posted by user: ymalik || 5723 views || tracked by 5 users: [display]

ISDDC 2018 : International Conference on Intelligent, Secure and Dependable Systems in Distributed and Cloud Environments

FacebookTwitterLinkedInGoogle

Link: http://isddc.org/2018/index.html
 
When Nov 28, 2018 - Nov 30, 2018
Where Vancouver, B.C, Canada
Submission Deadline Jul 20, 2018
Notification Due Aug 20, 2018
Final Version Due Sep 15, 2018
Categories    computer science   security   cloud computing   distributed systems
 

Call For Papers

This conference solicits papers addressing issues related
to the design, analysis, and implementation, of dependable
and secure infrastructures, systems, architectures, algorithms,
and protocols that deal with network computing, mobile/ubiquitous
systems, cloud systems, and IoT systems.

We invite papers on the following topics:
• Intelligent secure mobile systems
• Modern and Emerging Authentication Paradigms
• Biometric Technologies
• Digital Fraud detection, social engineering and insider threats
• Cyber threat intelligence
• Privacy, Security, and Trust for Cloud, Mobile, and Internet-of-Things
• Intrusion and anomaly detection and prevention for mobile, cloud and IoT platforms
• Digital forensics Cloud, Mobile, and Internet-of-Things?
• Emerging Threats, Botnet and Distributed Denial of Service (DDoS) detection and control
• Dependable Cluster/cloud/ubiquitous computing and Grid Computing for mobile applications
• Dependable Distributed data mining for mobile applications
• Cryptographic primitives for wireless and mobile security
• Security and privacy for mobile sensing systems
• Wireless or mobile security for emerging applications
• Security protocols for wireless networking
• Mobile malware and platform security
• Distributed Systems Security
• Embedded Systems Security
• Security architectures for cloud computing
• Security protocols for cloud computing?
• Identity management for cloud services
• Information sharing and data protection in the cloud
• Trust models for cloud services
• Hardware security
• Secure computer architectures
• Methods for detection of malicious or counterfeit hardware?

Related Resources

ICDLT--ACM, Ei, Scopus 2022   ACM--2022 6th International Conference on Deep Learning Technologies (ICDLT 2022)--Ei Compendex, Scopus
S&P 2022   IEEE Symposium on Security and Privacy (Third deadline)
WSAI--IEEE, Ei and Scopus 2022   IEEE--2022 the 4th World Symposium on Artificial Intelligence (WSAI 2022)--Ei Compendex, Scopus
ICCSEA 2021   11th International Conference on Computer Science, Engineering and Applications
ICCIA--IEEE, Ei, Scopus 2022   IEEE--2022 7th International Conference on Computational Intelligence and Applications (ICCIA 2022)--EI Compendex, Scopus
EI-CFAIS 2021   2021 International Conference on Frontiers of Artificial Intelligence and Statistics (CFAIS 2021)
ACM--HPCCT--EI, Scopus 2022   ACM--2022 6th High Performance Computing and Cluster Technologies Conference (HPCCT 2022)--EI Compendex, Scopus
ACM-Ei/Scopus-KDML 2021   2021 International Conference on Knowledge Discovery and Machine Learning (KDML 2021)
ACM DADS 2022   ACM Dependable, Adaptive, and Secure Distributed Systems
SIUSAI 2022   2022 International Symposium on Intelligent Unmanned Systems and Artificial Intelligence (SIUSAI 2022)