Data base for:

  • Conferences
  • Research funding opportunities
  • Competitions / Awards

Register for free and add any data by yourself!

See How to

Filter conferences

International Conference on Security in Computing and Cloud Computing 2023

International Conference on Security in Computing and Cloud Computing 2023


Date of beginning

Thursday, 12 October 2023


2 days

Deadline for abstracts

Thursday, 10 August 2023







This email address is being protected from spambots. You need JavaScript enabled to view it.

Expected participants



ICSCCC 2023 is an opportunity for academics, students, scholars, scientists and engineers from around the world who are involved in the study, management, development and implementation of systems and concepts to combat information warfare or to improve Security in Computing and Cloud Computing to come together and exchange ideas. This conference is trying to establish itself as a key event for the understanding of threats and risks to information systems, the development of a strong security culture, and incident investigation. Please consider submitting to this conference. We are interested in the entire range of concepts from theory to practice, including case studies, works-in-progress, and conceptual explorations. Prospective authors are invited to submit original technical papers by the deadline for publication in the ICSCCC 2023 Conference Proceedings and for presentation(s) in the symposia listed below. Deadlines will be strictly matched and late papers will be summarily rejected. The conference welcomes papers on the following (but not limited to) research topics.   Tracks of the Conference Cloud Computing Cloud Computing Architecture and Systems Cloud Computing Models, Simulations, Designs, and Paradigms Cloud Management and Operations Dynamic Resource Provision and Consuming Cloud Computing Technologies, Services and Applications Cloud Security Security Evaluation and Benchmarks Based on Cloud Security Policy, Security Theory and Models Based on Big Data Authentication, Authorization and Reliability Issues in Cloud Security and Privacy in Cloud Computing Information Security and Risks Management Machine Learning for Security Information Hiding Coverless Information Hiding Steganography and Steganalysis Digital Watermarking, Fingerprinting and Forensics Multimedia Authentication and Encryption Covert/Subliminal Channels IoT Security Data Security and Privacy in the IoT Attacks and Countermeasures on IoT Systems Trust Model, Data Aggregation and Information Sharing Secure Hardware and Software for IoT Application Security for IoT Multimedia Forensics Active and Passive Forensics Portable Electronic Device Forensics Big Data Forensics Network Forensics Anti-Forensics Encryption Measurements for Cybersecurity Post Quantum Cybersecurity Visualization for Security Applied Cryptography Language-based Security Security, Privacy in E-Commerce