The International Conference on Cyber Security and Connected Technologies (ICCSCT 2025) is dedicated to academics, students, scholars, scientists and engineers from around the world.
Topics
- Big Data Techniques in Cyber Security
- Database Security
- Forensic Analysis of Cyber Crimes
- Digital Signature Techniques
- Spam Protection
- Secure User Authentication
- Secret Sharing
- Advance Persistent Threat
- Security in Mobile Networks
- Key Management
- Cloud Security
- Hardware Security
- Network Protocols
- Cyber Physical System
- Mobile & Ubiquitous Communication Networks
- Next-generation Communication Networks
- Cloud and Systems Management
- Mobile Cloud
- Internet Technologies
- Cloud Computing and Networking
- Big Data Communication and Analytics
- Information-Centric Networking
- Data as a Service
- Data Network Management
- Network Architectures
- Data Sharing and Infrastructures
- Network Monitoring and Control
- Modeling & Simulation of communication networks and Systems
- Quality of Service (QoS)
- Traffic Measurement, Analysis, Modeling and Visualization
- Sensor Nets and Embedded Systems
- Routing and Flow Control in LANs, WANs and PANs
- Social Computing and Networks
- Network applications (web, multimedia streaming, gaming, etc.)
- Network Security
- Software-Defined Networking
- Secure Routing, Naming/Addressing, Network Management
- Authentication Systems: Public Key Infrastructures, Key Management, Credential Management
- Security & Privacy in Peer-to-Peer and Overlay Networks
- Security & Privacy in Pervasive and Ubiquitous Computing, e.g., RFIDs
- Security & Isolation in Cloud, Data Center and Software-Defined Networks
- Security & Privacy for Emerging Technologies: VoIP, Internet-of-Things, Social Networks
- Artificial Intelligence
- Algorithm and Applications
- Business Data
- Biomechatronics
- Cyber Crime and Laws
- Communication Networks and Protocols
- Data Transmission
- Database Technologies
- Fundamentals of Automation and Robotics
- Distributed and Parallel Computing
- Information Security and Information Management
- Hardware Design and Implementation
- Mobile Computing
- Mechatronics Systems in Robotics
- Navigation
- Multimedia Communications and Graphics Technologies
- Optimization Techniques
- Operating Systems
- Simulation and Modeling
- Sensors and Actuators
- Wireless Sensor Networks
- Soft Computing