ICCNS 2014 - International Conference on Communication and Networking Security 2014
Date2014-06-13 - 2014-06-15
Deadline2014-05-15
VenueHammamet, Tunisia
Keywords
Websitehttps://www.wscnis.org
Topics/Call fo Papers
The topics of the ICCNS'2014 include, but not limited to, the following:
? Communications and Networks
? Optical Networking
? Pervasive Computing & Mobile Networking
? QoS Control & Traffic Modeling
? Cross-Layer Design and Optimization
? Signal Processing for Communications
? Network Security
? Cognitive Radio Networks
? Communication and Information Theory
? Internet Services and Applications
? Multimedia Networking
? Networking Algorithms and Performance Evaluation
? Future Internet Architectures and Protocols
? Wireless Sensor Networks: Platforms, Systems, Architectures and Applications
? 3G and 4G Beyond
? Wireless Platform: Applications and Testbeds
? Protocols and Algorithms for Wireless Networks
? Networks Security
? Trusted Computing
? Intrusion Detection and Prevention
? Biometric Security and Artificial Intelligence
? Cryptography and security protocols
? Authentication and Identification
? Bayesian Networks, Fuzzy and Rough Set
? Mobile System Security
? Ubiquitous Computing Security
? Sensor and Mobile Ad Hoc Network Security
? Security in Wireless Network
? Security of GSM/GPRS/UMTS systems
? Security for Grid Computing
? Security for Web Services
? Security for Personal Data and Databases
? Peer-to-Peer Security
? Risk Assessment
? Forecasting Terrorism
? Denial of Service and other attacks
? Management of Computing Security
? Intelligent Multimedia Security Services
? Knowledge Discovery and Data Mining
? E-commerce protocols
? E-Health
? Communications and Networks
? Optical Networking
? Pervasive Computing & Mobile Networking
? QoS Control & Traffic Modeling
? Cross-Layer Design and Optimization
? Signal Processing for Communications
? Network Security
? Cognitive Radio Networks
? Communication and Information Theory
? Internet Services and Applications
? Multimedia Networking
? Networking Algorithms and Performance Evaluation
? Future Internet Architectures and Protocols
? Wireless Sensor Networks: Platforms, Systems, Architectures and Applications
? 3G and 4G Beyond
? Wireless Platform: Applications and Testbeds
? Protocols and Algorithms for Wireless Networks
? Networks Security
? Trusted Computing
? Intrusion Detection and Prevention
? Biometric Security and Artificial Intelligence
? Cryptography and security protocols
? Authentication and Identification
? Bayesian Networks, Fuzzy and Rough Set
? Mobile System Security
? Ubiquitous Computing Security
? Sensor and Mobile Ad Hoc Network Security
? Security in Wireless Network
? Security of GSM/GPRS/UMTS systems
? Security for Grid Computing
? Security for Web Services
? Security for Personal Data and Databases
? Peer-to-Peer Security
? Risk Assessment
? Forecasting Terrorism
? Denial of Service and other attacks
? Management of Computing Security
? Intelligent Multimedia Security Services
? Knowledge Discovery and Data Mining
? E-commerce protocols
? E-Health
Other CFPs
- International Conference on Symposium on Cloud Computing 2014
- International Conference on Soft Computing-Artificial Intelligence and Applications 2014
- International Conference on Educational and Information Technology 2014
- International Conference on Intelligent Robots and Systems 2014
- International Conference on Internet Technologies and Applications 2014
Last modified: 2014-05-04 23:00:43