Conference Information
ICCSCT' 2022: International Conference on Cyber Security and Connected Technologies
Submission Date:
Notification Date:
Conference Date:
Macau, China
Viewed: 3831   Tracked: 1   Attend: 0

Call For Papers
International Conference on Cyber Security and Connected Technologies 2022 (ICCSCT 2022) is an opportunity for academics, students, scholars, scientists and engineers from around the world who are involved in the study, management, development and implementation of systems and concepts to combat information warfare or to improve Cyber Security and Connected Technologies to come together and exchange ideas. This conference is trying to establish itself as a key event for the understanding of threats and risks to information systems, the development of a strong security culture, and incident investigation.

Tracks of the Conference

Database Security
Big Data Techniques in Cyber Security
Digital Signature Techniques
Forensic Analysis of Cyber Crimes
Secure User Authentication
Spam Protection
Advance Persistent Threat
Secret Sharing
Key Management
Security in Mobile Networks
Hardware Security
Cloud Security
Cyber Physical System
Network Protocols
Next-generation Communication Networks
Mobile & Ubiquitous Communication Networks
Mobile Cloud
Cloud and Systems Management
Cloud Computing and Networking
Internet Technologies
Information-Centric Networking
Big Data Communication and Analytics
Data Network Management
Data as a Service
Data Sharing and Infrastructures
Network Architectures
Modeling & Simulation of communication networks and Systems
Network Monitoring and Control
Traffic Measurement, Analysis, Modeling and Visualization
Quality of Service (QoS)
Routing and Flow Control in LANs, WANs and PANs
Sensor Nets and Embedded Systems
Network applications (web, multimedia streaming, gaming, etc.)
Social Computing and Networks
Software-Defined Networking
Network Security
Authentication Systems: Public Key Infrastructures, Key Management, Credential Management
Secure Routing, Naming/Addressing, Network Management
Security & Privacy in Pervasive and Ubiquitous Computing, e.g., RFIDs
Security & Privacy in Peer-to-Peer and Overlay Networks
Security & Privacy for Emerging Technologies: VoIP, Internet-of-Things, Social Networks
Security & Isolation in Cloud, Data Center and Software-Defined Networks
Algorithm and Applications
Artificial Intelligence
Business Data
Communication Networks and Protocols
Cyber Crime and Laws
Database Technologies
Data Transmission
Distributed and Parallel Computing
Fundamentals of Automation and Robotics
Hardware Design and Implementation
Information Security and Information Management
Mechatronics Systems in Robotics
Mobile Computing
Multimedia Communications and Graphics Technologies
Operating Systems
Optimization Techniques
Sensors and Actuators
Simulation and Modeling
Soft Computing
Wireless Sensor Networks
Last updated by Dou Sun in 2021-08-08
Related Conferences
Related Journals