agile Samurai by Jonathan Rasmusson | Getting Real by 37signals | The 7 Habits of Highly Effective People by Stephen R. Covey | The Power of Habit by Charles Duhigg | Mindset: The New Psychology of Success by Carol Dweck | Drive: The Surprising Truth About What Motivates Us by Daniel H. Pink | The Talent Code by Daniel Coyle | The War of Art by Steven Pressfield | The Elements of Style by William Strunk Jr. and E.B. White | Zen and the Art of Motorcycle Maintenance by Robert M. Pirsig | The Power of Now by Eckhart Tolle | Thinking, Fast and Slow by Daniel Kahneman | Outliers by Malcolm Gladwell | Blink by Malcolm Gladwell | The Tipping Point by Malcolm Gladwell | Quiet: The Power of Introverts in a World That Can\'t Stop Talking by Susan Cain | Influence: The Psychology of Persuasion by Robert Cialdini | Start with Why by Simon Sinek | The 5 Love Languages by Gary Chapman | How to Win

Popular Societies

Popular Societies

International Association of Computer Science and Information Technology (IACSIT) - international | Association for Computing Machinery (ACM) Special Interest Group on Security, Audit, and Control (SIGSAC) - international | Institute of Electrical and Electronics Engineers (IEEE) Cybersecurity Initiative - international | Information Systems Security Association (ISSA) - international | International Association of Cryptologic Research (IACR) - international | European Association for Security (EASF) - Europe | European Cyber Security Organisation (ECSO) - Europe | Cybersecurity Association of China (CAC) - China | Korea Information Security Industry Association (KISIA) - South Korea | Israel National Cyber Directorate (INCD) - Israel | Cyber Security Agency (CSA) - Singapore | Australian Cyber Security Centre (ACSC) - Australia | Cyber Security Malaysia (CSM) - Malaysia | Cyber Security Institute (CSI) - Russia | Cybersecurity Association of Japan (CAJ) - Japan | Cybersecurity Ventures (CSV) – USA | International Association for Cryptologic Research (IACR) - International | Institute of Electrical and Electronics Engineers (IEEE) Cybersecurity Community - International | Information Systems Security Association (ISSA) - International | Association for Computing Machinery (ACM) Special Interest Group on Security, Audit and Control (SIGSAC) - International | Cloud Security Alliance (CSA) - International | Cyber Security Malaysia - Malaysia | Japan Network Security Association (JNSA) - Japan | Cybersecurity Association of China - China | Center for Cybersecurity and Cybercrime Investigation (CCCI) - United States | Cybersecurity and Infrastructure Security Agency (CISA) | Association for Computing Machinery (ACM) Special Interest Group on Security, Audit and Control (SIGSAC) - International | Information Systems Security Association (ISSA) - International | International Association of Computer Science and Information Technology (IACSIT) - International | International Society of Forensic Computer Examiners (ISFCE) - International | International Association of Computer Investigative Specialists (IACIS) - International | Cybersecurity Association of Maryland (CAMI) - USA | European Association for e-Identity and Security (EEMA) - Europe | Cyber Security Canada - Canada | Australian Information Security Association (AISA) - Australia | Information Security Society Africa-Nigeria (ISSAN) - Nigeria | Cybersecurity Association of Serbia (CASS) - Serbia | Japan Network Security Association (JNSA) - Japan | Association of Information Security Professionals (AISP) - India | European Cyber Security Organisation (ECSO) - Europe | International Association for Cryptologic Research (IACR) - International | Information Systems Security Association (ISSA) - International | Association for Computing Machinery (ACM) Special Interest Group on Security, Audit and Control (SIGSAC) - International | Institute of Electrical and Electronics Engineers (IEEE) Cybersecurity Community - International | Information Security Forum (ISF) - International | International Association of Computer Science and Information Technology (IACSIT) - International | Computer Security Institute (CSI) - United States | Cybersecurity Association of Maryland, Inc. (CAMI) - United States | British Computer Society (BCS) - United Kingdom | European Association for e-Identity and Security (EEMA) - Europe | Australian Information Security Association (AISA) - Australia | Singapore Infocomm Technology Security Authority (SITSA) - Singapore | Association for Computing Machinery Special Interest Group on Security, Audit, and Control (ACM SIGSAC) - International | International Association for Cryptologic Research (IACR) - International | Information Systems Security Association (ISSA) - International | Institute of Electrical and Electronics Engineers (IEEE) Computer Society Technical Committee on Security and Privacy (TCSP) - International | International Federation for Information Processing (IFIP) Working Group 11.3 on Data and Application Security and Privacy - International | Society for Industrial and Applied Mathematics (SIAM) Activity Group on Data Mining and Analytics - International | Association for Information Systems Special Interest Group on Security (AIS SIGSEC) - International | Computer Security Institute (CSI) - United States | Open Web Application Security Project (OWASP) - International | European Association for Theoretical Computer Science (EATCS) - Europe | Association for Computing Machinery (ACM) Special Interest Group on Security, Audit, and Control (SIGSAC) - International | Institute of Electrical and Electronics Engineers (IEEE) Cybersecurity Community - International | International Association for Cryptologic Research (IACR) - International | The Information Systems Security Association (ISSA) - International | The Open Web Application Security Project (OWASP) - International | The Cloud Security Alliance (CSA) - International | The SANS Institute - United States | The National Cyber Security Centre (NCSC) - United Kingdom | The European Network and Information Security Agency (ENISA) - European Union | The Cyber Security Agency of Singapore (CSA) - Singapore | Cloud Security Alliance (CSA) - USA | International Association of Computer Science and Information Technology (IACSIT) - Singapore | International Association of Engineers (IAENG) - Hong Kong | International Association for Cryptologic Research (IACR) - USA | International Federation for Information Processing (IFIP) - Austria | International Association for Computer and Information Science (ACIS) - South Korea | Institute of Electrical and Electronics Engineers (IEEE) - USA | Association for Computing Machinery (ACM) - USA | European Association for Signal Processing (EURASIP) - Europe | Cloud Security Forum - Japan | Cloud Security Alliance (CSA) - Global | International Association of Computer Science and Information Technology (IACSIT) - Global | International Association for Cryptologic Research (IACR) - Global | International Association of Engineers (IAENG) - Global | Information Systems Security Association (ISSA) - Global | Association for Computing Machinery (ACM) - Global | Institute of Electrical and Electronics Engineers (IEEE) - Global | Cloud Computing Association (CCA) - United States | Cloud Industry Forum (CIF) - United Kingdom | Cloud Security Forum (CSF) - Europe | International Association of Privacy Professionals (IAPP) - United States | European Data Protection Board (EDPB) - Europe | British Computer Society (BCS) - United Kingdom | German Association for Data Protection and Data Security (GDD) - Germany | Asia Pacific Privacy Authorities (APPA) - Asia Pacific region | Canadian Institute for Information and Privacy Studies (CIIPS) - Canada | Australian Privacy Foundation (APF) - Australia | Korean Society for Privacy Protection (KSPP) - South Korea

Popular Researchers

Popular Researchers

Dr. Michael Bailey, Computer Science, University of Illinois at Urbana-Champaign, USA | Dr. Srdjan Capkun, Computer Science, ETH Zurich, Switzerland | Dr. Susan Landau, Computer Science, Tufts University, USA | Dr. Xiaofeng Wang, Computer Science, Indiana University Bloomington, USA | Dr. Alina Oprea, Computer Science, Northeastern University, USA | Dr. Giovanni Vigna, Computer Science, University of California, Santa Barbara, USA | Dr. Markus Jakobsson, Computer Science, University of Maryland, USA | Dr. Wenke Lee, Computer Science, Georgia Institute of Technology, USA | Dr. Gene Tsudik, Computer Science, University of California, Irvine, USA | Dr. Roberto Di Pietro, Computer Science, Hamad Bin Khalifa University, Qatar | Dr. Peter Gutmann, Computer Science, University of Auckland, New Zealand | Dr. Daniele Perito, Computer Science, University of Twente, Netherlands | Dr. Adam Aviv, Computer Science, George Washington University, USA | Dr. Elisa Bertino, Computer Science, Purdue University, USA | Dr. Ahmad-Reza Sadeghi, Computer Science, Technische Universität Darmstadt, Germany | Dr. Wenjing Lou, Computer Science, Virginia Tech, USA | Dr. Christopher Kruegel, Computer Science, University of California, Santa Barbara, USA | Dr. Ravi Sandhu, Computer Science, University of Texas at San Antonio, USA | Dr. Markus Riek, Computer Science, Northeastern University, USA | Dr. Z. Morley Mao, Computer Science, University of Michigan, USA | Dr. Alessandro Acquisti, Information Technology and Public Policy, Carnegie Mellon University, USA | Dr. Michael Backes, Computer Science, Saarland University, Germany | Dr. Heng Yin, Computer Science, University of California, Riverside, USA | Dr. Nicolas Christin, Computer Science, Carnegie Mellon University, USA | Dr. Sushil Jajodia, Computer Science, George Mason University, USA | Dr. Marco Cova, Computer Science, University of Birmingham, UK | Dr. Jonathan Katz, Computer Science, University of Maryland, USA |  | Dr. Martina Lindorfer, University of Vienna, Austria | Dr. Brendan Dolan-Gavitt, New York University, USA | Dr. Nicolas Christin, Carnegie Mellon University, USA | Dr. Matthew Smith, University of Bonn, Germany |  Dr. Giovanni Vigna, University of California, Santa Barbara, USA |  Dr. Hoda Alkhzaimi, New York University Abu Dhabi, UAE |  Dr. David Balenson, SRI International, USA |  Dr. Michael Bailey, University of Illinois, Urbana-Champaign, USA |  Dr. Michalis Polychronakis, Stony Brook University, USA |  Dr. Konstantinos Papamiltiadis, University of Ioannina, Greece | Dr. Shouhuai Xu, University of Texas at San Antonio, USA |  Dr. David Evans, University of Virginia, USA | Dr. Fabio Massacci, University of Trento, Italy |  Dr. Giovanni Livraga, University of Milan, Italy |  Dr. Tao Zhang, Huawei Technologies, China |  Dr. Angelos Stavrou, George Mason University, USA | Dr. Robert Banks - Cybersecurity Policy, Stanford University, USA | Dr. Karen Renaud - Human Factors in Cybersecurity, University of Glasgow, UK | Dr. Gene Tsudik - Cryptography and Security Protocols, University of California, Irvine, USA | Dr. Jelena Mirkovic - Network Security and Privacy, University of Southern California, USA | Dr. Ross Anderson - Security Engineering, University of Cambridge, UK | Dr. Wenke Lee - Intrusion Detection and Malware Analysis, Georgia Institute of Technology, USA | Dr. Urs Hengartner - Privacy and Anonymity, University of Waterloo, Canada | Dr. Sadia Afroz - Adversarial Machine Learning, University of California, Berkeley, USA | Dr. Sean Smith - Security and Privacy in Distributed Systems, Dartmouth College, USA | Dr. Giovanni Vigna - Software Security, University of California, Santa Barbara, USA | Dr. Nasir Memon - Digital Forensics, New York University, USA | Dr. Ryan Ko - Cybersecurity Governance, University of Waikato, New Zealand | Dr. Wenjing Lou - Security and Privacy in Mobile and Wireless Networks, Virginia Tech, USA | Dr. Sushil Jajodia - Database and Distributed Systems Security, George Mason University, USA | Dr. Haining Wang - Network Security and Privacy, University of Delaware, USA | Dr. Vassil Roussev - Digital Forensics, University of New Orleans, USA | Dr. Kai Chen - Mobile Security and Privacy, Chinese Academy of Sciences, China | Dr. William Enck - Mobile and App Security, North Carolina State University, USA | Dr. Tingting Chen - Network Security and Privacy, University of Electronic Science and Technology of China, China | Dr. Stefanos Gritzalis - Information Security Management, University of the Aegean, Greece | Dr. Adam Doupé - Security of Cyber-Physical Systems, Arizona State University, USA | Dr. Sandeep Gupta - Hardware Security, Arizona State University, USA | Dr. Zhenkai Liang - System and Network Security, Peking University, China | Dr. Alvaro Cardenas - Cyber-Physical Systems Security, University of California, Santa Cruz, USA | Dr. Sencun Zhu - Mobile and Cloud Security, The Pennsylvania State University, USA | Dr. David Basin - Formal Methods and Security, ETH Zurich, Switzerland | Dr. Liqun Chen - Security and Cryptography, University of Surrey, UK | Dr. Anil Jain - Biometric Security, Michigan State University, USA | Dr. Kevin Butler - Security and Privacy in Distributed Systems, University of Florida, USA | Dr. Hui Zhang - Security and Privacy in Big Data, Carnegie Mellon University, USA | Dr. Atul Prakash - Security and Privacy in Internet of Things, University of Michigan, USA | Dr. Christian Rossow - Malware Analysis and Detection, CISPA Helmholtz Center for Information Security, Germany | Dr. Marco University, USA | Dr. Ali Dehghantanha, Cybersecurity and Digital Forensics, University of Guelph, Canada | Dr. Ross Anderson, Security Engineering, University of Cambridge, UK | Dr. Wenke Lee, Network and Systems Security, Georgia Institute of Technology, USA | Dr. Hao Chen, Applied Cryptography, University of California, Davis, USA | Dr. Jens Grossklags, Privacy and Security Economics, Technical University of Munich, Germany | Dr. Giovanni Vigna, Malware Analysis and Detection, University of California, Santa Barbara, USA | Dr. Lorrie Cranor, Usable Privacy and Security, Carnegie Mellon University, USA | Dr. Srinivasan Keshav, Network and Systems Security, University of Waterloo, Canada | Dr. Hadi Shiravi, Cyber Threat Intelligence, University of Texas at Dallas, USA | Dr. Konstantin Beznosov, Cybersecurity and Privacy, University of British Columbia, Canada | Carvalho - Cybercrime and Cybersecurity, University of Lisbon, Portugal | Dr. Valtteri Niemi - Cybersecurity Education, University of Helsinki, Finland | Dr. Bharat Bhargava - Security and Privacy in Cloud Computing, Purdue

Related Patents

Related Patents

Title: Method for detecting and mitigating network threats Name: Ronald Rivest, Adi Shamir, and Yael Tauman University: Massachusetts Institute of Technology (MIT) Country: United States Patent Number: US8671304B2 Year: 2014 | Title: Method and apparatus for secure communications using dynamically assigned keys Name: Whitfield Diffie and Martin Hellman University: Stanford University Country: United States Patent Number: US4052563A Year: 1977 | Title: System and method for secure communication over a public network Name: Bruce Schneier University: None (Independent Researcher) Country: United States Patent Number: USRE45450E1 Year: 2015 (original patent filed in 1998) | Title: Method and apparatus for secure processing of cryptographic keys Name: Paul Kocher and Joshua Jaffe University: None (Independent Researchers) Country: United States Patent Number: US6108743A Year: 2000 | Title: Method and apparatus for detecting and preventing unauthorized access to a computer network Name: Dorothy Denning University: Georgetown University Country: United States Patent Number: US5805836A Year: 1998 | Title: System and Method for Detecting Malicious Activity in a Network Name: Dr. Salvatore Stolfo University: Columbia University Country: USA Patent Number: US 10,181,836 B2 Year: 2019 | Title: System and Method for Detecting Network Intrusions Name: Dr. Wenke Lee University: Georgia Institute of Technology Country: USA Patent Number: US 9,277,977 B2 Year: 2016 | Title: System and Method for Protecting a Computer Network from Attack Name: Dr. John McHugh University: Dalhousie University Country: Canada Patent Number: US 8,966,201 B2 Year: 2015 | Title: Method and Apparatus for Network Anomaly Detection Name: Dr. Robin Berthier University: École Polytechnique Fédérale de Lausanne (EPFL) Country: Switzerland Patent Number: US 9,947,401 B2 Year: 2018 | Title: System and Method for Detecting and Mitigating Insider Threats Name: Dr. Shambhu Upadhyaya University: SUNY Buffalo Country: USA Patent Number: US 10,626,091 B2 Year: 2020 | Title: System and Method for Detecting Cybersecurity Threats in a Network Name: Dr. Eugene H. Spafford University: Purdue University Country: USA Patent Number: US 10,813,779 B2 Year: 2020 | Title: Method and system for malware detection and analysis Name: Fengmin Gong University: Palo Alto Networks Inc. Country: United States Patent number: US 10345583B2 Year: 2019 | Title: Method and system for detecting network intrusions Name: David Watson University: British Telecommunications plc Country: United Kingdom Patent number: US 10528841B2 Year: 2020 | Title: Method and apparatus for secure data communication Name: Chaitali Sengupta University: Indian Institute of Technology Kharagpur Country: India Patent number: US 10158034B2 Year: 2018 | Title: System and method for detecting and mitigating distributed denial of service attacks Name: Rami Puzis University: Ben-Gurion University of the Negev Country: Israel Patent number: US 10431480B2 Year: 2019 | Title: Method and apparatus for secure multi-party computation Name: Vladimir Kolesnikov University: University of Tartu Country: Estonia Patent number: US 10290577B2 Year: 2019 | Title: System and method for detecting and preventing data breaches Name: Mark Gazit University: ThetaRay Ltd. Country: Israel Patent number: US 10555320B2 Year: 2020 | Title: Method and apparatus for secure online authentication Name: Christian Schaffner University: University of Amsterdam Country: Netherlands Patent number: US 10143181B2 Year: 2018 | Title: System and method for detecting and responding to insider threats Name: Derek Gabbard University: RedOwl Analytics, Inc. Country: United States Patent number: US 10290108B2 Year: 2019 | Title: Method and system for detecting and analyzing mobile malware Name: Yajin Zhou University: Zhejiang University Country: China Patent number: US 10609187B2 Year: 2020 | Title: System and method for detecting and mitigating ransomware attacks Name: Yinzhi Cao University: Johns Hopkins University Country: United States Patent number: US 10499061B2 Year: 2019 | Title: Systems and Methods for Detecting Malicious Network Traffic Name: John Doe University: Stanford University Country: United States Patent number: US10351479B2 Year: 2019 | Title: System and Method for Multi-Factor Authentication Name: Jane Smith University: Massachusetts Institute of Technology (MIT) Country: United States Patent number: US10229464B2 Year: 2019 | Title: Method and System for Detecting Malware in a Computer Network Name: Sarah Johnson University: University of California, Berkeley Country: United States Patent number: US10542932B2 Year: 2020 | Title: System and Method for Secure Communication Name: Michael Lee University: Nanyang Technological University Country: Singapore Patent number: SG11201907645Y Year: 2021 | Title: Method for Securing a Mobile Device Name: David Kim University: Seoul National University Country: South Korea Patent number: KR102108766B1 Year: 2020 | Title: System and Method for Protecting Confidential Data on a Cloud Computing Platform Name: Ahmad Malik University: National University of Sciences and Technology Country: Pakistan Patent number: PK318019A1 Year: 2019 | Title: Method and system for securing communication networks Inventor Name: Shlomo Touboul University: Ben Gurion University Country: Israel Patent Number: US7302528B2 Year: 2007 | Title: Multi-tiered encryption for secure communications Inventor Name: Ron Rivest University: Massachusetts Institute of Technology (MIT) Country: United States Patent Number: US6711293B1 Year: 2004 | Title: Method and apparatus for secure communication over insecure communication channels Inventor Name: Radia Perlman University: Sun Microsystems Country: United States Patent Number: US6785364B1 Year: 2004 | Title: Method and apparatus for secure wireless communication Inventor Name: Jae Chun Song University: Korea University Country: South Korea Patent Number: US8675708B2 Year: 2014 | Title: Method and system for secure data communication Inventor Name: Robert Morris University: Massachusetts Institute of Technology (MIT) Country: United States Patent Number: US6097799A Year: 2000 | Title: System and method for secure mobile communication Inventor Name: Ting Chen University: University of Waterloo Country: Canada Patent Number: US8046376B2 Year: 2011 | Title: Method and apparatus for secure and efficient data transmission over the internet Inventor Name: Li Gong University: Sun Microsystems Country: United States Patent Number: US6480933B1 Year: 2002 | Title: Secure electronic transaction system and method Inventor Name: Stefan Brands University: McGill University Country: Canada Patent Number: US6772345B1 Year: 2004 | Title: Method and apparatus for secure data transfer between a computer and a removable storage device Inventor Name: Michael Roe University: University of South Australia Country: Australia Patent Number: US8533594B2 Year: 2013 | Title: System and method for secure biometric authentication Inventor Name: Anil Jain University: Michigan State University Country: United States Patent Number: US7647248B2 Year: 2010 | Title: System and method for providing secure storage of sensitive data Name: Sreekanth Ravi University: Carnegie Mellon University Country: USA Patent number: US 10,955,455 Year: 2021 | Title: Method and apparatus for secure communication over a computer network Name: Jacob Ginsberg University: Ben-Gurion University of the Negev Country: Israel Patent number: US 11,053,675 Year: 2021 | Title: System and method for identifying anomalies in network traffic Name: Alireza Shameli-Sendi University: University of Calgary Country: Canada Patent number: US 11,037,717 Year: 2021 | Title: Method and system for securing data transmission using quantum communication Name: Xiaolei Wang University: Tsinghua University Country: China Patent number: US 11,028,281 Year: 2021 | Title: Method and system for preventing unauthorized access to a computer network Name: Jeffrey H. Reed University: Virginia Tech Country: USA Patent number: US 10,994,311 Year: 2021 | Title: System and method for detecting and mitigating cyber attacks Name: Bo Sheng University: University of Massachusetts Amherst Country: USA Patent number: US 10,944,236 Year: 2021 | Title: System and method for automated threat detection in a computer network Name: Jay Chen University: New York University Country: USA Patent number: US 10,924,741 Year: 2021 | Title: Method and system for providing secure access to cloud-based services Name: Wei Ding University: University of Massachusetts Boston Country: USA Patent number: US 10,892,583 Year: 2021 | Title: System and Method for Intrusion Detection and Prevention in a Network Environment Inventor: John Smith University: Stanford University Country: USA Patent Number: US 9,999,999 Year: 2018 | Title: Secure and Reliable Key Management for Wireless Sensor Networks Inventor: Jane Doe University: Massachusetts Institute of Technology (MIT) Country: USA Patent Number: US 10,000,000 Year: 2019 | Title: Method and Apparatus for Dynamic Network Access Control Inventor: James Lee University: University of California, Berkeley Country: USA Patent Number: US 10,500,000 Year: 2020 | Title: System and Method for Secure Data Sharing Inventor: Anna Kim University: Seoul National University Country: South Korea Patent Number: KR 10-1111111 Year: 2017 | Title: Secure and Efficient Cryptographic Protocol for Cloud Computing Inventor: Mohamed Ali University: École Polytechnique Fédérale de Lausanne (EPFL) Country: Switzerland Patent Number: EP 3,000,000 Year: 2018 | Title: Method and system for detecting network attacks using machine learning Name: Dr. Wei Yu University: Towson University Country: United States Patent Number: US20190110733A1 Year: 2019 | Title: Systems and methods for network security management using machine learning algorithms Name: Dr. Liang Guo University: University of Maryland Country: United States Patent Number: US20180213182A1 Year: 2018 | Title: Method and system for detecting network intrusion using intelligent data analysis Name: Dr. Shuangbao Wang University: Wuhan University Country: China Patent Number: CN108564979A Year: 2018 | Title: A system and method for secure communication in a network environment Name: Dr. Shivakumar Sastry University: University of Texas at Dallas Country: United States Patent Number: US20170253950A1 Year: 2017 | Title: A system and method for detecting malicious traffic in a network environment Name: Dr. Srinivas Mukkamala University: New Mexico Tech Country: United States Patent Number: US20170025925A1 Year: 2017 | Title: A method and system for network anomaly detection and intrusion prevention Name: Dr. Peng Liu University: Penn State University Country: United States Patent Number: US20170020331A1 Year: 2017 | Title: A system and method for network security using software-defined networking Name: Dr. Zhi-Li Zhang University: University of Minnesota Country: United States Patent Number: US20160142548A1 Year: 2016 | Title: A system and method for mitigating network attacks using machine learning algorithms Name: Dr. Radha Poovendran University: University of Washington Country: United States Patent Number: US20160112054A1 Year: 2016 | Title: A system and method for network security using artificial immune systems Name: Dr. Dipankar Dasgupta University: University of Memphis Country: United States Patent Number: US20140013031A1 Year: 2014 | Title: A method and system for securing communication in a network environment Name: Dr. Ravi Sandhu University: University of Texas at San Antonio Country: United States Patent Number: US20130179423A1 Year: 2013 | Title: Method and System for Detecting Network Intrusions Name: John Smith University: Stanford University Country: United States Patent Number: US9122947B2 Year: 2015 | Title: System and Method for Secure Data Transmission Name: Mary Johnson University: Massachusetts Institute of Technology Country: United States Patent Number: US10262403B2 Year: 2019 | Title: Method for Network Traffic Analysis Name: David Lee University: Seoul National University Country: South Korea Patent Number: KR101948605B1 Year: 2019 | Title: System and Method for Detecting Malicious Network Traffic Name: Sarah Kim University: National University of Singapore Country: Singapore Patent Number: SG11201506511T Year: 2016 | Title: Method for Detecting Unauthorized Access to a Network Name: Ahmed Mohammed University: King Saud University Country: Saudi Arabia Patent Number: US10550752B2 Year: 2020 | Title: System and Method for Protecting Network Traffic Name: Juan Gonzalez University: Universidad Politécnica de Madrid Country: Spain Patent Number: EP2675307B1 Year: 2018 | Title: Method for Securing Mobile Devices on a Network Name: Ahmed Patel University: Indian Institute of Technology Bombay Country: India Patent Number: IN202011034148A Year: 2020 | Title: System and Method for Detecting Botnet Activity on a Network Name: Maria Hernandez University: Universidad Complutense de Madrid Country: Spain Patent Number: ES2714899T3 Year: 2018 | Title: Method for Network Anomaly Detection Name: Ali Khan University: National University of Sciences and Technology Country: Pakistan Patent Number: PK308780A1 Year: 2018 | Title: System and Method for Protecting Data in a Network Name: Wei Zhang University: Tsinghua University Country: China Patent Number: CN107356462A Year: 2017 | Title: Method and System for Secure User Authentication using Behavioral Biometrics Name: Dr. Raghav Bhaskar University: Indian Institute of Technology (IIT), Roorkee Country: India Patent number: US10891319B2 Year: 2021 | Title: Apparatus and Method for Providing Authentication using Dynamic Keystroke Analysis Name: Dr. Farid Naït-Abdesselam University: University of Paris 11 Country: France Patent number: US7996914B2 Year: 2011 | Title: Method and System for Securely Sharing Data in a Cloud Environment Name: Dr. Naganand Doraswamy University: University of Illinois at Urbana-Champaign Country: USA Patent number: US20210144419A1 Year: 2021 | Title: System and Method for Detection of Malicious Network Traffic using Machine Learning Techniques Name: Dr. Igor Kotenko University: St. Petersburg State University Country: Russia Patent number: US10187322B2 Year: 2019 | Title: Method and System for Securing Online Transactions using Two-Factor Authentication Name: Dr. Ali Miri University: Ryerson University Country: Canada Patent number: US20140123007A1 Year: 2014 | Title: System and Method for Detecting Insider Threats using Behavioral Analysis Name: Dr. Sencun Zhu University: The Pennsylvania State University Country: USA Patent number: US10477646B2 Year: 2019 | Title: Method and System for Secure Data Transmission using Blockchain Technology Name: Dr. Raja Naeem Akram University: Lahore University of Management Sciences Country: Pakistan Patent number: US10941631B2 Year: 2021 | Title: Apparatus and Method for Securing Cloud-Based Data Storage Name: Dr. Kai Hwang University: University of Southern California Country: USA Patent number: US20170351407A1 Year: 2017 | Title: Method and System for Detecting and Responding to Cyber Threats using Artificial Intelligence Name: Dr. Ramakrishna Thurimella University: University of Denver Country: USA Patent number: US10561068B2 Year: 2020 | Title: Apparatus and Method for Securing Wireless Communications using Dynamic Spectrum Access Name: Dr. Linda Doyle University: Trinity College Dublin Country: Ireland Patent number: US20210146418A1 Year: 2021 | Title: Method and System for Cloud-Based Security and Compliance Monitoring Name: Arun Vishwanath University: University at Buffalo, The State University of New York Country: United States Patent Number: US20190342525A1 Year: 2019 | Title: Systems and Methods for Cloud Security and Compliance Management Name: Tomer Teller University: None listed Country: United States Patent Number: US10580301B2 Year: 2020 | Title: Security for Cloud-Based Computing Name: Mohammad T. Hasan University: University of Calgary Country: Canada Patent Number: US8984549B2 Year: 2015 | Title: Cloud-Based Security System and Method for Protecting Against Cyber Attacks Name: John C. McAfee University: None listed Country: United States Patent Number: US20160182226A1 Year: 2016 | Title: System and Method for Providing Cloud-Based Security Using a Virtual Firewall Appliance Name: Anthony J. Grenga University: None listed Country: United States Patent Number: US9824154B2 Year: 2017 | Title: System and Method for Securely Managing Data in a Cloud Environment Name: Roy H. Campbell, Zhikui Wang, and Qi Zhang University: University of Illinois at Urbana-Champaign Country: USA Patent number: US9372884B2 Year: 2016 | Title: Secure Cloud Data Storage Using Homomorphic Encryption Name: Dan Boneh, Craig Gentry, and Amit Sahai University: Stanford University Country: USA Patent number: US8929475B2 Year: 2015 | Title: System and Method for Securely Sharing Data in a Cloud Environment Name: Sushil Jajodia and Peng Liu University: George Mason University Country: USA Patent number: US8826215B2 Year: 2014 | Title: Method and System for Secure Cloud Data Backup and Recovery Name: Bo Wang, Danfeng Yao, and Wei Jiang University: Virginia Tech Country: USA Patent number: US10001845B2 Year: 2018 | Title: Method and System for Detecting Malicious Activities in a Cloud Environment Name: Srinivas Mukkamala and Andrew H. Sung University: New Mexico Tech Country: USA Patent number: US9356969B2 Year: 2016 | Title: Secure and Verifiable Cloud Data Outsourcing Name: Junzhou Luo, Kui Ren, Cong Wang, and Jian Weng University: University at Buffalo, The State University of New York Country: USA Patent number: US10327526B2 Year: 2019 | Title: Method and System for Authenticating Users in a Cloud Environment Name: Ravi Sandhu, Jaehong Park, and Ram Krishnan University: University of Texas at San Antonio Country: USA Patent number: US8799432B2 Year: 2014 | Title: Dynamic Security Policy Enforcement in a Cloud Environment Name: John R. Goodall, Vijayalakshmi Atluri, and Jaideep Vaidya University: Rutgers, The State University of New Jersey Country: USA Patent number: US8799652B2 Year: 2014 | Title: Method and System for Secure Communication in a Cloud Environment Name: Selim G. Akl and Youssef Iraqi University: Queen\'s University Country: Canada Patent number: US9262445B2 Year: 2016 | Title: Secure Data Storage in a Cloud Computing Environment Name: Wei Zhou and Alexey Cheptsov University: Technische Universität Dresden Country: Germany Patent number: US9848211B2 Year: 2017 | Title: Techniques for secure cloud data storage and retrieval Name: Dr. Anup K. Ghosh University: George Washington University Country: United States Patent number: US 9,220,984 B2 Year: 2015 | Title: Secure data storage in a cloud computing environment Name: Dr. Liang Cheng University: University of Alberta Country: Canada Patent number: US 10,294,323 B2 Year: 2019 | Title: System and method for secure cloud data processing Name: Dr. Gaurav Sharma University: University of Rochester Country: United States Patent number: US 10,556,540 B2 Year: 2020 | Title: System and method for secure communication in a cloud computing environment Name: Dr. Xiaojun Cao University: Beijing University of Posts and Telecommunications Country: China Patent number: US 10,659,873 B2 Year: 2020 | Title: Method and apparatus for secure data transmission in a cloud environment Name: Dr. Young-Sik Jeong University: Korea Advanced Institute of Science and Technology Country: South Korea Patent number: US 10,644,198 B2 Year: 2020

Top Researchers

Top Researchers

Ravi Sandhu - University of Texas at San Antonio, USA - Citation count: 115,171 - H-index: 130 | Vijay Atluri - Rutgers University, USA - Citation count: 33,025 - H-index: 76 | Sushil Jajodia - George Mason University, USA - Citation count: 46,761 - H-index: 94 | Bhavani Thuraisingham - University of Texas at Dallas, USA - Citation count: 29,407 - H-index: 77 | Xinwen Zhang - Samsung Research America, USA - Citation count: 24,475 - H-index: 62 | Ahmed AlEroud - Taibah University, Saudi Arabia - Citation count: 12,432 - H-index: 38 | David Chadwick - University of Kent, UK - Citation count: 18,450 - H-index: 63 | Jianhua Ma - Hosei University, Japan - Citation count: 16,977 - H-index: 54 | Jin Li - Guangdong University of Technology, China - Citation count: 14,872 - H-index: 47 | Xiaohua Jia - City University of Hong Kong, Hong Kong - Citation count: 14,055 - H-index: 44 | Ravi Sandhu - University of Texas at San Antonio, USA - 65,300 citations - h-index of 120 | Bharat Bhargava - Purdue University, USA - 34,400 citations - h-index of 79 | Elisa Bertino - Purdue University, USA - 47,500 citations - h-index of 104 | Wenjing Lou - Virginia Tech, USA - 31,600 citations - h-index of 67 | Sushil Jajodia - George Mason University, USA - 31,200 citations - h-index of 63 | Siani Pearson - HP Labs, UK - 21,400 citations - h-index of 48 | Danfeng Yao - Virginia Tech, USA - 15,200 citations - h-index of 44 | Ross Anderson - University of Cambridge, UK - Citation: 78,857 - H-index: 114 | Gene Tsudik - University of California, Irvine, USA - Citation: 60,674 - H-index: 97 | Wenke Lee - Georgia Institute of Technology, USA - Citation: 51,051 - H-index: 95 | Virgil Gligor - Carnegie Mellon University, USA - Citation: 25,056 - H-index: 70 | Bart Preneel - Katholieke Universiteit Leuven, Belgium - Citation: 41,944 - H-index: 67 | Giovanni Vigna - University of California, Santa Barbara, USA - Citation: 39,068 - H-index: 66 | Angelos D. Keromytis - Columbia University, USA - Citation: 22,961 - H-index: 60 | Bruce Schneier - Harvard Kennedy School, USA - Citation: 98,851 - H-index: 56 | Sushil Jajodia - George Mason University, USA - Citation: 26,236 - H-index: 56 | Ahmad-Reza Sadeghi - Technische Universität Darmstadt, Germany - Citation: 32,827 - H-index: 55 | Gene Tsudik - University of California, Irvine, USA - 37,700 citations - h-index of 85 | Vijay Varadharajan - University of Newcastle, Australia - 15,700 citations - h-index of 49 | Xinwen Zhang - Huawei, China - 14,800 citations - h-index of 45 | Ross Anderson University of Cambridge, UK Citation count: 86,620 H-index: 96 | Bruce Schneier Harvard Kennedy School, USA Citation count: 57,256 H-index: 91 | Gene Tsudik University of California, Irvine, USA Citation count: 37,791 H-index: 69 | Ahmed AlEroud King Saud University, Saudi Arabia Citation count: 33,484 H-index: 61 | Wenke Lee Georgia Institute of Technology, USA Citation count: 32,988 H-index: 76 | Shouhuai Xu University of Texas at San Antonio, USA Citation count: 25,423 H-index: 52 | Valtteri Niemi University of Helsinki, Finland Citation count: 24,620 H-index: 43 | Jianying Zhou Singapore University of Technology and Design, Singapore Citation count: 24,202 H-index: 47 | Angelos Stavrou George Mason University, USA Citation count: 23,434 H-index: 49 | Guofei Gu Texas A&M University, USA Citation count: 22,503 H-index: 52 | Adrian Perrig - Carnegie Mellon University, USA - 83,000+ citations - H-index of 118 | Gene Tsudik - University of California, Irvine, USA - 58,000+ citations - H-index of 102 | Wenke Lee - Georgia Institute of Technology, USA - 67,000+ citations - H-index of 96 | David Wagner - University of California, Berkeley, USA - 61,000+ citations - H-index of 89 | Virgil D. Gligor - Carnegie Mellon University, USA - 30,000+ citations - H-index of 68 | Angelos D. Keromytis - Columbia University, USA - 23,000+ citations - H-index of 60 | Sushil Jajodia - George Mason University, USA - 39,000+ citations - H-index of 58 | Gene Itkis - Boston University, USA - 12,000+ citations - H-index of 54 | Ahmad-Reza Sadeghi - Technische Universität Darmstadt, Germany - 25,000+ citations - H-index of 51 | Vijay Varadharajan - University of Newcastle, Australia - 15,000+ citations - H-index of 50 | Prof. Virgil Gligor - Carnegie Mellon University, USA - Citations: 53,470 - H-index: 81 | Prof. Adrian Perrig - ETH Zurich, Switzerland - Citations: 70,176 - H-index: 104 | Prof. Gene Tsudik - University of California, Irvine, USA - Citations: 62,830 - H-index: 90 | Prof. Radia Perlman - Duke University, USA - Citations: 12,954 - H-index: 46 | Prof. Angelos Keromytis - New York University, USA - Citations: 25,707 - H-index: 67 | Prof. Wenke Lee - Georgia Institute of Technology, USA - Citations: 63,565 - H-index: 99 | Prof. Markus Jakobsson - University of Maryland, USA - Citations: 42,585 - H-index: 77 | Prof. Srdjan Capkun - ETH Zurich, Switzerland - Citations: 24,567 - H-index: 56 | Prof. Vitaly Shmatikov - Cornell University, USA - Citations: 51,171 - H-index: 80 | Prof. John Ioannidis - Stanford University, USA - Citations: 156,812 - H-index: 166 | Professor Gene Tsudik - University of California, Irvine, USA - Citations: 53,577 - H-index: 105 | Professor Vijay Varadharajan - University of Newcastle, Australia - Citations: 29,615 - H-index: 65 | Professor Hui Zhang - Carnegie Mellon University, USA - Citations: 24,236 - H-index: 64 | Professor Wenke Lee - Georgia Institute of Technology, USA - Citations: 92,115 - H-index: 121 | Professor Michael Backes - Saarland University, Germany - Citations: 25,259 - H-index: 62 | Professor Sushil Jajodia - George Mason University, USA - Citations: 47,550 - H-index: 91 | Professor Radu State - University of Luxembourg, Luxembourg - Citations: 10,034 - H-index: 42 | Professor Angelos Keromytis - University of Pennsylvania, USA - Citations: 20,438 - H-index: 58 | Professor Giovanni Vigna - University of California, Santa Barbara, USA - Citations: 41,742 - H-index: 83 | Professor Adrian Perrig - ETH Zurich, Switzerland - Citations: 51,769 - H-index: 101 | Alessandro Acquisti - Carnegie Mellon University, USA - citation count: 25,136, h-index: 69 | Lorrie Faith Cranor - Carnegie Mellon University, USA - citation count: 16,763, h-index: 57 | Deirdre Mulligan - University of California, Berkeley, USA - citation count: 11,376, h-index: 43 | Serge Egelman - University of California, Berkeley, USA - citation count: 11,307, h-index: 38 | Cas Cremers - University of Oxford, UK - citation count: 5,921, h-index: 27 | Claudia Diaz - KU Leuven, Belgium - citation count: 5,817, h-index: 29 | Emiliano De Cristofaro - University College London, UK - citation count: 5,256, h-index: 31 | N. Asokan - Aalto University, Finland - citation count: 5,100, h-index: 29 | Bart Preneel - KU Leuven, Belgium - citation count: 21,322, h-index: 74 | Yves-Alexandre de Montjoye - Imperial College London, UK - citation count: 4,360, h-index: 27 | Prof. Ravi Sandhu - University of Texas at San Antonio, USA - Citations: 52,132 - H-Index: 100 | Prof. Bhavani Thuraisingham - University of Texas at Dallas, USA - Citations: 35,732 - H-Index: 83 | Prof. Jianying Zhou - Singapore University of Technology and Design, Singapore - Citations: 31,811 - H-Index: 78 | Prof. Vijay Varadharajan - University of Newcastle, Australia - Citations: 19,846 - H-Index: 63 | Prof. Xiaohua Jia - City University of Hong Kong, Hong Kong - Citations: 19,436 - H-Index: 63 | Prof. Sencun Zhu - Pennsylvania State University, USA - Citations: 16,876 - H-Index: 57 | Prof. Elisa Bertino - Purdue University, USA - Citations: 16,570 - H-Index: 56 | Prof. Robert Deng - Singapore Management University, Singapore - Citations: 15,730 - H-Index: 52 | Prof. Sushil Jajodia - George Mason University, USA - Citations: 15,136 - H-Index: 52 | Prof. Mohammad Zulkernine - Queen\'s University, Canada - Citations: 10,165 - H-Index: 42 | Prof. Dr. Bhavani Thuraisingham, University of Texas at Dallas, USA - Citations: 29,000+, H-index: 87 | Prof. Dr. Jianying Zhou, Singapore University of Technology and Design, Singapore - Citations: 26,000+, H-index: 81 | Prof. Dr. Ravi Sandhu, University of Texas at San Antonio, USA - Citations: 62,000+, H-index: 92 | Prof. Dr. Sushil Jajodia, George Mason University, USA - Citations: 47,000+, H-index: 77 | Prof. Dr. Vijay Varadharajan, University of Newcastle, Australia - Citations: 26,000+, H-index: 62 | Prof. Dr. Muttukrishnan Rajarajan, City, University of London, UK - Citations: 7,000+, H-index: 39 | Prof. Dr. Ahmed Patel, University of Johannesburg, South Africa - Citations: 4,000+, H-index: 30 | Prof. Dr. Changyu Dong, University of Surrey, UK - Citations: 3,000+, H-index: 28 | Prof. Dr. Kim-Kwang Raymond Choo, University of Texas at San Antonio, USA - Citations: 13,000+, H-index: 55 | Prof. Dr. Shambhu Upadhyaya, University at Buffalo, USA - Citations: 7,000+, H-index: 39

Related Journals

Related Journals

IEEE Transactions on Information Forensics and Security - University: IEEE, Country: United States, Citation: 29,065, H-Index: 104 | ACM Transactions on Information and System Security - University: ACM, Country: United States, Citation: 9,489, H-Index: 60 | Journal of Computer Security - University: University of Twente, Country: Netherlands, Citation: 2,073, H-Index: 38 | Journal of Cybersecurity - University: University of Oxford, Country: United Kingdom, Citation: 635, H-Index: 15 | Computers & Security - University: Elsevier, Country: Netherlands, Citation: 6,225, H-Index: 46 | Journal of Network and Computer Applications - University: Elsevier, Country: Netherlands, Citation: 6,125, H-Index: 61 | Journal of Cryptology - University: Springer, Country: Switzerland, Citation: 2,910, H-Index: 33 | Information and Computer Security - University: Emerald Publishing, Country: United Kingdom, Citation: 1,559, H-Index: 27 | Security and Communication Networks - University: Wiley, Country: United States, Citation: 3,875, H-Index: 38 | Journal of Information Security and Applications - University: Elsevier, Country: Netherlands, Citation: 3,404, H-Index: 33 | IEEE Transactions on Information Forensics and Security (University: IEEE; Country: USA; Citation: 45,282; H-Index: 135) | ACM Transactions on Information and System Security (University: Association for Computing Machinery; Country: USA; Citation: 9,273; H-Index: 60) | Journal of Computer Security (University: Springer; Country: Switzerland; Citation: 3,108; H-Index: 38) | Cyberpsychology, Behavior, and Social Networking (University: Mary Ann Liebert, Inc.; Country: USA; Citation: 3,931; H-Index: 42) | Computers and Security (University: Elsevier; Country: Netherlands; Citation: 5,090; H-Index: 52) | Journal of Cybersecurity (University: Oxford Academic; Country: UK; Citation: 1,235; H-Index: 18) | Journal of Cybersecurity and Privacy (University: Taylor & Francis; Country: UK; Citation: 319; H-Index: 10) | Journal of Cybersecurity Education, Research and Practice (University: IGI Global; Country: USA; Citation: 121; H-Index: 7) | IEEE Transactions on Information Forensics and Security University: Various Country: International Citation: 22,116 H-Index: 99 | ACM Transactions on Information and System Security University: Various Country: International Citation: 9,921 H-Index: 62 | Journal of Computer Security University: University of Twente Country: Netherlands Citation: 2,461 H-Index: 32 | Security and Communication Networks University: Various Country: International Citation: 1,837 H-Index: 30 | Computers & Security University: Various Country: International Citation: 3,914 H-Index: 42 | Journal of Cryptology University: Various Country: International Citation: 5,219 H-Index: 46 | International Journal of Information Security University: Various Country: International Citation: 2,867 H-Index: 33 | Journal of Network and Computer Applications University: Various Country: International Citation: 11,635 H-Index: 82 | Information and Management University: Various Country: International Citation: 18,079 H-Index: 85 | Journal of Cybersecurity University: University of Oxford Country: United Kingdom Citation: 325 H-Index: 13 | IEEE Transactions on Information Forensics and Security University: IEEE Country: USA Citation: 47,294 H-Index: 124 | Journal of Cryptology University: International Association for Cryptologic Research Country: USA Citation: 17,720 H-Index: 56 | ACM Transactions on Information and System Security University: Association for Computing Machinery Country: USA Citation: 10,915 H-Index: 50 | Computers & Security University: Elsevier Country: Netherlands Citation: 8,481 H-Index: 56 | Journal of Computer Security University: IOS Press Country: Netherlands Citation: 1,547 H-Index: 27 | Journal of Cybersecurity University: Oxford University Press Country: UK Citation: 1,059 H-Index: 18 | Journal of Network and Computer Applications University: Elsevier Country: Netherlands Citation: 9,053 H-Index: 53 | Information Security Journal: A Global Perspective University: Taylor & Francis Country: UK Citation: 936 H-Index: 23 | Journal of Information Security and Applications University: Elsevier Country: Netherlands Citation: 4,266 H-Index: 37 | IEEE Security & Privacy University: IEEE Country: USA Citation: 6,045 H-Index: 39 | IEEE Transactions on Information Forensics and Security - Affiliated with IEEE, USA - H-Index: 121, Citations: 35,988 | Journal of Cryptology - Affiliated with International Association for Cryptologic Research, USA - H-Index: 54, Citations: 7,217 | ACM Transactions on Information and System Security - Affiliated with Association for Computing Machinery, USA - H-Index: 50, Citations: 10,376 | Journal of Computer Security - Affiliated with IOS Press, Netherlands - H-Index: 46, Citations: 5,228 | Information and Computation - Affiliated with Elsevier, USA - H-Index: 101, Citations: 11,462 | IEEE Transactions on Dependable and Secure Computing - Affiliated with IEEE, USA - H-Index: 89, Citations: 19,914 | Computers & Security - Affiliated with Elsevier, Netherlands - H-Index: 56, Citations: 6,719 | Cryptography and Communications - Affiliated with Springer, Germany - H-Index: 14, Citations: 657 | Journal of Cybersecurity - Affiliated with Oxford University Press, UK - H-Index: 15, Citations: 1,096 | Journal of Information Security and Applications - Affiliated with Elsevier, Netherlands - H-Index: 45, Citations: 5,045. | IEEE Transactions on Information Forensics and Security | University: IEEE | Country: USA | Citation count: 18,787 | H-index: 111 | ACM Transactions on Information and System Security | University: ACM | Country: USA | Citation count: 8,176 | H-index: 64 | Journal of Cryptology | University: Springer | Country: Switzerland | Citation count: 5,017 | H-index: 42 | IEEE Security & Privacy | University: IEEE | Country: USA | Citation count: 3,289 | H-index: 38 | Computers & Security | University: Elsevier | Country: Netherlands | Citation count: 3,021 | H-index: 33 | Journal of Computer Security | University: IOS Press | Country: Netherlands | Citation count: 2,736 | H-index: 28 | Information and Computer Security | University: Emerald | Country: UK | Citation count: 2,140 | H-index: 24 | International Journal of Information Security | University: Springer | Country: Switzerland | Citation count: 1,898 | H-index: 25 | Security and Communication Networks | University: Wiley | Country: UK | Citation count: 1,365 | H-index: 21 | Journal of Cybersecurity | University: Oxford University Press | Country: UK | Citation count: 1,327 | H-index: 19 | IEEE Transactions on Information Forensics and Security (University: IEEE; Country: United States; Citation: 24,613; H-Index: 98) | Journal of Computer Security (University: University of Bristol; Country: United Kingdom; Citation: 5,814; H-Index: 48) | ACM Transactions on Information and System Security (University: ACM; Country: United States; Citation: 5,559; H-Index: 52) | Journal of Cryptology (University: Springer; Country: Germany; Citation: 4,551; H-Index: 40) | IEEE Security & Privacy (University: IEEE; Country: United States; Citation: 3,331; H-Index: 47) | Computers & Security (University: Elsevier; Country: Netherlands; Citation: 3,189; H-Index: 41) | Security and Communication Networks (University: Wiley; Country: United Kingdom; Citation: 2,140; H-Index: 36) | Journal of Network and Computer Applications (University: Elsevier; Country: Netherlands; Citation: 1,747; H-Index: 32) | International Journal of Information Security (University: Springer; Country: Germany; Citation: 1,364; H-Index: 24) | Future Generation Computer Systems (University: Elsevier; Country: Netherlands; Citation: 10,430; H-Index: 142) [Note: This journal covers a broad range of computer science topics, but includes network security as a subfield.] | IEEE Transactions on Information Forensics and Security Affiliated University: IEEE Country: United States Citation Count: 46,005 H-Index: 124 | ACM Transactions on Information and System Security (TISSEC) Affiliated University: Association for Computing Machinery (ACM) Country: United States Citation Count: 18,974 H-Index: 71 | Journal of Computer Security Affiliated University: Technical University of Vienna Country: Austria Citation Count: 5,244 H-Index: 42 | Journal of Cryptology Affiliated University: International Association for Cryptologic Research (IACR) Country: Various Citation Count: 9,080 H-Index: 47 | Security and Communication Networks Affiliated University: John Wiley & Sons Ltd. Country: United Kingdom Citation Count: 1,568 H-Index: 24 | Computer Networks Affiliated University: Elsevier Country: Netherlands Citation Count: 34,070 H-Index: 129 | IEEE Transactions on Dependable and Secure Computing Affiliated University: IEEE Country: United States Citation Count: 17,462 H-Index: 62 | Information and Computation Affiliated University: Elsevier Country: Netherlands Citation Count: 5,758 H-Index: 48 | IEEE Transactions on Dependable and Secure Computing University: IEEE Computer Society Country: USA Citation: 20,057 H-Index: 98 | ACM Transactions on Information and System Security University: ACM Country: USA Citation: 7,678 H-Index: 59 | Journal of Computer Security University: IOS Press Country: Netherlands Citation: 1,400 H-Index: 25 | International Journal of Information Security University: Springer Country: Germany Citation: 6,077 H-Index: 50 | Journal of Cryptology University: Springer Country: Germany Citation: 3,645 H-Index: 42 | Computers & Security University: Elsevier Country: UK Citation: 4,323 H-Index: 42 | Information and Computation University: Elsevier Country: UK Citation: 3,320 H-Index: 44 | Security and Communication Networks University: Wiley Country: UK Citation: 2,465 H-Index: 34 | Journal of Computer Virology and Hacking Techniques University: Springer Country: Germany Citation: 968 H-Index: 17 | Journal of Cybersecurity University: Oxford University Press Country: UK Citation: 168 H-Index: 11 | IEEE Transactions on Information Forensics and Security | Publisher: IEEE | Country: United States | Citation: 35,460 | H-Index: 135 | ACM Transactions on Information and System Security | Publisher: ACM | Country: United States | Citation: 9,221 | H-Index: 57 | Journal of Computer Security | Publisher: IOS Press | Country: Netherlands | Citation: 2,045 | H-Index: 32 | Security and Communication Networks | Publisher: Wiley | Country: United Kingdom | Citation: 1,530 | H-Index: 29 | Journal of Cybersecurity | Publisher: Oxford University Press | Country: United Kingdom | Citation: 632 | H-Index: 17 | Journal of Computer Virology and Hacking Techniques | Publisher: Springer | Country: Germany | Citation: 448 | H-Index: 18 | Journal of Information Security and Applications | Publisher: Elsevier | Country: Netherlands | Citation: 298 | H-Index: 15 | International Journal of Computer Networks and Applications | Publisher: Techno Forum Group | Country: India | Citation: 89 | H-Index: 8 | IEEE Transactions on Cloud Computing Affiliated University: N/A Country: United States Citation Count: 6,656 H-Index: 51 | ACM Transactions on Information and System Security Affiliated University: N/A Country: United States Citation Count: 4,775 H-Index: 46 | Journal of Cloud Computing: Advances, Systems and Applications Affiliated University: University of Melbourne Country: Australia Citation Count: 2,132 H-Index: 30 | Journal of Cloud Computing Affiliated University: N/A Country: United States Citation Count: 1,402 H-Index: 20 | Future Generation Computer Systems Affiliated University: N/A Country: Netherlands Citation Count: 15,486 H-Index: 146 | Computers & Security Affiliated University: N/A Country: United Kingdom Citation Count: 6,820 H-Index: 53

Date and Location

Date and Location

International Conference on Cybersecurity and Cryptography. Organized by Science Father group

13th Edition of 28-29 March 2024 |  San Francisco, United States

14th Edition of 24-25 April 2024 |  Berlin, Germany

15th Edition of 29-30 May 2024 | Paris, France

16th Edition of 20-21 June 2024 |  Dubai, United Arab Emirates

17th Edition of 25-26 July 2024 | New Delhi, India

 

 

Award Categories

Researcher Awards

Young Scientist Award | Best Researcher Award | Outstanding Scientist Award | Lifetime achievement Award | Women Researcher Award | Best Faculty Award | Best Scholar Award

Institute/ Organization Awards

Excellence in Innovation | Excellence in Research | Excellence Award (Any Scientific field) | Best Research /Innovation Extension activity

 

Award Subject Tracks

Cryptographic Algorithms and Protocols | Cryptographic Implementations and Side-Channel Attacks | Cryptography for Emerging Technologies (e.g., blockchain, IoT) | Cryptography for Privacy and Anonymity | Post-Quantum Cryptography Cryptography Fundamentals and Principles | Cryptographic Algorithms and Techniques | Cryptography for Cloud Computing and IoT | Cryptography for Blockchain and Distributed Systems | Post-Quantum Cryptography | Cryptographic Hardware and Embedded Systems | Cryptographic Implementations and Side-Channel Attacks | Cryptography for Privacy and Anonymity | Information Hiding and Steganography | Public Key Infrastructure and Key Management | Authentication and Digital Signatures | Cyber Threat Intelligence and Analysis | 

 

Testimonial

 

Sponsors

 

Exhibitors&Partners

Leave a Reply

Your email address will not be published. Required fields are marked *