Conference Information
ICITST 2022: International Conference for Internet Technology and Secured Transactions
https://icitst.org/Submission Date: |
2022-09-30 Extended |
Notification Date: |
2022-10-07 |
Conference Date: |
2022-12-06 |
Location: |
London, UK |
Years: |
17 |
Viewed: 15995 Tracked: 2 Attend: 0
Call For Papers
The objectives of the ICITST-2022 are to bridge the knowledge gap between academia and industry, promote research esteem in secured Internet transactions and the importance of information technology evolution to secured transactions. The ICITST-2022 invites research papers that encompass conceptual analysis, design implementation and performance evaluation. The topics in ICITST-2022 include but are not confined to the following areas: Cyber Security and Cyber warfare Surveillance Systems Cyber Warfare Trends and Approaches Social engineering Template Protection and Liveliness detection New theories and algorithms in biometrics Formal Methods Application in Security Operating Systems and Database Security Enterprise Systems Security SCADA and Embedded systems security Distributed and Pervasive Systems Security Secure Software Development Situational Awareness Assessments Social Media Analysis Collaborative Defense Approach Risk Management, Governance and Compliance Cyber Situational Awareness Tools & Techniques Network Situational Awareness National and Critical Infrastructure Security Issues Situation Awareness in Military Operations Infonomics and e-Technology Infonomics Information Visualization Information Management Information Quality Technology-Enabled Information e-Learning e-Commerce e-Business e-Government e-Society System Design and Security for e-Services Synchronizing e-Security Capabilities for Enterprise Fraud Management Transactional Fraud Endpoint Transactional Monitoring Web Fraud Detection Database Security Application Security Border Protection and Controls Information Security Collaborative Learning Trust, Privacy and Data Security Network Security Issues and Protocols Security Challenges and Content Authoring Cryptography Secure Communications Authentication Techniques Chaos-based Data Security MANET Security Wireless Sensor Network Security Security Policy Formulation and Implementations Digital Forensics and Crimes Biometrics Security Incident Analysis Security Information Visualisation Big Data Open Source Applications Interoperability Decidability and Complexity Ethical Hackers Ethical Hackers Ethical Hacking Methodology Fingerprint and Enumerate Targets Network Scanning and Sniffing Pre-attack Reconnaissance Preventing Cyber Attacks Unethical Hacker Vulnerability Assessments Vectors Attack Web Attacks (XSS, Directory Traversals and SQL Injection) Secured Transactions End-to-End Encryption Incentives in Networked Systems Malware and Ransomware Targeting Networked Systems Networked System Architecture and Protocols Networked System Services and Applications Networed System Security, Privacy and Trust Offensive Security for Networked Systems Reverse Engineering Rootkit and Bootkit Targeting Networked Systems Security Vulnerabilities in Networked Systems Internet Applications and Technology Internet Technologies Internet Architecture Internet of Things (IoT) Broadband Access Technologies Application Agents Boundary Issues of Internet Security Database Management Data Models for Production Systems and Services Artificial Intelligence and Expert Systems IPSec Quality of Service Knowledge Management Embedded Systems Defence Systems Cloud Security Secure Virtual Infrastructure and Private Cloud Cryptographic Enforcement of Multi-Tenancy Cloud Requirements for PaaS and SaaS Security Policy and Privacy Requirements CloudAudit Protocol Corporate Governance Laws and Regulations Threats, Vulnerabilities, and Risk Management Disaster Recovery Planning Critical Infrastructure Protection Digital Rights Management Security Policies and Trust Management Identity Management Digital Forensics Data leakage and Database Forensics Forensics of Virtual and Cloud Environments Network Forensics and Traffic Analysis Information Hiding and Fraud Management File System and Memory Analysis Executable Content and Content Filtering Anti-Forensics Techniques Malware Forensics Evidentiary Aspects of Digital Forensics Large-Scale Investigations New threats and Non-Traditional Approaches Incident Handling and Penetration Testing Economics of Security Security in Machine Learning Adversarial Machine Learning Attack and Defense of Face Recognition Systems Attacks and Defense of Voice Recognition and Voice Commanded Systems Attacks and Defense of Machine learning Algorithms in Program Analysis Detection and Defense to Training Data Set Poison Attack Malware Identification and Analysis Privacy Preserving Machine Learning Robustness Analysis of Machine Learning Algoritms Spam and Phshing Email Detection Vulnerability Analysis Watermarking of Machine Learning Algorithms and Systems Cyber-Physical Systems Automation Systems Engineering Control and Hybrid Systems Cyber-Physical Production Management Cyber-Physical Production Systems Design and Optimization Data Portability and Management Embedded Devices Graphs, Algorithms and Disambiguation in Semantic Search Hardware Cryptography High-Assurance Cryptography Industry 4.0 and Innovative Manufacturing Techniques Internet of Things Manufacturing Engineering and Technology Manufacturing Evolution Mobile Cyber-Physical Production Systems Model-Based Development of Cyber-Physical Systems Modelling and Analysis of Cyber-Physical Production Systems Production Planning and Control Real-Time Embedded Systems Abstractions Remote Robotic Assembly Robustness, Safety and Security of Cyber-Physical Systems Sensor and Mobile Networks Special Purpose Architectural Solution Symbiotic Cyber-Physical Networks Verification, Validation and Certification of Cyber-Physical Systems Multimedia and Web Services DIntelligent Multimedia Multimedia Information Systems Multimedia Security Web Databases Web Metrics and its Applications Web Mining and Web Intelligence Web Services XML and other extensible languages Semantic Web and Ontology Intelligent Learning and Teaching Systems Large-Scale Enterprise Design Architecture Resource Management Ubi/Cloud Computing Big Data Data Protection in Ubi/Cloud Computing Context-Awareness and its Data Mining for UbiCom Data Grids Distributed Information Systems HCI and Interaction for UbiCom Ubiquitous Systems USN/RFID Service Smart Homes and its Business Model for UbiCom Service Security and Data Management for UbiCom Peer to Peer Data Management Application for Ubi/Cloud Computing Mobile Devices Wireless and Sensor Networks Wireless Networking and Communication WiFi Protocols and Standards Trends in Wireless Communications Wireless Security Standards and Mechanisms Sensor Networks (Sensornet) Ad hoc wireless Sensor Networks Security of Sensor Networks and Protocols Operations of Sensor Networks RFID / USN Key Update Mechanisms Quality of Service Digital Crypto-Currencies Bitcoin Challenges and its Roadmap Crypto-Assets Current State of Privacy in Bitcoin Decentralised Technology Data Licensing Digital Currencies Fintechs Future Payment Implications Standardisation-Related Issues Technical, Business and Regulatory Aspects Technology-based Risks Security of Social Media Platforms
Last updated by Dou Sun in 2022-09-25
Related Conferences
Short | Full Name | Submission | Conference |
---|---|---|---|
iTAP | International Conference on Internet Technology and Applications | 2013-06-19 | 2013-08-14 |
IEEA | International Conference on Informatics, Environment, Energy and Applications | 2024-10-05 | 2025-02-14 |
WUWNet | ACM International Conference on Underwater Networks & Systems | 2023-08-15 | 2023-11-24 |
CCCIOT | International Conference on Cloud Computing and IOT | 2022-11-19 | 2023-01-28 |
RAIIC | International Conference on Robotics, Artificial intelligence and Intelligent Control | 2023-08-04 | 2023-08-11 |
SIMULTECH | International Conference on Simulation and Modeling Methodologies, Technologies and Applications | 2020-03-06 | 2020-07-08 |
SPDE | International Conference on Security and Privacy in Digital Economy | 2020-05-15 | 2020-10-30 |
ICT4DA | International Conference of ICT for Development for Africa | 2019-02-17 | 2019-05-28 |
FGCN | International Conference on Future Generation Communication and Networking | 2015-06-30 | 2015-11-25 |
ICDMM | International Conference on Design, Manufacturing and Mechatronics | 2017-05-19 | 2017-05-26 |
Related Journals
CCF | Full Name | Impact Factor | Publisher | ISSN |
---|---|---|---|---|
IET Computers and Digital Techniques | 0.484 | IET | 1751-8601 | |
b | IEEE Transactions on Human-Machine Systems | 3.500 | IEEE | 2168-2291 |
Symmetry | 2.200 | MDPI | 2073-8994 | |
International Journal of Network Management | 1.500 | Wiley-Blackwell | 1055-7148 | |
Transforming Government: People, Process and Policy | 2.600 | Emerald | 1750-6166 | |
International Journal for Numerical Methods in Fluids | 1.700 | Wiley-Blackwell | 0271-2091 | |
Nature Biomedical Engineering | 26.80 | Springer | 2157-846X | |
IEEE Software | 3.300 | IEEE | 0740-7459 |
Full Name | Impact Factor | Publisher |
---|---|---|
IET Computers and Digital Techniques | 0.484 | IET |
IEEE Transactions on Human-Machine Systems | 3.500 | IEEE |
Symmetry | 2.200 | MDPI |
International Journal of Network Management | 1.500 | Wiley-Blackwell |
Transforming Government: People, Process and Policy | 2.600 | Emerald |
International Journal for Numerical Methods in Fluids | 1.700 | Wiley-Blackwell |
Nature Biomedical Engineering | 26.80 | Springer |
IEEE Software | 3.300 | IEEE |
Recommendation