The 12th International Conference for Internet Technology and Secured Transactions (ICITST-2017) is Technically Co-Sponsored by IEEE UK and RI Computer Chapter. The ICITST-2017 will be held at the University of Cambridge, UK, from the 11th to 14th of December, 2017.
The ICITST is an international refereed conference dedicated to the advancement of theory and practical implementation of secured Internet transactions and to fostering discussions on information technology evolution.
The ICITST-2017 aims to provide a highly professional and comparative academic research forum that promotes collaborative excellence between academia and industry.
Who should attend the ICITST?
Undergraduates, Graduates/Postgraduates, researchers and Professionals who are working or studying Internet Security, Cyber Security, Information Security, Smart Cities, Access Control, Biometric System, Computer Forencis, Information Technology, Computer Science Laboratory, Ubi/Cloud Computing, Cloud Security, Internet Application and Technology, Multimedia and Web Services.
Professionals and researchers responsible for security governance of information, IT security, researchers in organizations that deploy compliance of cybersecurity standards and guidelines.
The information securty engineers, technicians, IT security professionals, IT management, automation and control project managers, IT security auditors, compliance officers, cybersecurity planners, critical infrastructure protection specialists; vendors and assessors of security solutions.
What you can expect at this year’s conference
We listened to all the great feedback we received from last year’s attendees and have incorporated some of their suggestions into ICITST-2017. Explore highly relevant sessions, led by industry’s and academic top experts. The sessions will giving you the ability to dive deeper into a topic, ask more questions and interact more with presenters. Attend Keynotes. Be inspired by presentations from thought leaders representing a wide range of disciplines within and outside the cyber security. Share a common interest to explore a specific security topic.
Cyber Security and Cyber warfare
Surveillance Systems
Cyber Warfare Trends and Approaches
Social engineering
Template Protection and Liveliness detection
New theories and algorithms in biometrics
Formal Methods Application in Security
Operating Systems and Database Security
nterprise Systems Security
SCADA and Embedded systems security
Distributed and Pervasive Systems Security
Secure Software Development
Situational Awareness Assessments
Social Media Analysis
Collaborative Defense Approach
Risk Management, Governance and Compliance
Cyber Situational Awareness Tools & Techniques
Network Situational Awareness
National and Critical Infrastructure Security Issues
Situation Awareness in Military Operations
Internet Applications and Technology
Internet Technologies
Internet Architecture
Internet of Things (IoT)
Broadband Access Technologies
Application Agents
Boundary Issues of Internet Security
Database Management
Data Models for Production Systems and Services
Artificial Intelligence and Expert Systems
IPSec Quality of Service
Knowledge Management
Embedded Systems
Defence Systems
Multimedia and Web Services
DIntelligent Multimedia
Multimedia Information Systems
Multimedia Security
Web Databases
Web Metrics and its Applications
Web Mining and Web Intelligence
Web Services
XML and other extensible languages
Semantic Web and Ontology
Intelligent Learning and Teaching Systems
Large-Scale Enterprise Design Architecture
Resource Management
Infonomics and e-Technology
Infonomics
Information Visualization
Information Management
Information Quality
Technology-Enabled Information
e-Learning
e-Commerce
e-Business
e-Government
e-Society
System Design and Security for e-Services
Synchronizing e-Security
Capabilities for Enterprise Fraud Management
Transactional Fraud
Endpoint Transactional Monitoring
Web Fraud Detection
Database Security
Application Security
Border Protection and Controls
Cloud Security
Secure Virtual Infrastructure and Private Cloud
Cryptographic Enforcement of Multi-Tenancy
Cloud Requirements for PaaS and SaaS
Security Policy and Privacy Requirements
CloudAudit Protocol
Corporate Governance
Laws and Regulations
Threats, Vulnerabilities, and Risk Management
Disaster Recovery Planning
Critical Infrastructure Protection
Digital Rights Management
Security Policies and Trust Management
Identity Management
Ubi/Cloud Computing
Big Data
Data Protection in Ubi/Cloud Computing
Context-Awareness and its Data Mining for UbiCom
Data Grids
Distributed Information Systems
HCI and Interaction for UbiCom
Ubiquitous Systems
USN/RFID Service
Smart Homes and its Business Model for UbiCom Service
Security and Data Management for UbiCom
Peer to Peer Data Management
Application for Ubi/Cloud Computing
Mobile Devices
Information Security
Collaborative Learning
Trust, Privacy and Data Security
Network Security Issues and Protocols
Security Challenges and Content Authoring
Cryptography
Secure Communications
Authentication Techniques
Chaos-based Data Security
MANET Security
Wireless Sensor Network Security
Security Policy Formulation and Implementations
Digital Forensics and Crimes
Biometrics
Security Incident Analysis
Security Information Visualisation
Big Data
Open Source Applications
Interoperability
Decidability and Complexity
Digital Forensics
Data leakage and Database Forensics
Forensics of Virtual and Cloud Environments
Network Forensics and Traffic Analysis
Information Hiding and Fraud Management
File System and Memory Analysis
Executable Content and Content Filtering
Anti-Forensics Techniques
Malware Forensics
Evidentiary Aspects of Digital Forensics
Large-Scale Investigations
New threats and Non-Traditional Approaches
Incident Handling and Penetration Testing
Economics of Security
Wireless and Sensor Networks
Wireless Networking and Communication
WiFi Protocols and Standards
Trends in Wireless Communications
Wireless Security Standards and Mechanisms
Sensor Networks (Sensornet)
Ad hoc wireless Sensor Networks
Security of Sensor Networks and Protocols
Operations of Sensor Networks
RFID / USN Key Update Mechanisms
Quality of Service
Research in Progress
Ongoing and Collaborative Research, Future Technologies…
09月19日
2017
09月22日
2017
摘要截稿日期
摘要录用通知日期
初稿截稿日期
初稿录用通知日期
终稿截稿日期
注册截止日期
留言