Theme 1: CyberSecurity and Privacy Issues
System Security and Control, Information Security, Security and authentication, Security & Privacy in Pervasive and Ubiquitous Computing, Security & Privacy for emerging technologies, etc.
Theme 2: Securing Software Engineering
Emerging software engineering techniques for developing secure and reliable software
Theme 3: Big Data and Business Intelligence
Novel applications of data analytics in business intelligence for competitive advantages: case studies and examples are particularly welcome
Theme 4: Ubiquitous and Cloud Computing
The plethora of social media and mobile applications and related security and privacy concerns; web technologies, wireless communications, networking, etc.
Theme 5: Real-World Software Applications
Internet of Things, E-Learning, E-commerce, Computing in Energy Technology, Computing in Convergence Service/Technology, Computing in Healthcare Informatics, etc.
Theme 6: Computer Networking
IP v6, Information-centric networking (ICN) and Network Virtualization and Simulation
Topics of Interests
Submissions are welcome from across the following subject areas related to computing and information technology covered by this conference (but not limited to):
Upon receipt and review of the required proposals, if accepted, author(s) will be asked to submit a shorter summary for inclusion in the conference program. Summaries for papers, posters, and workshops should be no longer than 50 words. Summaries for colloquia and panel discussions should be no longer than 100 words.
For presenters who wish to have their manuscripts published, please submit a final version of the paper for inclusion in the conference proceedings. Full papers must be submitted by September 25, 2016.
User Name : sam
Posted 24-08-2016 on 08:36:30 AEDT