会議情報
ICITST 2022: International Conference for Internet Technology and Secured Transactions
https://icitst.org/
提出日:
2022-09-30 Extended
通知日:
2022-10-07
会議日:
2022-12-06
場所:
London, UK
年:
17
閲覧: 12169   追跡: 2   出席: 0

論文募集
The objectives of the ICITST-2022 are to bridge the knowledge gap between academia and industry, promote research esteem in secured Internet transactions and the importance of information technology evolution to secured transactions. The ICITST-2022 invites research papers that encompass conceptual analysis, design implementation and performance evaluation.

The topics in ICITST-2022 include but are not confined to the following areas:

Cyber Security and Cyber warfare

    Surveillance Systems
    Cyber Warfare Trends and Approaches
    Social engineering
    Template Protection and Liveliness detection
    New theories and algorithms in biometrics
    Formal Methods Application in Security
    Operating Systems and Database Security
    Enterprise Systems Security
    SCADA and Embedded systems security
    Distributed and Pervasive Systems Security
    Secure Software Development
    Situational Awareness Assessments
    Social Media Analysis
    Collaborative Defense Approach
    Risk Management, Governance and Compliance
    Cyber Situational Awareness Tools & Techniques
    Network Situational Awareness
    National and Critical Infrastructure Security Issues
    Situation Awareness in Military Operations

Infonomics and e-Technology

    Infonomics
    Information Visualization
    Information Management
    Information Quality
    Technology-Enabled Information
    e-Learning
    e-Commerce
    e-Business
    e-Government
    e-Society
    System Design and Security for e-Services
    Synchronizing e-Security
    Capabilities for Enterprise Fraud Management
    Transactional Fraud
    Endpoint Transactional Monitoring
    Web Fraud Detection
    Database Security
    Application Security
    Border Protection and Controls

Information Security

    Collaborative Learning
    Trust, Privacy and Data Security
    Network Security Issues and Protocols
    Security Challenges and Content Authoring
    Cryptography
    Secure Communications
    Authentication Techniques
    Chaos-based Data Security
    MANET Security
    Wireless Sensor Network Security
    Security Policy Formulation and Implementations
    Digital Forensics and Crimes
    Biometrics
    Security Incident Analysis
    Security Information Visualisation
    Big Data
    Open Source Applications
    Interoperability
    Decidability and Complexity

Ethical Hackers

    Ethical Hackers
    Ethical Hacking Methodology
    Fingerprint and Enumerate Targets
    Network Scanning and Sniffing
    Pre-attack Reconnaissance
    Preventing Cyber Attacks
    Unethical Hacker
    Vulnerability Assessments
    Vectors Attack
    Web Attacks (XSS, Directory Traversals and SQL Injection)

Secured Transactions

    End-to-End Encryption
    Incentives in Networked Systems
    Malware and Ransomware Targeting Networked Systems
    Networked System Architecture and Protocols
    Networked System Services and Applications
    Networed System Security, Privacy and Trust
    Offensive Security for Networked Systems
    Reverse Engineering
    Rootkit and Bootkit Targeting Networked Systems
    Security Vulnerabilities in Networked Systems

Internet Applications and Technology

    Internet Technologies
    Internet Architecture
    Internet of Things (IoT)
    Broadband Access Technologies
    Application Agents
    Boundary Issues of Internet Security
    Database Management
    Data Models for Production Systems and Services
    Artificial Intelligence and Expert Systems
    IPSec Quality of Service
    Knowledge Management
    Embedded Systems
    Defence Systems

Cloud Security

    Secure Virtual Infrastructure and Private Cloud
    Cryptographic Enforcement of Multi-Tenancy
    Cloud Requirements for PaaS and SaaS
    Security Policy and Privacy Requirements
    CloudAudit Protocol
    Corporate Governance
    Laws and Regulations
    Threats, Vulnerabilities, and Risk Management
    Disaster Recovery Planning
    Critical Infrastructure Protection
    Digital Rights Management
    Security Policies and Trust Management
    Identity Management

Digital Forensics

    Data leakage and Database Forensics
    Forensics of Virtual and Cloud Environments
    Network Forensics and Traffic Analysis
    Information Hiding and Fraud Management
    File System and Memory Analysis
    Executable Content and Content Filtering
    Anti-Forensics Techniques
    Malware Forensics
    Evidentiary Aspects of Digital Forensics
    Large-Scale Investigations
    New threats and Non-Traditional Approaches
    Incident Handling and Penetration Testing
    Economics of Security

Security in Machine Learning

    Adversarial Machine Learning
    Attack and Defense of Face Recognition Systems
    Attacks and Defense of Voice Recognition and Voice Commanded Systems
    Attacks and Defense of Machine learning Algorithms in Program Analysis
    Detection and Defense to Training Data Set Poison Attack
    Malware Identification and Analysis
    Privacy Preserving Machine Learning
    Robustness Analysis of Machine Learning Algoritms
    Spam and Phshing Email Detection
    Vulnerability Analysis
    Watermarking of Machine Learning Algorithms and Systems

Cyber-Physical Systems

    Automation Systems Engineering
    Control and Hybrid Systems
    Cyber-Physical Production Management
    Cyber-Physical Production Systems Design and Optimization
    Data Portability and Management
    Embedded Devices
    Graphs, Algorithms and Disambiguation in Semantic Search
    Hardware Cryptography
    High-Assurance Cryptography
    Industry 4.0 and Innovative Manufacturing Techniques
    Internet of Things
    Manufacturing Engineering and Technology
    Manufacturing Evolution
    Mobile Cyber-Physical Production Systems
    Model-Based Development of Cyber-Physical Systems
    Modelling and Analysis of Cyber-Physical Production Systems
    Production Planning and Control
    Real-Time Embedded Systems Abstractions
    Remote Robotic Assembly
    Robustness, Safety and Security of Cyber-Physical Systems
    Sensor and Mobile Networks
    Special Purpose Architectural Solution
    Symbiotic Cyber-Physical Networks
    Verification, Validation and Certification of Cyber-Physical Systems

Multimedia and Web Services

    DIntelligent Multimedia
    Multimedia Information Systems
    Multimedia Security
    Web Databases
    Web Metrics and its Applications
    Web Mining and Web Intelligence
    Web Services
    XML and other extensible languages
    Semantic Web and Ontology
    Intelligent Learning and Teaching Systems
    Large-Scale Enterprise Design Architecture
    Resource Management

Ubi/Cloud Computing

    Big Data
    Data Protection in Ubi/Cloud Computing
    Context-Awareness and its Data Mining for UbiCom
    Data Grids
    Distributed Information Systems
    HCI and Interaction for UbiCom
    Ubiquitous Systems
    USN/RFID Service
    Smart Homes and its Business Model for UbiCom Service
    Security and Data Management for UbiCom
    Peer to Peer Data Management
    Application for Ubi/Cloud Computing
    Mobile Devices

Wireless and Sensor Networks

    Wireless Networking and Communication
    WiFi Protocols and Standards
    Trends in Wireless Communications
    Wireless Security Standards and Mechanisms
    Sensor Networks (Sensornet)
    Ad hoc wireless Sensor Networks
    Security of Sensor Networks and Protocols
    Operations of Sensor Networks
    RFID / USN Key Update Mechanisms
    Quality of Service

Digital Crypto-Currencies

    Bitcoin
    Challenges and its Roadmap
    Crypto-Assets
    Current State of Privacy in Bitcoin
    Decentralised Technology
    Data Licensing
    Digital Currencies
    Fintechs
    Future Payment Implications
    Standardisation-Related Issues
    Technical, Business and Regulatory Aspects
    Technology-based Risks

Security of Social Media Platforms
最終更新 Dou Sun 2022-09-25
関連会議
CCFCOREQUALIS省略名完全な名前提出日通知日会議日
biTAPInternational Conference on Internet Technology and Applications2013-06-192013-06-252013-08-14
IEEAInternational Conference on Informatics, Environment, Energy and Applications2021-01-202021-02-102021-03-12
WUWNetACM International Conference on Underwater Networks & Systems2022-08-082022-09-192022-11-14
CCCIOTInternational Conference on Cloud Computing and IOT2022-09-242022-10-292023-01-28
SIMULTECHInternational Conference on Simulation and Modeling Methodologies, Technologies and Applications2020-03-062020-04-152020-07-08
SPDEInternational Conference on Security and Privacy in Digital Economy2020-05-152020-07-012020-10-30
ICT4DAInternational Conference of ICT for Development for Africa2019-02-172019-03-152019-05-28
ICDMMInternational Conference on Design, Manufacturing and Mechatronics2017-05-19 2017-05-26
b3FGCNInternational Conference on Future Generation Communication and Networking2015-06-302015-07-152015-11-25
ab1AIEDInternational Conference on Artificial Intelligence in Education2019-02-01 2019-06-25
関連仕訳帳
CCF完全な名前インパクト ・ ファクター出版社ISSN
bACM Transactions on Internet Technology1.489ACM1533-5399
ETRI Journal0.861Wiley-Blackwell1225-6463
Journal of Information Technology in ConstructionHerman1400-6529
Journal of Research on Technology in EducationTaylor & Francis1539-1523
Journal of Information Technology Education: ResearchInforming Science Institute1547-9714
Journal of Interaction Science Springer2194-0827
International Journal of Information Technology & Decision Making2.862World Scientific0219-6220
Wireless Power TransferCambridge University Press2052-8418
Information Technology and Management1.533Springer1385-951X
International Journal of Information Technology, Control and Automation AIRCC1839-6682
おすすめ