Conference Information
ICCSCT' 2022: International Conference on Cyber Security and Connected Technologies
https://coreconferences.com/iccsct2022/Submission Date: |
2022-05-07 |
Notification Date: |
|
Conference Date: |
2022-06-16 |
Location: |
Macau, China |
Viewed: 8562 Tracked: 1 Attend: 0
Call For Papers
International Conference on Cyber Security and Connected Technologies 2022 (ICCSCT 2022) is an opportunity for academics, students, scholars, scientists and engineers from around the world who are involved in the study, management, development and implementation of systems and concepts to combat information warfare or to improve Cyber Security and Connected Technologies to come together and exchange ideas. This conference is trying to establish itself as a key event for the understanding of threats and risks to information systems, the development of a strong security culture, and incident investigation. Tracks of the Conference Database Security Big Data Techniques in Cyber Security Digital Signature Techniques Forensic Analysis of Cyber Crimes Secure User Authentication Spam Protection Advance Persistent Threat Secret Sharing Key Management Security in Mobile Networks Hardware Security Cloud Security Cyber Physical System Network Protocols Next-generation Communication Networks Mobile & Ubiquitous Communication Networks Mobile Cloud Cloud and Systems Management Cloud Computing and Networking Internet Technologies Information-Centric Networking Big Data Communication and Analytics Data Network Management Data as a Service Data Sharing and Infrastructures Network Architectures Modeling & Simulation of communication networks and Systems Network Monitoring and Control Traffic Measurement, Analysis, Modeling and Visualization Quality of Service (QoS) Routing and Flow Control in LANs, WANs and PANs Sensor Nets and Embedded Systems Network applications (web, multimedia streaming, gaming, etc.) Social Computing and Networks Software-Defined Networking Network Security Authentication Systems: Public Key Infrastructures, Key Management, Credential Management Secure Routing, Naming/Addressing, Network Management Security & Privacy in Pervasive and Ubiquitous Computing, e.g., RFIDs Security & Privacy in Peer-to-Peer and Overlay Networks Security & Privacy for Emerging Technologies: VoIP, Internet-of-Things, Social Networks Security & Isolation in Cloud, Data Center and Software-Defined Networks Algorithm and Applications Artificial Intelligence Biomechatronics Business Data Communication Networks and Protocols Cyber Crime and Laws Database Technologies Data Transmission Distributed and Parallel Computing Fundamentals of Automation and Robotics Hardware Design and Implementation Information Security and Information Management Mechatronics Systems in Robotics Mobile Computing Multimedia Communications and Graphics Technologies Navigation Operating Systems Optimization Techniques Sensors and Actuators Simulation and Modeling Soft Computing Wireless Sensor Networks
Last updated by Dou Sun in 2021-08-08
Related Conferences
| Short | Full Name | Conference |
|---|---|---|
| SACMAT | ACM Symposium on Access Control Models and Technologies | 2025-07-08 |
| Ada-Europe | International Conference on Reliable Software Technologies | 2020-06-08 |
| CISTI | Iberian Conference on Information Systems and Technologies | 2015-06-17 |
| WEBIST | International Conference on Web Information Systems and Technologies | 2026-10-27 |
| MSST | IEEE Symposium on Massive Storage Systems and Technologies | 2024-06-03 |
| SAMT | International Conference on Semantic and Digital Media Technologies | 2010-12-01 |
| PETS | Privacy Enhancing Technologies Symposium | 2026-07-20 |
| EC-Web | International Conference on Electronic Commerce and Web Technologies | 2016-09-05 |
| CompSysTech | International Conference on Computer Systems and Technologies | 2015-06-26 |
| SECURWARE | International Conference on Emerging Security Information, Systems and Technologies | 2022-10-16 |
Related Journals
| CCF | Full Name | Impact Factor | Publisher | ISSN |
|---|---|---|---|---|
| IEEE Transactions on Learning Technologies | 2.900 | IEEE | 1939-1382 | |
| International Journal of Computer Science Applications & Information Technologies | AR Publication | 2347-453X | ||
| Journal of Cyber Security and Mobility | River Publishers | 2245-1439 | ||
| b | Journal of Computer Science and Technology | 1.200 | Springer | 1000-9000 |
| International Journal of Computer Science & Information Technology | AIRCC | 0975-4660 | ||
| b | ACM Transactions on Internet Technology | 3.900 | ACM | 1533-5399 |
| Journal of Internet Technology | 0.900 | Taiwan Academic Network | 1607-9264 | |
| Education and Information Technologies | 4.800 | Springer | 1360-2357 | |
| Surface and Coatings Technology | 5.4 | Elsevier | 0257-8972 | |
| International Journal of Interactive Mobile Technologies | Kassel University Press GmbH | 1865-7923 |
| Full Name | Impact Factor | Publisher |
|---|---|---|
| IEEE Transactions on Learning Technologies | 2.900 | IEEE |
| International Journal of Computer Science Applications & Information Technologies | AR Publication | |
| Journal of Cyber Security and Mobility | River Publishers | |
| Journal of Computer Science and Technology | 1.200 | Springer |
| International Journal of Computer Science & Information Technology | AIRCC | |
| ACM Transactions on Internet Technology | 3.900 | ACM |
| Journal of Internet Technology | 0.900 | Taiwan Academic Network |
| Education and Information Technologies | 4.800 | Springer |
| Surface and Coatings Technology | 5.4 | Elsevier |
| International Journal of Interactive Mobile Technologies | Kassel University Press GmbH |