| |||||||||||||||
IEEE CSCloud 2019 : The 6th IEEE International Conference on Cyber Security and Cloud Computing | |||||||||||||||
Link: http://www.cloud-conf.net/cscloud/2019/cscloud/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
The increasing demands of Cloud-based technologies have deeply changed people’s daily life, from various kinds of mobile applications to big data based services.One of the most promising trends is the Cloud-based solutions for small enterprises to deploy their business on Cloud servers. However, privacy and security issues along with the widely developed Cloud-based services are always becoming an obstacle for the usage of the Cloud services. IEEE CSCloud 2019 focuses on these two aspects and aims to gather recent achievements in cyber security and cloud computing fields. The conference invites those papers that concentrate on new paradigms, algorithms, and applications in cyber security or cloud computing. We also encourage researchers and practitioners to build up the connections between academia and industry. We aim to collect the latest achievements and exchange research ideas in the domains of intelligent data and security at this academic event.
Topics of particular interest include, but are not limited to: - Big data security issues and cyber crime - Social engineering, insider threats, advance spear phishing - Security and fault tolerance for embedded or ubiquitous systems - Security of Web-based applications and services - Cloud users’ privacy information protection - Critical infrastructure protection in cloud/fog/edge computing - Cyber issues and solutions in fog/edge computing - Reinforcement learning-based security mechanism - Secure methods for heterogeneous cloud resource sharing - Green cloud computing mechanisms - Cloud-based audio/video streaming techniques - New attack methods and applications - Reinforcement learning-based intelligent agent in cloud computing - Trust management in cloud/fog/edge computing - Trust and reputation systems for cloud-based applications - Emerging attack methods in cloud/fog/edge computing - Digital forensics and privacy issues in cloud computing - Anti-Forensics and Anti-Anti-Forensics Techniques - Cyber monitoring approaches - Data leakage, data protection and database forensics - Identity management and fraud management - Critical issues and solutions of Cyber security in tele-health - Cyber security in mobile embedded systems - New security cloud computing model, framework, and application - Heterogeneous clouds and vulnerabilities |
|