会議情報
ICITST 2022: International Conference for Internet Technology and Secured Transactions
https://icitst.org/提出日: |
2022-09-30 Extended |
通知日: |
2022-10-07 |
会議日: |
2022-12-06 |
場所: |
London, UK |
年: |
17 |
閲覧: 18237 追跡: 2 出席: 0
論文募集
The objectives of the ICITST-2022 are to bridge the knowledge gap between academia and industry, promote research esteem in secured Internet transactions and the importance of information technology evolution to secured transactions. The ICITST-2022 invites research papers that encompass conceptual analysis, design implementation and performance evaluation.
The topics in ICITST-2022 include but are not confined to the following areas:
Cyber Security and Cyber warfare
Surveillance Systems
Cyber Warfare Trends and Approaches
Social engineering
Template Protection and Liveliness detection
New theories and algorithms in biometrics
Formal Methods Application in Security
Operating Systems and Database Security
Enterprise Systems Security
SCADA and Embedded systems security
Distributed and Pervasive Systems Security
Secure Software Development
Situational Awareness Assessments
Social Media Analysis
Collaborative Defense Approach
Risk Management, Governance and Compliance
Cyber Situational Awareness Tools & Techniques
Network Situational Awareness
National and Critical Infrastructure Security Issues
Situation Awareness in Military Operations
Infonomics and e-Technology
Infonomics
Information Visualization
Information Management
Information Quality
Technology-Enabled Information
e-Learning
e-Commerce
e-Business
e-Government
e-Society
System Design and Security for e-Services
Synchronizing e-Security
Capabilities for Enterprise Fraud Management
Transactional Fraud
Endpoint Transactional Monitoring
Web Fraud Detection
Database Security
Application Security
Border Protection and Controls
Information Security
Collaborative Learning
Trust, Privacy and Data Security
Network Security Issues and Protocols
Security Challenges and Content Authoring
Cryptography
Secure Communications
Authentication Techniques
Chaos-based Data Security
MANET Security
Wireless Sensor Network Security
Security Policy Formulation and Implementations
Digital Forensics and Crimes
Biometrics
Security Incident Analysis
Security Information Visualisation
Big Data
Open Source Applications
Interoperability
Decidability and Complexity
Ethical Hackers
Ethical Hackers
Ethical Hacking Methodology
Fingerprint and Enumerate Targets
Network Scanning and Sniffing
Pre-attack Reconnaissance
Preventing Cyber Attacks
Unethical Hacker
Vulnerability Assessments
Vectors Attack
Web Attacks (XSS, Directory Traversals and SQL Injection)
Secured Transactions
End-to-End Encryption
Incentives in Networked Systems
Malware and Ransomware Targeting Networked Systems
Networked System Architecture and Protocols
Networked System Services and Applications
Networed System Security, Privacy and Trust
Offensive Security for Networked Systems
Reverse Engineering
Rootkit and Bootkit Targeting Networked Systems
Security Vulnerabilities in Networked Systems
Internet Applications and Technology
Internet Technologies
Internet Architecture
Internet of Things (IoT)
Broadband Access Technologies
Application Agents
Boundary Issues of Internet Security
Database Management
Data Models for Production Systems and Services
Artificial Intelligence and Expert Systems
IPSec Quality of Service
Knowledge Management
Embedded Systems
Defence Systems
Cloud Security
Secure Virtual Infrastructure and Private Cloud
Cryptographic Enforcement of Multi-Tenancy
Cloud Requirements for PaaS and SaaS
Security Policy and Privacy Requirements
CloudAudit Protocol
Corporate Governance
Laws and Regulations
Threats, Vulnerabilities, and Risk Management
Disaster Recovery Planning
Critical Infrastructure Protection
Digital Rights Management
Security Policies and Trust Management
Identity Management
Digital Forensics
Data leakage and Database Forensics
Forensics of Virtual and Cloud Environments
Network Forensics and Traffic Analysis
Information Hiding and Fraud Management
File System and Memory Analysis
Executable Content and Content Filtering
Anti-Forensics Techniques
Malware Forensics
Evidentiary Aspects of Digital Forensics
Large-Scale Investigations
New threats and Non-Traditional Approaches
Incident Handling and Penetration Testing
Economics of Security
Security in Machine Learning
Adversarial Machine Learning
Attack and Defense of Face Recognition Systems
Attacks and Defense of Voice Recognition and Voice Commanded Systems
Attacks and Defense of Machine learning Algorithms in Program Analysis
Detection and Defense to Training Data Set Poison Attack
Malware Identification and Analysis
Privacy Preserving Machine Learning
Robustness Analysis of Machine Learning Algoritms
Spam and Phshing Email Detection
Vulnerability Analysis
Watermarking of Machine Learning Algorithms and Systems
Cyber-Physical Systems
Automation Systems Engineering
Control and Hybrid Systems
Cyber-Physical Production Management
Cyber-Physical Production Systems Design and Optimization
Data Portability and Management
Embedded Devices
Graphs, Algorithms and Disambiguation in Semantic Search
Hardware Cryptography
High-Assurance Cryptography
Industry 4.0 and Innovative Manufacturing Techniques
Internet of Things
Manufacturing Engineering and Technology
Manufacturing Evolution
Mobile Cyber-Physical Production Systems
Model-Based Development of Cyber-Physical Systems
Modelling and Analysis of Cyber-Physical Production Systems
Production Planning and Control
Real-Time Embedded Systems Abstractions
Remote Robotic Assembly
Robustness, Safety and Security of Cyber-Physical Systems
Sensor and Mobile Networks
Special Purpose Architectural Solution
Symbiotic Cyber-Physical Networks
Verification, Validation and Certification of Cyber-Physical Systems
Multimedia and Web Services
DIntelligent Multimedia
Multimedia Information Systems
Multimedia Security
Web Databases
Web Metrics and its Applications
Web Mining and Web Intelligence
Web Services
XML and other extensible languages
Semantic Web and Ontology
Intelligent Learning and Teaching Systems
Large-Scale Enterprise Design Architecture
Resource Management
Ubi/Cloud Computing
Big Data
Data Protection in Ubi/Cloud Computing
Context-Awareness and its Data Mining for UbiCom
Data Grids
Distributed Information Systems
HCI and Interaction for UbiCom
Ubiquitous Systems
USN/RFID Service
Smart Homes and its Business Model for UbiCom Service
Security and Data Management for UbiCom
Peer to Peer Data Management
Application for Ubi/Cloud Computing
Mobile Devices
Wireless and Sensor Networks
Wireless Networking and Communication
WiFi Protocols and Standards
Trends in Wireless Communications
Wireless Security Standards and Mechanisms
Sensor Networks (Sensornet)
Ad hoc wireless Sensor Networks
Security of Sensor Networks and Protocols
Operations of Sensor Networks
RFID / USN Key Update Mechanisms
Quality of Service
Digital Crypto-Currencies
Bitcoin
Challenges and its Roadmap
Crypto-Assets
Current State of Privacy in Bitcoin
Decentralised Technology
Data Licensing
Digital Currencies
Fintechs
Future Payment Implications
Standardisation-Related Issues
Technical, Business and Regulatory Aspects
Technology-based Risks
Security of Social Media Platforms
最終更新 Dou Sun 2022-09-25
関連会議
関連仕訳帳
| CCF | 完全な名前 | インパクト ・ ファクター | 出版社 | ISSN |
|---|---|---|---|---|
| Journal of Information Technology in Construction | Herman | 1400-6529 | ||
| IEEE Internet Computing Magazine | 3.700 | IEEE | 1089-7801 | |
| Indonesian Journal of Science and Technology | Universitas Pendidikan Indonesia | 2528-1410 | ||
| Mathematics of Operations Research | 1.400 | INFORMS | 0364-765X | |
| Engineering Applications of Computational Fluid Mechanics | 5.900 | Taylor & Francis | 1994-2060 | |
| Circuits, Systems, and Signal Processing | 1.800 | Springer | 0278-081X | |
| Sustainable Cities and Society | 12.0 | Elsevier | 2210-6707 | |
| ISPRS Journal of Photogrammetry and Remote Sensing | 12.2 | Elsevier | 0924-2716 | |
| International Journal of Advanced Computer Science and Applications | 0.700 | Science and Information | 2158-107X |
| 完全な名前 | インパクト ・ ファクター | 出版社 |
|---|---|---|
| Journal of Information Technology in Construction | Herman | |
| IEEE Internet Computing Magazine | 3.700 | IEEE |
| Indonesian Journal of Science and Technology | Universitas Pendidikan Indonesia | |
| Mathematics of Operations Research | 1.400 | INFORMS |
| Engineering Applications of Computational Fluid Mechanics | 5.900 | Taylor & Francis |
| Circuits, Systems, and Signal Processing | 1.800 | Springer |
| Sustainable Cities and Society | 12.0 | Elsevier |
| ISPRS Journal of Photogrammetry and Remote Sensing | 12.2 | Elsevier |
| International Journal of Advanced Computer Science and Applications | 0.700 | Science and Information |