Conference Information
MICCIS 2023: International Conference on Mobile Internet, Cloud Computing and Information Security
http://www.miccis.org/Submission Date: |
2023-02-14 |
Notification Date: |
2023-03-16 |
Conference Date: |
2023-04-07 |
Location: |
Nanjing, China |
Viewed: 3004 Tracked: 0 Attend: 3
Call For Papers
1. Mobile Internet Mobile Applications Mobile Transactions Mobile Payments Mobile Marketing Mobile Authentication Mobile Security Mobile Terminal Mobile Network Mobile Communication Mobile Operating System Mobile Browser Mobile Instant Messaging Mobile Data Mobile Search Mobile Games Mobile Map Mobile Social Networking Mobile Government Mobile Education Mobile Healthcare Mobile Reading Mobile Business Law Mobile Cloud Mobile IoT Service Computing Service Reputation Collaborative Computing Peer-to-Peer Computing Business Intelligence Knowledge Management Complex Systems Embedded Systems Sensor Networks Smart Home Smart City 2. Cloud Computing Cloud and Grid Computing for Big Data Cloud Application Architectures Cloud Application Scalability and Availability Cloud Application Performance and Monitoring Cloud Computing and Semantic Web Technology Cloud Computing Architectures and Systems Models and Tools for Intelligent Computing Cloud Computing Technologies, Services, and Applications Cloud for Enterprise Business Transformation Cloud Management and Operations Cloud Middleware Frameworks Cloud Optimization and Automation Cloud Quality and Performance Cloud Resource Virtualization and Combination Cloud Solution Design Patterns Distributed and Peer-to-peer Search Infrastructure and Platforms for Intelligent Computing Cloud Computing Models, Simulations, Designs, and Examples 3. Information Security Access Control Secure Cloud Computing Artificial Immune System Security and Network Management Authentication Security and Privacy in Mobile Systems Authentication and Non-Repudiation Security and Privacy in Pervasive Computing Biometric Security Security and Privacy in Web Services Secure Computing Intelligence Security and Privacy Policies Encryption Protocols Security Zone Control Data Integrity Security Deployment Database and System Security Security Engineering Security in Distributed Systems Design and Security ModelsSecurity of Grid Computing Email Security, Spam, Phishing and Email Fraud Security of Information System Architectures Encryption and Decryption Algorithms Security of Intelligent Agents and Systems Formal Authentication Tools Security of Pervasive Computing Security of Fuzzy Systems Security of Web 2.0 Identification and Authentication Security Management Insider Threats and Countermeasures Security of Software Defined Networks Internet Security and Applications Security of Vehicle Networks Intrusion Detection and Prevention Security Requirements Key Management Security Threats and Countermeasures Mobile adhoc Network Security Sensor Network Security Authentication, Trust and Authorization Model Software Security Peer-to-peer Network SecurityThreats, Vulnerabilities, Risks, Formal Methods Performance Evaluation of Security ProtocolsTrust Management Privacy and AuthenticationTrust models and metrics QoS Cybersecurity Virus, Worm, and Trojan Horse Protection Quantum Cryptography Vulnerability Assessment Regulatory and Trust Mechanisms Wireless network security DDoS, MiM, Session Hijacking and Replay Attacks
Last updated by Dou Sun in 2023-01-23
Related Conferences
Short | Full Name | Submission | Conference |
---|---|---|---|
EEIC | International Conference on Electrical Engineering and Intelligent Control | 2024-08-02 | 2024-10-11 |
AISTATS | International Conference on Artificial Intelligence and Statistics | 2024-10-03 | 2025-05-03 |
ICCNDT | International Conference on Computing, Networking and Digital Technologies | 2012-10-20 | 2012-11-11 |
REFSQ | Requirements Engineering: Foundation for Software Quality | 2024-11-01 | 2025-04-07 |
ICMMPM | International Conference on Metal Material Processes and Manufacturing | 2024-10-11 | 2024-12-16 |
FCST' | IEEE International Symposium on Future Cyber Security Technologies | 2024-06-30 | 2024-09-02 |
ICFNN | International Conference on Frontiers of Neural Networks | 2019-07-05 | 2019-07-26 |
GUT | International Conference in Green and Ubiquitous Technology | 2012-06-01 | 2012-07-07 |
ICMAS | International Conference on Mechanical and Aerospace Systems | 2023-12-01 | 2024-04-22 |
ICITKM | International Conference on Information Technology and Knowledge Management | 2018-10-10 | 2018-11-02 |
Related Journals
CCF | Full Name | Impact Factor | Publisher | ISSN |
---|---|---|---|---|
a | ACM Transactions on Information Systems | 5.400 | ACM | 1046-8188 |
Flow Measurement and Instrumentation | 2.300 | Elsevier | 0955-5986 | |
Information Processing and Management | 7.400 | Elsevier | 0306-4573 | |
c | Personal and Ubiquitous Computing | Springer | 1617-4909 | |
Mechanical Systems and Signal Processing | 7.900 | Elsevier | 0888-3270 | |
International Journal of Distributed Sensor Networks | Hindawi | 1550-1329 | ||
b | Journal of the American Medical Informatics Association | 4.700 | BMJ Journals | 1527-974X |
IEEE Transactions on Power Systems | 6.500 | IEEE | 0885-8950 | |
Cybernetics and Physics | IPME RAS | 2223-7038 | ||
c | Integration, the VLSI Journal | 2.200 | Elsevier | 0167-9260 |
Full Name | Impact Factor | Publisher |
---|---|---|
ACM Transactions on Information Systems | 5.400 | ACM |
Flow Measurement and Instrumentation | 2.300 | Elsevier |
Information Processing and Management | 7.400 | Elsevier |
Personal and Ubiquitous Computing | Springer | |
Mechanical Systems and Signal Processing | 7.900 | Elsevier |
International Journal of Distributed Sensor Networks | Hindawi | |
Journal of the American Medical Informatics Association | 4.700 | BMJ Journals |
IEEE Transactions on Power Systems | 6.500 | IEEE |
Cybernetics and Physics | IPME RAS | |
Integration, the VLSI Journal | 2.200 | Elsevier |
Recommendation