Event Date : 26th-27th October 2018
Call for Paper:
- Big Data Techniques in Cyber Security
- Forensic Analysis of Cyber Crimes
- Secure Design, Tooling, and Engineering
- Security and Trust of Citizens
- Big Data Communication and Analytics
- Data Sharing and Infrastructures
- Quality of Service (QoS)
- Mobile Cloud
- Cloud and Systems Management
- Cloud Computing and Networking
- Digital Signature Techniques
- Advance Persistent Threat
- Network Protocols
- Next-generation Communication Networks
- Information-Centric Networking
- Data Network Management
- Network Architectures
- Modeling & Simulation of communication networks and Systems
- Network Monitoring and Control
- Traffic Measurement, Analysis, Modeling and Visualization
- Routing and Flow Control in LANs, WANs and PANs
- Sensor Nets and Embedded Systems
- Network applications (web, multimedia streaming, gaming, etc.)
- Social Computing and Networks
- Software-Defined Networking
- Secure Routing, Naming/Addressing, Network Management
- Security & Privacy in Pervasive and Ubiquitous Computing, e.g., RFIDs
- Security & Privacy in Peer-to-Peer and Overlay Networks
- Security & Privacy for Emerging Technologies: VoIP, Social Networks
- Security & Isolation in Cloud, Data Center and Software-Defined Networks
- Secret Sharing
- Key Management
- Authentication Systems: Public Key Infrastructures, Key Management, Credential Management
- Secure User Authentication
- Spam protection
- Hardware Security
- Cyber Physical System
- E-wallet
- e-wallet security and transaction reversal
- interoperability issues in e-wallet
- security of biometric based transactions
- Security in Mobile Networks
- Mobile & Ubiquitous Communication Networks
- Security of IoT Services
- IoT Service Architectures and Platforms
- Real-Time IoT Service Security Analytics and Forensics
- Organizational Privacy and Security Policies
- Governance for IoT Services
- Social Aspects of IoT Security
- Security and Privacy Threats to IoT Services and Users
- Accountability and Trust Management
- Legal Considerations and Regulations
- Case Studies and Applications
- Control System Cyber security
- Communications and Network Protocol Security in Control Systems and Instrumentation
- Security of nuclear power plants
- Energy Infrastructure Security
- Transport Infrastructure Security
- Optical Network Security
- Convergence of optical and wireless access Networks
- Storage Networks
- Optical Network Virtualization
- IP-WDM integration
- Software-defined optical networks for grid computing
- Advances in Health-care IT security and privacy (including implantable medical devices and nano-sensors)
- Human factors in biomedical security and privacy
- Networked medical device security
- Green cryptography for medical data security
- Smart hospital security and spatial/temporal privacy preservation
- Advances in cyber-physical medical systems security
- Emerging cryptographic computing schemes for biomedical security
- Post-quantum cryptography
- Big data security and privacy-preserving medical data mining
- Novel anonymous sensitive data handling and restricted computing methods for sensitive biomedical data
- Novel deeply-embedded biomedical computing reliability
Important Dates:
- Submission 25th June 2018
- Acceptance 25th August 2018
- Registration 25th September 2018
- Camera Ready 25th September 2018
Prof (Dr.) Dinesh Goyal
Dean Academics, Suresh Gyan Vihar University
0141-6450389,0141-6450390
+91-9887678379, +91-7597721974
(Conference Chairs)
Email--iccs@iaasse.org