Sign for Notice Everyday    Sign Up| Sign In| Link|

Our Sponsors

    Receive Latest News

    Share Us

    ICCSCT 2020 - International Conference on Cyber Security and Connected Technologies 2020

    View: 537

    Website | Edit Freely

    Category Database Security; Big Data; Cyber Security; Spam Protection; Key Management; Secret Sharing; Cloud Security; Hardware Security; Network Protocols;

    Deadline: November 30, 2019 | Date: February 03, 2020-February 04, 2020

    Venue/Country: Tokyo, Japan

    Updated: 2019-03-25 14:20:39 (GMT+9)

    Call For Papers - CFP

    Database Security

    Big Data Techniques in Cyber Security

    Digital Signature Techniques

    Forensic Analysis of Cyber Crimes

    Secure User Authentication

    Spam Protection

    Advance Persistent Threat

    Secret Sharing

    Key Management

    Security in Mobile Networks

    Hardware Security

    Cloud Security

    Cyber Physical System

    Network Protocols

    Next-generation Communication Networks

    Mobile & Ubiquitous Communication Networks

    Mobile Cloud

    Cloud and Systems Management

    Cloud Computing and Networking

    Internet Technologies

    Information-Centric Networking

    Big Data Communication and Analytics

    Data Network Management

    Data as a Service

    Data Sharing and Infrastructures

    Network Architectures

    Modeling & Simulation of communication networks and Systems

    Network Monitoring and Control

    Traffic Measurement, Analysis, Modeling and Visualization

    Quality of Service (QoS)

    Routing and Flow Control in LANs, WANs and PANs

    Sensor Nets and Embedded Systems

    Network applications (web, multimedia streaming, gaming, etc.)

    Social Computing and Networks

    Software-Defined Networking

    Network Security

    Authentication Systems: Public Key Infrastructures, Key Management, Credential Management

    Secure Routing, Naming/Addressing, Network Management

    Security & Privacy in Pervasive and Ubiquitous Computing, e.g., RFIDs

    Security & Privacy in Peer-to-Peer and Overlay Networks

    Security & Privacy for Emerging Technologies: VoIP, Internet-of-Things, Social Networks

    Security & Isolation in Cloud, Data Center and Software-Defined Networks

    Algorithm and Applications

    Artificial Intelligence


    Business Data

    Communication Networks and Protocols

    Cyber Crime and Laws

    Database Technologies

    Data Transmission

    Distributed and Parallel Computing

    Fundamentals of Automation and Robotics

    Hardware Design and Implementation

    Information Security and Information Management

    Mechatronics Systems in Robotics

    Mobile Computing

    Multimedia Communications and Graphics Technologies


    Operating Systems

    Optimization Techniques

    Sensors and Actuators

    Simulation and Modeling

    Soft Computing

    Wireless Sensor Networks

    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.