ICS 2014 - 1st International Workshop on Internet Computing and Security
Date2014-07-17 - 2014-07-21
Deadline2014-03-15
VenueSantorini Island, Greece
Keywords
Websitehttps://www.cscc14.org
Topics/Call fo Papers
Nowadays, one of the key topics in technology refers to programming the web applications for various fields, as well as the way in which they are developed, optimized, accessed and secured. New technologies like cloud computing or virtualization still raises a great deal of concern and fully global response to secure cyberspace has yet to emerge. Ensuring information system security became a constant preoccupation for specialists worldwide. The aim of this session is to bring together academic scientists, researchers and students to interchange knowledge and disseminate new ideas towards challenges raised by recent advances in Internet computing and cybersecurity.
Topics
Topics of interest include, but are not limited to, the following: e-Activities (e-Learning, e-Communities, e-Commerce, e-Management, e-Marketing, e-Governance, e-Science, e-Health, etc.); Multimedia applications and virtual reality; Wireless and mobile computing; Cloud computing and storage; Optimization problems in telecommunications; Web applications and services security; Security solutions for virtualization; Identity, access and authorization management; Corporate virtual globes (Google Earth and Microsoft Virtual Earth); GPS, Location-Based Services; Encryption and interception of communications; Cryptographic applications; TCP/IP protocol suite security, secure routing; Secure transmission protocols; VoIP, SIP, IP telephony and WiFi security; Secure directories, e-mail, DNS, and other network services security; Firewalls, VPNs, intruder detection and prevention systems; Security threats, honey pots security, incident handling; Delivery techniques, including spam, voice mail and rank manipulation; Phishing, rogue-AV, pharming, click-fraud, crime-ware, extortion and emerging attacks; Malware, botnets, criminal/phishing gangs and collaboration or money laundering; Techniques to avoid detection, tracking and takedown; Legal aspects of online fraud; Educational aspects of Internet computing and security, etc.
Topics
Topics of interest include, but are not limited to, the following: e-Activities (e-Learning, e-Communities, e-Commerce, e-Management, e-Marketing, e-Governance, e-Science, e-Health, etc.); Multimedia applications and virtual reality; Wireless and mobile computing; Cloud computing and storage; Optimization problems in telecommunications; Web applications and services security; Security solutions for virtualization; Identity, access and authorization management; Corporate virtual globes (Google Earth and Microsoft Virtual Earth); GPS, Location-Based Services; Encryption and interception of communications; Cryptographic applications; TCP/IP protocol suite security, secure routing; Secure transmission protocols; VoIP, SIP, IP telephony and WiFi security; Secure directories, e-mail, DNS, and other network services security; Firewalls, VPNs, intruder detection and prevention systems; Security threats, honey pots security, incident handling; Delivery techniques, including spam, voice mail and rank manipulation; Phishing, rogue-AV, pharming, click-fraud, crime-ware, extortion and emerging attacks; Malware, botnets, criminal/phishing gangs and collaboration or money laundering; Techniques to avoid detection, tracking and takedown; Legal aspects of online fraud; Educational aspects of Internet computing and security, etc.
Other CFPs
- International Workshop on Knowledge Computing in the Health Informatics, KCHI 2014
- 1st International Workshop on Multidimensional Systems
- 1st International Workshop on Computer science education from primary school to higher education: challenges and strategies
- The 1st South European Systems Engineering Tour
- 9th Logical and Semantic Frameworks, with Applications
Last modified: 2014-02-28 07:22:35