The area of computing and communication has grown evidently since past two decades with wide ranging aspects. Computing includes designing, developing and building hardware and software systems; processing, structuring, and managing various kinds of information; doing scientific research on and with computers; making computer systems behave intelligently; and creating and using communications and entertainment media. The field of computing includes computer engineering, software engineering, computer science, information systems, information technology and the list is virtually endless, and the possibilities are vast. Communication means to share, it is the act of conveying intended meanings from one entity or group to another through the use of mutually understood signs and semiotic rules. It also has wide ranging applied areas which includes Network communication, Security etc. The conference has been sub divided into following tracks:
This track emphasizes on emerging research areas in cyber security and privacy. It includes cyber security concepts, threats in cyberspace, security standardization, security and privacy regulations and laws, cyber hacking, digital forensics, Trust management, security and privacy in blockchain technologies, intrusion detection and prevention, cyberspace protection and anti-malware, network traffic analysis, identity and access management in cyber systems, cyber threat intelligence, cryptography trends, steganography, security of cyber-physical systems and IoT, secure cloud and edge computing architectures, security of web-based applications, and cyber harmony and cyber welfare.
This track emphasizes on security in Software systems which is an active area of research for groups interested in software engineering in particular and systems engineering. It includes security aspects of software deployment, processes for the development of secure software systems, security testing, security requirements analysis and modelling, secure programming, embedded software security, object oriented analysis, continuous process modelling and improvement, security in agile software development, static and dynamic analysis for security, design and deployment of secure services, cost estimation and project planning, Web Engineering, Quality Management, and verification and assurance techniques.
This track focuses on Natural language processing, artificial intelligence, and computational linguistics with respect to the interactions between computers and human languages. It includes Genetic Algorithms, Grammatical Evolution, Differential Evolution,
Probabilistic Meta heuristic, Swarm Intelligence, Ant Colony Algorithms, Artificial Immune Systems, High Performance Computing and Computational Intelligence, Fuzzy Logic, Bayesian statistical methods, Neural Networks, Multi-Agent Systems, Stochastic Optimization, Automatic Control and Intelligent Systems, Fault Detection and Diagnosis.
This track focuses on cloud security and data analytics. It includes Cloud platforms, Cloud architectures, storage data and cloud analytics, cloud quality management and service level agreement, cloud migration, cloud virtualization and composition, high performance cloud computing, green cloud computing, economics, business and Return on Investment (ROI) models for cloud computing, innovative cloud applications, data privacy, data mining for security and privacy, Fog Computing, Dew Computing, Edge Computing, Quantum Computing , Big Data analytics, security in big data, threats on big data, big data ROI, big data storage strategies.
This track focuses on communication and security issues in networks. It will include heterogeneous networks, wireless networks, energy efficient networking, internet architecture and protocols, traffic analysis, content centric networks, trusted computing, online social networks, High-speed networks, Cloud Communication, smart grid communication and networking. It shall also focus on security & privacy in Wired, Wireless, Mobile, Hybrid, Sensor and Ad hoc networks, Vehicular Ad-hoc Network (VANETs), Flying Ad-hoc Networks (FANETs). This may also include the security models like adaptive security. Besides these, other areas shall include Intrusion Detection and Prevention, Firewalls, Packet Filters, Malware Analysis, Web and Information Security, Attacks and Defence, Communication Privacy and Anonymity, Blockchain Technologies, Circumvention and Anti-Censorship Technologies, Network and Internet Forensics Techniques, Authentication Systems, Routing protocols and Algorithms, Naming/Addressing, Network Management, VoIP, Internet-of- Things and Software-Defined Networks, Communication Engineering.
University of Illinois Urbana Champaign,
Indian Institute of Technology Bombay,
Jawaharlal Nehru University,
New Delhi, India
|Sr. No.||Registration Type||IEEE Member||Non-IEEE Member|
|1.||Academician / Researcher||₹ 3500||₹ 4000|
|2.||Student||₹ 2500||₹ 3000|
|3.||Attendees||₹ 2000||₹ 3000|
|4.||International Authors / Participants||$ 250||$ 300|
|Bank Name||State Bank of India|
Professor & Head CSE
Professor & Head CC
Associate Professor &
Associate Dean Faculty Welfare
© 2021 ICSCCC . All rights reserved | Design by Sargunjot Singh