Explore

ICSCCC 2020

International Conference on Security in Computing and Cloud Computing 2020

London, United Kingdom
8 - 9 September 2020
The conference ended on 09 September 2020

Important Dates

Abstract Submission Deadline
10th August 2020
Final Abstract / Full Paper Deadline
20th August 2020
Registration Deadline
20th August 2020

About ICSCCC 2020

ICSCCC 2020 is an opportunity for academics, students, scholars, scientists and engineers from around the world who are involved in the study, management, development and implementation of systems and concepts to combat information warfare or to improve Security in Computing and Cloud Computing to come together and exchange ideas. This conference is trying to establish itself as a key event for the understanding of threats and risks to information systems, the development of a strong security culture, and incident investigation.

Topics

Cloud computing, Computer security, Data security, Distributed computing, Energy security, Food security, Grid computing, Information security, Mobile computing, Parallel computing, Pervasive computing, Ubiquitous computing, Wearable computing, Soft computing, Quantum computing, Previously unpublished results are solicited in all areas of theory and practice of computing, Security and conflicts resolution, Data mining and cloud computing, Soft computing and fuzzy logic, Communication security in the iot, Iot security, Fog computing, Brand safety & security, Smart cards security . image processing and computer vision: image and video processing, Current affairs of security and defence policy and various sovereignty-related issues. the roles of state and non-state actors in cooperation and conflict; concerns of territorial, Global challenges and regional security; national security and defence policies, Military strategies; security organisations; conflict transformation and conflict resolution; cyber security; economic issues; energy security; cross-border crime, And vehicle security • smart grid, Security, Grid and cloud computing, Mobile cloud computing and iot pricing and billing models, Mobile cloud computing and iot networking and communication considerations, Cloud computing and iot, Cloud computing: application and best practices, 6. cloud computing, Computing, Data mining. cloud computing, Cloud computing architecture, And trust issues cloud computing engineering applications machine learning circuits & systems communication systems & signal processing agent-based auction, Innovation of green technologies; education for sustainability; cloud computing; sustainable design; green it business; e-waste; green it infrastructure; natural resources, Cloud computing Ø renewable and non-renewable energies Ø radar and satellite communication Ø semiconductor devices Ø structural engineering, (2) cloud computing and mec in heterogenous envoriment, • cloud computing

Call for Papers

  • Cloud Computing
  • Cloud Computing Architecture and Systems
  • Cloud Computing Models, Simulations, Designs, and Paradigms
  • Cloud Management and Operations
  • Dynamic Resource Provision and Consuming
  • Cloud Computing Technologies, Services and Applications
  • Cloud Security
  • Security Evaluation and Benchmarks Based on Cloud
  • Security Policy, Security Theory and Models Based on Big Data
  • Authentication, Authorization and Reliability Issues in Cloud
  • Security and Privacy in Cloud Computing
  • Information Security and Risks Management
  • Machine Learning for Security
  • Information Hiding
  • Coverless Information Hiding
  • Steganography and Steganalysis
  • Digital Watermarking, Fingerprinting and Forensics
  • Multimedia Authentication and Encryption
  • Covert/Subliminal Channels
  • IoT Security
  • Data Security and Privacy in the IoT
  • Attacks and Countermeasures on IoT Systems
  • Trust Model, Data Aggregation and Information Sharing
  • Secure Hardware and Software for IoT
  • Application Security for IoT
  • Multimedia Forensics
  • Active and Passive Forensics
  • Big Data Forensics
  • Portable electronic device forensics
  • Network Forensics
  • Anti-forensics
  • Encryption
  • Measurements for Cybersecurity
  • Post Quantum Cybersecurity
  • Visualization for Security
  • Applied Cryptography
  • Language-based Security

Keep Up to Date with PaperCrowd

Sign up and follow your favorite conferences.

We are no longer accepting conference submissions on PaperCrowd. We apologise for any inconvenience.