Sixth International Symposium on Security in Computing and Communications 

September 19-22, 2018, Bangalore, India

Submission Deadline: June 8, 2018
EDAS Submission Link:

Proceedings by Springer in Communications in Computer and Information
Science Series(CCIS)


SSCC'18 aims to provide the most relevant opportunity to bring
together researchers and practitioners from both academia and industry
to exchange their knowledge and discuss their research findings. The
program committee solicits previously unpublished papers offering
novel research contributions in any aspect of security in computing
and communications for the main track and special sessions:

Main Track
Anti-Forensics Techniques
Application Security
Authentication and Access Control Systems
Critical Infrastructure Protection
Cyber Warfare Trends and Approaches
Denial-of-Service Attacks and Countermeasures
Digital Forensics
Digital Rights Management
Distributed and Pervasive Systems Security
Embedded Systems Security
Enterprise Systems Security
Executable Content and Content Filtering
File and Files System Security
Fraud Management
Hardware Security
Human-Computer Interaction and Security
Identity Management
Intellectual Property Protection
Key Distribution and Management
Mobile System Security
Multimedia and Document Security
Network Infrastructure Security
Operating Systems and Database Security
Peer-to-Peer Security
Secure Communications and Information Flow
Secure Sensor Networks
Security for Grid Computing
Security in Cloud Computing/Social Networks
Security in e-services
Security of Web-Based Applications
Surveillance Systems
Analysis of Network and Security Protocols
Authorship Analysis
Biometrics Standards and Standardization
Border Security
Business Continuity & Disaster Recovery Planning
Crowd Management
Emergency Response and Management
Encryption and Cryptography
Forecasting Terrorism
Incident Handling and Penetration Testing
Information Hiding
Intrusion and Anomaly Detection and Prevention
Investigation of Insider Attacks
Language-Based Security
Malware Forensics and Anti-Malware Techniques
Protocol Security
Secure Software Development
Security Architectures
Security Metrics
Self-Protecting and Self-Healing Systems
Social Engineering
Social Network Analysis
Template Protection and Liveliness Detection
Threats, Vulnerabilities, and Risk Management
Economics of Security
Laws and Regulations/Legal Issues
Security Policies and Trust Management
Security Education and Training
New Threats and Non-Traditional Approaches
Theories, Methods and Tools in Managing Security

Special Sessions:
Cloud Security and Cryptography  
Internet of Things Security and Privacy  	
Big Data Security and Privacy  
Secure Network Protocols   	
Blockchain Security and Privacy   

Important Dates
Papers Due: June 8, 2018
Acceptance Notification: June 30, 2018
Final Paper Deadline: July 20, 2018

Contact Us