Conference Information
MICCIS 2025: International Conference on Mobile Internet, Cloud Computing and Information Security
https://www.miccis.org/
Submission Date:
2025-02-01
Notification Date:
2025-03-20
Conference Date:
2025-04-11
Location:
Dongguan, China
Years:
3
Viewed: 3491   Tracked: 0   Attend: 3

Call For Papers
Mobile Internet

Mobile Applications
Mobile Authentication
Mobile Security
Mobile Terminal
Mobile Network
Mobile Communication
Mobile Operating System
Mobile Browser
Mobile Instant Messaging
Mobile IoT and Cloud Integration
Mobile Data
Mobile Search
Mobile Games
Mobile Map
Mobile Social Networking
Mobile Healthcare
Mobile Reading
Mobile Cloud
Mobile IoT
Smart Cities and Mobile Cloud Integration
Service Computing
Service Reputation
Collaborative Computing
Peer-to-Peer Computing   
Complex Systems
Embedded Systems
Sensor Networks  
Smart Home
Smart City

Cloud Computing

Cloud and Grid Computing for Big Data
Cloud Application Architectures 
Cloud Application Scalability and Availability
Cloud Application Performance and Monitoring
Cloud Computing and Semantic Web Technology
Cloud Computing Architectures and Systems
Models and Tools for Intelligent Computing
Cloud Computing Technologies, Services, and Applications
Cloud Management and Operations
Cloud Middleware Frameworks
Cloud Optimization and Automation 
Cloud Quality and Performance
Cloud Resource Virtualization and Combination
Mobile Data Processing in Cloud Environments
Cloud Security for Mobile Applications
Cloud Solution Design Patterns 
Distributed and Peer-to-peer Search
Infrastructure and Platforms for Intelligent Computing
Cloud Computing Models, Simulations, Designs, and Examples
Leveraging Edge Computing for Enhanced Mobile Data Security

Information Security

Access Control  
Secure Cloud Computing
Artificial Immune System
Security and Network Management 
Authentication
Security and Privacy in Mobile Systems
Authentication and Non-Repudiation
Security and Privacy in Pervasive Computing
Biometric Security
Security and Privacy in Web Services
Secure Computing Intelligence
Security and Privacy Policies
Encryption Protocols
Security Zone Control
Data Integrity
Security Deployment
Database and System Security
Security Engineering
Security and Privacy in Mobile Applications
Biometric Authentication in Mobile Systems
Security in Distributed Systems
Design and Security ModelsSecurity of Grid Computing
Email Security, Spam, Phishing and Email Fraud
Security of Information System Architectures
Encryption and Decryption Algorithms
Security of Intelligent Agents and Systems
Formal Authentication Tools
Security of Pervasive Computing  Security of Fuzzy Systems
Security of Web 2.0
Identification and Authentication
Security Management
Insider Threats and Countermeasures
Security of Software Defined Networks
Internet Security and Applications
Security of Vehicle Networks
Intrusion Detection and Prevention
Security Requirements
Key Management
Collaborative Computing for Mobile Security
Privacy-Enhancing Technologies in Pervasive Computing
Security Threats and Countermeasures
Mobile adhoc Network Security
Sensor Network Security
Authentication, Trust and Authorization Model
Software Security
Peer-to-peer Network SecurityThreats, Vulnerabilities, Risks, Formal Methods
Performance Evaluation of Security ProtocolsTrust Management
Privacy and AuthenticationTrust models and metrics
QoS Cybersecurity
Virus, Worm, and Trojan Horse Protection
Quantum Cryptography Vulnerability Assessment
Regulatory and Trust Mechanisms
Wireless network security
DDoS, MiM, Session Hijacking and Replay Attacks
AI-Driven Threat Detection in Mobile Networks
Last updated by Dou Sun in 2025-01-11
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
EEICInternational Conference on Electrical Engineering and Intelligent Control2024-08-022024-09-102024-10-11
caAISTATSInternational Conference on Artificial Intelligence and Statistics2024-10-032025-01-212025-05-03
ICCNDTInternational Conference on Computing, Networking and Digital Technologies2012-10-202012-10-252012-11-11
cREFSQRequirements Engineering: Foundation for Software Quality2024-11-012025-01-132025-04-07
ICMMPMInternational Conference on Metal Material Processes and Manufacturing2024-10-112024-11-202024-12-16
FCST'IEEE International Symposium on Future Cyber Security Technologies2024-06-302024-07-302024-09-02
ICFNNInternational Conference on Frontiers of Neural Networks2019-07-052019-07-152019-07-26
GUTInternational Conference in Green and Ubiquitous Technology2012-06-012012-06-102012-07-07
ICMASInternational Conference on Mechanical and Aerospace Systems2023-12-012024-01-012024-04-22
ICITKMInternational Conference on Information Technology and Knowledge Management2018-10-102018-10-102018-11-02
Recommendation