International Conference on Cyber Security and Connected Technologies (ICCSCT)

February 3rd, 2020

Get Alerts To Events Like This

 February 3rd, 2020 - February 4th, 2020 

International Conference on Cyber Security and Connected Technologies (ICCSCT)

Event submitted on Monday, July 22nd 2019, approved by Content Team

This Event is Now Over
February 3rd, 2020 - February 4th, 2020
Japan » 
Event Website

This event has been tagged as follows:

 Our Review

We encourage practitioners who are interested in cybersecurity and technologies to submit their papers to this event. Since there’s a wide range of topics to choose from, you’ll have a bigger chance of getting selected to share your knowledge and expertise in the field.

- Review written by Henry Dalziel on Monday, July 22nd 2019.
- If you would like to edit or ammend facts in my review please either send us a message or connect with me via LinkedIn.

Conference Event Summary

The following description was either submitted by the Conference Organizer on Monday, July 22nd 2019, or created by us.

ICCSCT is a chance for students, academics, scientists, scholars, and engineers from around the globe who are involved in the study, management, development, and implementation of systems and concepts to combat information warfare or to improve Cyber Security and Connected Technologies to come together to share and exchange ideas. This conference is trying to establish itself as a key event for the understanding of threats and risks to information systems, the development of strong security culture, and incident investigation.

The event is interested in the entire range of concepts from theory to practice, including case studies, works-in-progress, and conceptual explorations.

Prospective authors are invited to submit original technical papers by the deadline for publication in the ICCSCT Conference Proceedings. Deadlines will be strictly matched and late papers will be summarily rejected. The conference welcomes papers on the following (but not limited to) research topics.

  • Database Security
  • Big Data Techniques in Cyber Security
  • Digital Signature Techniques
  • Forensic Analysis of Cyber Crimes
  • Secure User Authentication
  • Spam Protection
  • Advance Persistent Threat
  • Secret Sharing
  • Key Management
  • Security in Mobile Networks
  • Hardware Security
  • Cloud Security
  • Cyber-Physical System
  • Network Protocols
  • Next-generation Communication Networks
  • Mobile & Ubiquitous Communication Networks
  • Mobile Cloud
  • Cloud and Systems Management
  • Cloud Computing and Networking
  • Internet Technologies
  • Information-Centric Networking
  • Big Data Communication and Analytics
  • Data Network Management
  • Data as a Service
  • Data Sharing and Infrastructures
  • Network Architectures
  • Modeling & Simulation of communication networks and Systems
  • Network Monitoring and Control
  • Traffic Measurement, Analysis, Modeling and Visualization
  • Quality of Service (QoS)
  • Routing and Flow Control in LANs, WANs and PANs
  • Sensor Nets and Embedded Systems
  • Network applications (web, multimedia streaming, gaming, etc.)
  • Social Computing and Networks
  • Software-Defined Networking
  • Network Security
  • Authentication Systems: Public Key Infrastructures, Key Management, Credential Management
  • Secure Routing, Naming/Addressing, Network Management
  • Security & Privacy in Pervasive and Ubiquitous Computing, e.g., RFIDs
  • Security & Privacy in Peer-to-Peer and Overlay Networks
  • Security & Privacy for Emerging Technologies: VoIP, Internet-of-Things, Social Networks
  • Security & Isolation in Cloud, Data Center and Software-Defined Networks
  • Algorithm and Applications
  • Artificial Intelligence
  • Biomechatronics
  • Business Data
  • Communication Networks and Protocols
  • Cyber Crime and Laws
  • Database Technologies
  • Data Transmission
  • Distributed and Parallel Computing
  • Fundamentals of Automation and Robotics
  • Hardware Design and Implementation
  • Information Security and Information Management
  • Mechatronics Systems in Robotics
  • Mobile Computing
  • Multimedia Communications and Graphics Technologies
  • Navigation
  • Operating Systems
  • Optimization Techniques
  • Sensors and Actuators
  • Simulation and Modeling
  • Soft Computing
  • Wireless Sensor Networks

Submit a review for this event.

Did you attend International Conference on Cyber Security and Connected Technologies (ICCSCT)? Let us know how it was and share your experience with the greater community.