STMWAIoT 2016 - Invitation for paper submission in special session "in Third International Conference on Computer & Communication Technologies (IC3T - 2016)" indexed by Springer
Topics/Call fo Papers
Paper Submission
Please submit your paper (in word/pdf format) at Email: manjukhari-AT-yahoo.co.in and gulshanstv-AT-gmail.com with "Security Trends in Mobile Web Analytics and IoT" (STMWAIoT' 16) mentioned in the subject line.
Security and privacy of mobile cloud computing
Security of Mobile, peer-to-peer and pervasive services in clouds
Security of Mobile commerce and mobile internet of things
Social networking security and privacy concepts and applications
Social network modeling and security issues
Information revelation and privacy in online social networks
Social networking data analysis tools and services
Machine learning to gain novel insights on social network security analysis
Security of Operating system and middleware support for mobile computing
Security of Pricing and billing for mobile cloud computing services
Security and privacy in Smartphone Devices
Security and privacy in sensor networks
Security and privacy in social applications and networks
Web service security
Security of 3G/4G systems, Wi-MAX, Ad-hoc, Petrinets
Security of Mobile social networks
Near field communication services
Security of Smart cities, smart environments and smart grid
Security of Smart transportation
Security of Smart vehicular networks
Service-oriented architectures, service portability, P2P
Network virtualization and cloud-based radio access networks
Web Forensic Computing
Security IoT Data Analytics & Platforms
Please submit your paper (in word/pdf format) at Email: manjukhari-AT-yahoo.co.in and gulshanstv-AT-gmail.com with "Security Trends in Mobile Web Analytics and IoT" (STMWAIoT' 16) mentioned in the subject line.
Security and privacy of mobile cloud computing
Security of Mobile, peer-to-peer and pervasive services in clouds
Security of Mobile commerce and mobile internet of things
Social networking security and privacy concepts and applications
Social network modeling and security issues
Information revelation and privacy in online social networks
Social networking data analysis tools and services
Machine learning to gain novel insights on social network security analysis
Security of Operating system and middleware support for mobile computing
Security of Pricing and billing for mobile cloud computing services
Security and privacy in Smartphone Devices
Security and privacy in sensor networks
Security and privacy in social applications and networks
Web service security
Security of 3G/4G systems, Wi-MAX, Ad-hoc, Petrinets
Security of Mobile social networks
Near field communication services
Security of Smart cities, smart environments and smart grid
Security of Smart transportation
Security of Smart vehicular networks
Service-oriented architectures, service portability, P2P
Network virtualization and cloud-based radio access networks
Web Forensic Computing
Security IoT Data Analytics & Platforms
Other CFPs
- International Conference ICT for Language Learning 9th edition
- 45th Annual ACM SIGPLAN Symposium on Principles of Programming Languages
- 19th ACM International Conference on Multimodal Interaction
- 19th International ACM SIGACCESS Conference on Computers and Accessibility
- 43rd Annual International Symposium on Computer Architecture
Last modified: 2016-04-27 13:24:44