ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

SSCC 2016 - Fourth International Symposium on Security in Computing and Communications (SSCC’16)

Date2016-09-21 - 2016-09-24

Deadline2016-04-30

VenueJaipur, India India

Keywords

Website

Topics/Call fo Papers

Fourth International Symposium on Security in Computing and Communications (SSCC’16)
September 21-24, 2016, Jaipur, India
http://acn-conference.org/sscc2016/
---
SSCC’16 aims to provide the most relevant opportunity to bring together researchers and practitioners from both academia and industry to exchange their knowledge and discuss their research findings. SSCC'16 will be held in Jaipur, India. Jaipur is a major tourist attraction in India and belongs to the tourist Golden Triangle of Delhi, Jaipur and Agra. SSCC 2016 is co-affiliated with the First International Conference on Applied Soft computing and Communication Networks (ACN'16). The Symposium will feature plenary/keynote talks, workshops, demonstrations, parallel technical sessions and tutorials.
All accepted papers will be published by Springer in Communications in Computer and Information Science Series(CCIS). The proceedings will be available via the SpringerLink digital library. The volumes of this series are submitted for inclusion to the leading indexing services including DBLP, Google Scholar, EI-Compendex, Mathematical Reviews, SCImago, and Scopus. CCIS volumes are also submitted for the inclusion in ISI Proceedings. The current SCImago Journal Rank (SJR) of CCIS is 0.15
The program committee solicits previously unpublished papers offering novel research contributions in any aspect of security in computing and communications. The topics of interests include, but are not limited to:
Anti-Forensics Techniques
Application Security
Authentication and Access Control Systems
Critical Infrastructure Protection
Cyber Warfare Trends and Approaches
Denial-of-Service Attacks and Countermeasures
Digital Forensics
Digital Rights Management
Distributed and Pervasive Systems Security
Embedded Systems Security
Enterprise Systems Security
Executable Content and Content Filtering
File and Files System Security
Fraud Management
Hardware Security
Human-Computer Interaction and Security
Identity Management
Intellectual Property Protection
Key Distribution and Management
Mobile System Security
Multimedia and Document Security
Network Infrastructure Security
Operating Systems and Database Security
Peer-to-Peer Security
Secure Communications and Information Flow
Secure Sensor Networks
Security for Grid Computing
Security in Cloud Computing/Social Networks
Security in e-services
Security of Web-Based Applications
Surveillance Systems
Accountability
Anonymity
Analysis of Network and Security Protocols
Authorship Analysis
Biometrics Standards and Standardization
Border Security
Business Continuity & Disaster Recovery Planning
Crowd Management
Emergency Response and Management
Encryption and Cryptography
Forecasting Terrorism
Incident Handling and Penetration Testing
Information Hiding
Intrusion and Anomaly Detection and Prevention
Investigation of Insider Attacks
Language-Based Security
Malware Forensics and Anti-Malware Techniques
Protocol Security
Secure Software Development
Security Architectures
Security Metrics
Self-Protecting and Self-Healing Systems
Social Engineering
Social Network Analysis
Template Protection and Liveliness Detection
Threats, Vulnerabilities, and Risk Management
Economics of Security
Laws and Regulations/Legal Issues
Security Policies and Trust Management
Security Education and Training
New Threats and Non-Traditional Approaches
Theories, Methods and Tools in Managing Security
Important Dates
---
Full Paper Submission Ends: April 30, 2016
Acceptance Notification: June 30, 2016
Final Paper Deadline: July 31, 2016
Special Sessions and Workshops (Submission Deadline: May 31, 2016)
---
Special Session on Cloud Security and Cryptography
Workshop on Security in Self-Organizing Networks (SelfNet'16)
Workshop on Intelligence and Security Informatics for International Security (IIS'16)
Workshop on Multidisciplinary Perspectives in Cryptology and Information Security (CIS-2016).

Last modified: 2016-03-02 23:38:37