International Conference on Security in Computing and Cloud Computing 2020


ICSCCC 2020 is an opportunity for academics, students, scholars, scientists and engineers from around the world who are involved in the study, management, development and implementation of systems and concepts to combat information warfare or to improve Security in Computing and Cloud Computing to come together and exchange ideas. This conference is trying to establish itself as a key event for the understanding of threats and risks to information systems, the development of a strong security culture, and incident investigation.
Please consider submitting to this conference. We are interested in the entire range of concepts from theory to practice, including case studies, works-in-progress, and conceptual explorations.
Prospective authors are invited to submit original technical papers by the deadline for publication in the ICSCCC 2020 Conference Proceedings and for presentation(s) in the symposia listed below. Deadlines will be strictly matched and late papers will be summarily rejected. The conference welcomes papers on the following (but not limited to) research topics.

Tracks of the Conference

  • Cloud Computing
  • Cloud Computing Architecture and Systems
  • Cloud Computing Models, Simulations, Designs, and Paradigms
  • Cloud Management and Operations
  • Dynamic Resource Provision and Consuming
  • Cloud Computing Technologies, Services and Applications
  • Cloud Security
  • Security Evaluation and Benchmarks Based on Cloud
  • Security Policy, Security Theory and Models Based on Big Data
  • Authentication, Authorization and Reliability Issues in Cloud
  • Security and Privacy in Cloud Computing
  • Information Security and Risks Management
  • Machine Learning for Security
  • Information Hiding
  • Coverless Information Hiding
  • Steganography and Steganalysis
  • Digital Watermarking, Fingerprinting and Forensics
  • Multimedia Authentication and Encryption
  • Covert/Subliminal Channels
  • IoT Security
  • Data Security and Privacy in the IoT
  • Attacks and Countermeasures on IoT Systems
  • Trust Model, Data Aggregation and Information Sharing
  • Secure Hardware and Software for IoT
  • Application Security for IoT
  • Multimedia Forensics
  • Active and Passive Forensics
  • Big Data Forensics
  • Portable electronic device forensics
  • Network Forensics
  • Anti-forensics
  • Encryption
  • Measurements for Cybersecurity
  • Post Quantum Cybersecurity
  • Visualization for Security
  • Applied Cryptography
  • Language-based Security
This website uses cookies. By continuing to browse you agree to this and Conferize's terms of service.