ICCAIT 2020 - International Conference on Computer Application and Information Technology 2020
Date2020-09-08 - 2020-09-09
Deadline2020-08-10
VenueLondon, UK - United Kingdom
KeywordsComputer Application; Information Technology; Security Policy; Social Media
Topics/Call fo Papers
Active Defense Systems
Adaptive Defense Systems
Analysis, Benchmark of Security Systems
Applied Cryptography
Authentication
Biometric Security
Complex Systems Security
Database and System Security
Data Protection
Data/System Integrity
Distributed Access Control
Distributed Attack Systems
Denial-of-Service
High Performance Network Virtualization
High Performance Security Systems
Hardware Security
Identity Management
Intelligent Defense Systems
Insider Threats
Internet and Network Forensics
Intrusion Detection and Prevention
Key Distribution and Management
Large-scale Attacks and Defense
Malware
Network Resiliency
Network Security
RFID Security and Privacy
Security Architectures
Security for Critical Infrastructures
Security in P2P systems
Security in Cloud and Grid Systems
Security in E-Commerce
Security in Pervasive/Ubiquitous Computing
Security and Privacy in Smart Grid
Security and Privacy in Wireless Networks
Secure Mobile Agents and Mobile Code
Security Policy
Security Protocols
Security Simulation and Tools
Security Theory and Tools
Standards and Assurance Methods
Trusted Computing
Trust Management
World Wide Web Security
Computer Architecture
Computer Modeling
Computer-aided Design
Automated Software Engineering
Computer Networks
Digital System and Logic Design
Multimedia Applications
Wireless Sensor Network
Network Security and Cryptography
Bioinformatics and Scientific Computing
Computer Animation
Digital Signal and Image Processing
Expert Systems
Internet and Web Applications
Social Media
Adaptive Defense Systems
Analysis, Benchmark of Security Systems
Applied Cryptography
Authentication
Biometric Security
Complex Systems Security
Database and System Security
Data Protection
Data/System Integrity
Distributed Access Control
Distributed Attack Systems
Denial-of-Service
High Performance Network Virtualization
High Performance Security Systems
Hardware Security
Identity Management
Intelligent Defense Systems
Insider Threats
Internet and Network Forensics
Intrusion Detection and Prevention
Key Distribution and Management
Large-scale Attacks and Defense
Malware
Network Resiliency
Network Security
RFID Security and Privacy
Security Architectures
Security for Critical Infrastructures
Security in P2P systems
Security in Cloud and Grid Systems
Security in E-Commerce
Security in Pervasive/Ubiquitous Computing
Security and Privacy in Smart Grid
Security and Privacy in Wireless Networks
Secure Mobile Agents and Mobile Code
Security Policy
Security Protocols
Security Simulation and Tools
Security Theory and Tools
Standards and Assurance Methods
Trusted Computing
Trust Management
World Wide Web Security
Computer Architecture
Computer Modeling
Computer-aided Design
Automated Software Engineering
Computer Networks
Digital System and Logic Design
Multimedia Applications
Wireless Sensor Network
Network Security and Cryptography
Bioinformatics and Scientific Computing
Computer Animation
Digital Signal and Image Processing
Expert Systems
Internet and Web Applications
Social Media
Other CFPs
Last modified: 2019-10-26 13:01:51