ICCSCT 2017 is an opportunity for academics, students, scholars, scientists and engineers from around the world who are involved in the study, management, development and implementation of systems and concepts to combat information warfare or to improve information systems security & connected technologies to come together and exchange ideas. This conference is trying to establish itself as a key event for the understanding of threats and risks to information systems, the development of a strong security culture, and incident investigation.
Database Security
Big Data Techniques in Cyber Security
Digital Signature Techniques
Forensic Analysis of Cyber Crimes
Secure User Authentication
Spam Protection
Advance Persistent Threat
Secret Sharing
Key Management
Security in Mobile Networks
Hardware Security
Cloud Security
Cyber Physical System
Network Protocols
Next-generation Communication Networks
Mobile & Ubiquitous Communication Networks
Mobile Cloud
Cloud and Systems Management
Cloud Computing and Networking
Internet Technologies
Information-Centric Networking
Big Data Communication and Analytics
Data Network Management
Data as a Service
Data Sharing and Infrastructures
Network Architectures
Modeling & Simulation of communication networks and Systems
Network Monitoring and Control
Traffic Measurement, Analysis, Modeling and Visualization
Quality of Service (QoS)
Routing and Flow Control in LANs, WANs and PANs
Sensor Nets and Embedded Systems
Network applications (web, multimedia streaming, gaming, etc.)
Social Computing and Networks
Software-Defined Networking
Network Security
Authentication Systems: Public Key Infrastructures, Key Management, Credential Management
Secure Routing, Naming/Addressing, Network Management
Security & Privacy in Pervasive and Ubiquitous Computing, e.g., RFIDs
Security & Privacy in Peer-to-Peer and Overlay Networks
Security & Privacy for Emerging Technologies: VoIP, Internet-of-Things, Social Networks
Security & Isolation in Cloud, Data Center and Software-Defined Networks
Algorithm and Applications
Artificial Intelligence
Biomechatronics
Business Data
Communication Networks and Protocols
Cyber Crime and Laws
Database Technologies
Data Transmission
Distributed and Parallel Computing
Fundamentals of Automation and Robotics
Hardware Design and Implementation
Information Security and Information Management
Mechatronics Systems in Robotics
Mobile Computing
Multimedia Communications and Graphics Technologies
Navigation
Operating Systems
Optimization Techniques
Sensors and Actuators
Simulation and Modeling
Soft Computing
Wireless Sensor Networks
Authors should submit a paper in English, carefully checked for correct grammar and spelling, addressing one or several of the conference areas or topics. Each paper should clearly indicate the nature of its technical/scientific contribution, and the problems, domains or environments to which it is applicable. Only original papers should be submitted. Authors are advised to follow ethical norms regarding plagiarism and self-plagiarism thoroughly before submitting and must make sure that their submissions do not substantially overlap work which has been published elsewhere or simultaneously submitted to a journal or another conference with proceedings. Papers that contain any form of plagiarism will be rejected without reviews.
Authors can submit their work in the form of a Regular Paper, representing completed and validated research, or as a Position Paper, portraying a short report of work in progress or an arguable opinion about an issue discussing ideas, facts, situations, methods, procedures or results of scientific research focused on one of the conference topic areas. All papers must be submitted through the online submission platform. After the paper submission has been successfully completed, authors will receive an automatic confirmation e-mail. All the papers should be of 6 pages length.
03月10日
2017
03月12日
2017
终稿截稿日期
注册截止日期
留言