ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

CCT 2015 - Third International Conference on Cyberspace Technology

Date2015-10-17 - 2015-10-18

Deadline2015-08-15

VenueBeijing, China China

Keywords

Websitehttps://rics.ustb.edu.cn/huiyi/index.php

Topics/Call fo Papers

CCT2015-The Third International Conference on Cyberspace Technology
This Conference will be found to be an excellent forum for cyberspace scholars and professionals around the world to present, discuss and exchange views and experiences about recent developments in the area of cyberspace studies. It will also provide the opportunities of exploring key issues, innovative technologies, and future prospects for cyberspace studies. All the accepted papers will be considered indexing by EI and ISTP. High-quality Papers selected from the conference will be published by several international journals (SCI/EI).
TOPICS
The manuscripts cover the areas of novel algorithms, architectures, implementations and experiences. Papers will be accepted based on peer review and should contain original, high quality work. The topics include but are not limited to:
Track I: New Network Technologies
Ø Cloud Computing
Ø Fog Computing
Ø Big Data
Ø The Internet of Things
Ø Software Defined Network
Track II: Cyberspace related Virtual Reality Technology
Ø Visualization
Ø Presence and Cognition
Ø User Studies and Evaluation
Ø Computer Graphics Techniques
Ø Modeling and Simulation
Track III: Cyberspace Related Information Assurance
Ø The Applications of Biometrics in Cyberspace
Ø Digital Rights Management
Ø Intellectual Property Protection
Ø The Mechanism of Authentication and Access Control
Ø Identification Assurance in Cyberspace
Ø Decidability and Complexity of Cyberspace
Track IV: Cyberspace Related Security Management
Ø Disaster Monitor and Recovery
Ø Management of Security and Trust Policies
Ø Cyberspace Infrastructure Protection
Ø Management of Risk, Threats, Vulnerabilities
Ø The Cyberspace Surveillance Systems
Track V: Cyberspace Related Electromagnetic Fields
Ø Electromagnetic Attack and Defense Techniques
Ø Target Finding Techniques
Ø Electromagnetic Invisibility Techniques
Ø Techniques related to Countermeasures
Ø Theoretical Electromagnetic models
Track VI: Cyberspace Warfare
Ø The Law Of Cyberspace Warfare
Ø Cyberspace Weapon
Ø Cyberspace Intrusion
Ø Cyberspace Troops
Track VII: Cyberspace Evolution (Published in a book)
? The Background of Cyberspace
? The Definition of Cyberspace
? The Present of Cyberspace
? The Development of Cyberspace
? The Future of Cyberspace
? The Future Network
? The Wisdom Network
? The Embedded System
Track VIII: Cyberspace Related Laws and Regulations (Published in a book)
? Telecommunications Regulation
? Cyberspace Sovereignty
? Cyberspace Hooliganism
? Cyberspace Terriorism
? Sovereignty and Jurisdiction
? Cyberspace Stalking
PUBLICATION
From Track I to Track VI,all papers presented at the conference will be reviewed by the IET for publication. Those that are accepted will be published on the IET Digital Library and IEEE Xplore, indexed by IET Inspec and submitted to EI Compendex for consideration for indexing. From Track VII to Track VIII, all papers will be published in a book. High-quality Papers selected from the conference will be published by several international journals (SCI/EI) after extending more than 40%

Last modified: 2015-05-23 14:30:12