e
iCATccT2017
 

Original contributions based on the results of research and developments are solicited. Prospective authors are requested to submit their papers in not more than 6 pages, prepared in the two column IEEE format. All the accepted and presented papers will be published in the form of e-proceedings in USB.

ICGCIoT takes plagiarism very seriously and regard plagiarism as a professional misconduct. Papers will be screened for plagiarism and when identified the paper will be rejected. In addition all authors of the paper will be denied to the conference and other papers by these author(s) will also be rejected. When paper accepted, ICGCIoT don't encourage with-drawals meaning it should not be submitted with the intention to get the reviews by the TPC.

  • Access Control

  • Accountability

  • Ad Hoc Networks

  • Anonymity

  • Applied Cryptography

  • Attacks and Viral Software

  • Authentication and Delegation

  • Biometrics

  • Database Security

  • Digital Content Protection

  • SAAS

  • Security Architectures

  • Security Economics

  • Security Models

  • Security and Privacy Policies

  • Security in Location Services

  • Security in Social Networks

Special Sessions
  • Cloud Security

  • Counter measures

  • Disaster Recovery

  • Enterprise Security

  • Exploit Techniques

  • Identity Management

  • Mobile Security

  • New Software Releases

  • Privacy Laws

  • Reverse Engineering

  • Science of Security

  • Secure Coding Practices

  • Security Software

  • Security Standards

  • Technology Demonstrations

  • Vulnerability Management

Papers from other topics relevant to Session on Research in Computer Security are also welcome.

Submission of papers shall be through conference website.

 
 
 
 
 
Copyright © 2018 iCATccT2018. All rights reserved. Powered by Research Publishing Services (RPS)