ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

ICCSCT 2024 - International Conference on Cyber Security and Connected Technologies 2024

Date2024-04-18 - 2024-04-19


VenueHong Kong, Hong Kong SAR Hong Kong SAR

KeywordsCyber Security; Connected Technologies; Technology


Topics/Call fo Papers

Database Security
Big Data Techniques in Cyber Security
Digital Signature Techniques
Forensic Analysis of Cyber Crimes
Secure User Authentication
Spam Protection
Advance Persistent Threat
Secret Sharing
Key Management
Security in Mobile Networks
Hardware Security
Cloud Security
Cyber Physical System
Network Protocols
Next-generation Communication Networks
Mobile & Ubiquitous Communication Networks
Mobile Cloud
Cloud and Systems Management
Cloud Computing and Networking
Internet Technologies
Data Network Management
Information-Centric Networking
Big Data Communication and Analytics
Network Architectures
Modelling & Simulation of communication networks and Systems
Network Monitoring and Control
Traffic Measurement, Analysis, Modelling, and Visualization
Quality of Service (QoS)
Routing and Flow Control in LANs, WANs, and PANs
Sensor Nets and Embedded Systems
Security & Privacy for Emerging Technologies: VoIP, Internet-of-Things, Social Networks
Security & Isolation in Cloud, Data Centre and Software-Defined Networks
Network applications (web, multimedia streaming, gaming, etc.)
Social Computing and Networks
Software-Defined Networking
Network Security
Data as a Service
Data Sharing and Infrastructures
Security & Privacy in Peer-to-Peer and Overlay Networks
Algorithm and Applications
Artificial Intelligence
Bio mechatronics
Business Data
Communication Networks and Protocols
Cyber Crime and Laws
Database Technologies
Data Transmission
Distributed and Parallel Computing
Fundamentals of Automation and Robotics
Hardware Design and Implementation
Information Security and Information Management
Mechatronics Systems in Robotics
Mobile Computing
Multimedia Communications and Graphics Technologies
Optimization Techniques
Operating Systems
Sensors and Actuators
Simulation and Modelling
Soft Computing
Wireless Sensor Networks
Authentication Systems: Public Key Infrastructures, Key Management, Credential Management
Secure Routing, Naming/Addressing, Network Management
Security & Privacy in Pervasive and Ubiquitous Computing, e.g., RFIDs
Article/Paper Submission Link:

Last modified: 2023-10-12 14:59:57