征稿已开启

查看我的稿件

注册已开启

查看我的门票

已截止
活动简介

The 12th International Conference for Internet Technology and Secured Transactions (ICITST-2017) is Technically Co-Sponsored by IEEE UK and RI Computer Chapter. The ICITST-2017 will be held at the University of Cambridge, UK, from the 11th to 14th of December, 2017.

The ICITST is an international refereed conference dedicated to the advancement of theory and practical implementation of secured Internet transactions and to fostering discussions on information technology evolution.

The ICITST-2017 aims to provide a highly professional and comparative academic research forum that promotes collaborative excellence between academia and industry.

Who should attend the ICITST?

  • Undergraduates, Graduates/Postgraduates, researchers and Professionals who are working or studying Internet Security, Cyber Security, Information Security, Smart Cities, Access Control, Biometric System, Computer Forencis, Information Technology, Computer Science Laboratory, Ubi/Cloud Computing, Cloud Security, Internet Application and Technology, Multimedia and Web Services.

  • Professionals and researchers responsible for security governance of information, IT security, researchers in organizations that deploy compliance of cybersecurity standards and guidelines.

  • The information securty engineers, technicians, IT security professionals, IT management, automation and control project managers, IT security auditors, compliance officers, cybersecurity planners, critical infrastructure protection specialists; vendors and assessors of security solutions.

What you can expect at this year’s conference

We listened to all the great feedback we received from last year’s attendees and have incorporated some of their suggestions into ICITST-2017. Explore highly relevant sessions, led by industry’s and academic top experts. The sessions will giving you the ability to dive deeper into a topic, ask more questions and interact more with presenters. Attend Keynotes. Be inspired by presentations from thought leaders representing a wide range of disciplines within and outside the cyber security. Share a common interest to explore a specific security topic.

征稿信息

重要日期

2017-06-15
摘要截稿日期
2017-06-25
摘要录用日期
2017-06-30
初稿截稿日期
2017-07-15
初稿录用日期
2017-09-10
终稿截稿日期

征稿范围

Cyber Security and Cyber warfare

  • Surveillance Systems

  • Cyber Warfare Trends and Approaches

  • Social engineering

  • Template Protection and Liveliness detection

  • New theories and algorithms in biometrics

  • Formal Methods Application in Security

  • Operating Systems and Database Security

  • nterprise Systems Security

  • SCADA and Embedded systems security

  • Distributed and Pervasive Systems Security

  • Secure Software Development

  • Situational Awareness Assessments

  • Social Media Analysis

  • Collaborative Defense Approach

  • Risk Management, Governance and Compliance

  • Cyber Situational Awareness Tools & Techniques

  • Network Situational Awareness

  • National and Critical Infrastructure Security Issues

  • Situation Awareness in Military Operations

Internet Applications and Technology

  • Internet Technologies

  • Internet Architecture

  • Internet of Things (IoT)

  • Broadband Access Technologies

  • Application Agents

  • Boundary Issues of Internet Security

  • Database Management

  • Data Models for Production Systems and Services

  • Artificial Intelligence and Expert Systems

  • IPSec Quality of Service

  • Knowledge Management

  • Embedded Systems

  • Defence Systems

Multimedia and Web Services

  • DIntelligent Multimedia

  • Multimedia Information Systems

  • Multimedia Security

  • Web Databases

  • Web Metrics and its Applications

  • Web Mining and Web Intelligence

  • Web Services

  • XML and other extensible languages

  • Semantic Web and Ontology

  • Intelligent Learning and Teaching Systems

  • Large-Scale Enterprise Design Architecture

  • Resource Management

Infonomics and e-Technology

  • Infonomics

  • Information Visualization

  • Information Management

  • Information Quality

  • Technology-Enabled Information

  • e-Learning

  • e-Commerce

  • e-Business

  • e-Government

  • e-Society

  • System Design and Security for e-Services

  • Synchronizing e-Security

  • Capabilities for Enterprise Fraud Management

  • Transactional Fraud

  • Endpoint Transactional Monitoring

  • Web Fraud Detection

  • Database Security

  • Application Security

  • Border Protection and Controls

Cloud Security

  • Secure Virtual Infrastructure and Private Cloud

  • Cryptographic Enforcement of Multi-Tenancy

  • Cloud Requirements for PaaS and SaaS

  • Security Policy and Privacy Requirements

  • CloudAudit Protocol

  • Corporate Governance

  • Laws and Regulations

  • Threats, Vulnerabilities, and Risk Management

  • Disaster Recovery Planning

  • Critical Infrastructure Protection

  • Digital Rights Management

  • Security Policies and Trust Management

  • Identity Management

Ubi/Cloud Computing

  • Big Data

  • Data Protection in Ubi/Cloud Computing

  • Context-Awareness and its Data Mining for UbiCom

  • Data Grids

  • Distributed Information Systems

  • HCI and Interaction for UbiCom

  • Ubiquitous Systems

  • USN/RFID Service

  • Smart Homes and its Business Model for UbiCom Service

  • Security and Data Management for UbiCom

  • Peer to Peer Data Management

  • Application for Ubi/Cloud Computing

  • Mobile Devices

Information Security

  • Collaborative Learning

  • Trust, Privacy and Data Security

  • Network Security Issues and Protocols

  • Security Challenges and Content Authoring

  • Cryptography

  • Secure Communications

  • Authentication Techniques

  • Chaos-based Data Security

  • MANET Security

  • Wireless Sensor Network Security

  • Security Policy Formulation and Implementations

  • Digital Forensics and Crimes

  • Biometrics

  • Security Incident Analysis

  • Security Information Visualisation

  • Big Data

  • Open Source Applications

  • Interoperability

  • Decidability and Complexity

Digital Forensics

  • Data leakage and Database Forensics

  • Forensics of Virtual and Cloud Environments

  • Network Forensics and Traffic Analysis

  • Information Hiding and Fraud Management

  • File System and Memory Analysis

  • Executable Content and Content Filtering

  • Anti-Forensics Techniques

  • Malware Forensics

  • Evidentiary Aspects of Digital Forensics

  • Large-Scale Investigations

  • New threats and Non-Traditional Approaches

  • Incident Handling and Penetration Testing

  • Economics of Security

Wireless and Sensor Networks

  • Wireless Networking and Communication

  • WiFi Protocols and Standards

  • Trends in Wireless Communications

  • Wireless Security Standards and Mechanisms

  • Sensor Networks (Sensornet)

  • Ad hoc wireless Sensor Networks

  • Security of Sensor Networks and Protocols

  • Operations of Sensor Networks

  • RFID / USN Key Update Mechanisms

  • Quality of Service

Research in Progress

  • Ongoing and Collaborative Research, Future Technologies…

留言
验证码 看不清楚,更换一张
全部留言
重要日期
  • 会议日期

    09月19日

    2017

    09月22日

    2017

  • 06月15日 2017

    摘要截稿日期

  • 06月25日 2017

    摘要录用通知日期

  • 06月30日 2017

    初稿截稿日期

  • 07月15日 2017

    初稿录用通知日期

  • 09月10日 2017

    终稿截稿日期

  • 09月22日 2017

    注册截止日期

主办单位
IEEE Advancing Technology for Humanity
移动端
在手机上打开
小程序
打开微信小程序
客服
扫码或点此咨询