Información de la conferencia
ICCSCT' 2022: International Conference on Cyber Security and Connected Technologies
https://coreconferences.com/iccsct2022/
Día de Entrega:
2022-05-07
Fecha de Notificación:
Fecha de Conferencia:
2022-06-16
Ubicación:
Macau, China
Vistas: 5449   Seguidores: 1   Asistentes: 0

Solicitud de Artículos
International Conference on Cyber Security and Connected Technologies 2022 (ICCSCT 2022) is an opportunity for academics, students, scholars, scientists and engineers from around the world who are involved in the study, management, development and implementation of systems and concepts to combat information warfare or to improve Cyber Security and Connected Technologies to come together and exchange ideas. This conference is trying to establish itself as a key event for the understanding of threats and risks to information systems, the development of a strong security culture, and incident investigation.

Tracks of the Conference

Database Security
Big Data Techniques in Cyber Security
Digital Signature Techniques
Forensic Analysis of Cyber Crimes
Secure User Authentication
Spam Protection
Advance Persistent Threat
Secret Sharing
Key Management
Security in Mobile Networks
Hardware Security
Cloud Security
Cyber Physical System
Network Protocols
Next-generation Communication Networks
Mobile & Ubiquitous Communication Networks
Mobile Cloud
Cloud and Systems Management
Cloud Computing and Networking
Internet Technologies
Information-Centric Networking
Big Data Communication and Analytics
Data Network Management
Data as a Service
Data Sharing and Infrastructures
Network Architectures
Modeling & Simulation of communication networks and Systems
Network Monitoring and Control
Traffic Measurement, Analysis, Modeling and Visualization
Quality of Service (QoS)
Routing and Flow Control in LANs, WANs and PANs
Sensor Nets and Embedded Systems
Network applications (web, multimedia streaming, gaming, etc.)
Social Computing and Networks
Software-Defined Networking
Network Security
Authentication Systems: Public Key Infrastructures, Key Management, Credential Management
Secure Routing, Naming/Addressing, Network Management
Security & Privacy in Pervasive and Ubiquitous Computing, e.g., RFIDs
Security & Privacy in Peer-to-Peer and Overlay Networks
Security & Privacy for Emerging Technologies: VoIP, Internet-of-Things, Social Networks
Security & Isolation in Cloud, Data Center and Software-Defined Networks
Algorithm and Applications
Artificial Intelligence
Biomechatronics
Business Data
Communication Networks and Protocols
Cyber Crime and Laws
Database Technologies
Data Transmission
Distributed and Parallel Computing
Fundamentals of Automation and Robotics
Hardware Design and Implementation
Information Security and Information Management
Mechatronics Systems in Robotics
Mobile Computing
Multimedia Communications and Graphics Technologies
Navigation
Operating Systems
Optimization Techniques
Sensors and Actuators
Simulation and Modeling
Soft Computing
Wireless Sensor Networks
Última Actualización Por Dou Sun en 2021-08-08
Conferencias Relacionadas
Revistas Relacionadas
CCFNombre CompletoFactor de ImpactoEditorISSN
Journal of Universal Computer ScienceVerlag der Technischen Universitat Graz0948-695x
Online Information Review3.100Emerald1468-4527
International Journal of Control1.600Taylor & Francis0020-7179
IET Radar, Sonar & Navigation1.400IET1751-8784
Algorithms for Molecular Biology1.500Springer1748-7188
IET Computers and Digital Techniques0.484IET1751-8601
International Journal of Computer Science, Engineering and Information Technology AIRCC2231-3605
Journal of Organizational Computing and Electronic Commerce2.000Taylor & Francis1091-9392
Journal of Decision SystemsTaylor & Francis1246-0125
Journal of Spatial Information ScienceNCGIA1948-660X
Recomendaciones