St. JOSEPH'S INSTITUTE OF TECHNOLOGY

3rd International Conference on
Recent Trends in Engineering and Technology


INFO



International Conference on Recent Trends in Computer Science Engineering

  • Algorithms and Bioinformatics
  • Big Data
  • Cloud Computing
  • Computer Architecture and Real Time Systems
  • Database and Data Mining
  • Dependable, Reliable and Autonomic Computing
  • Distributed and Parallel Systems and Algorithms
  • DSP/Image Processing/Pattern Recognition/Multimedia
  • Embedded System and Software
  • Game and Software Engineering
  • Geographical Information Systems/ Global Navigation Satellite Systems (GIS/GNSS)
  • Grid and Scalable Computing
  • Intelligent Information & Database Systems
  • IT policy and Business Management
  • Mobile and Ubiquitous Computing
  • Modeling and Simulation
  • Multimedia Systems and Services
  • Networking and Communications
  • Parallel and Distributed Systems
  • Security and Information Assurance
  • Soft Computing
  • Software Engineering
  • Web and Internet Computing
  • Cryptographic protocols
  • Cryptography and Coding
  • Intractability
  • Privacy and authentication
  • Key management
  • Authentication
  • Trust Management
  • Quantum cryptography
  • Computational Intelligence in Security
  • Artificial Immune Systems
  • Biological & Evolutionary Computation
  • Intelligent Agents and Systems
  • Reinforcement & Unsupervised Learning
  • Autonomy-Oriented Computing
  • Co evolutionary Algorithms
  • Fuzzy Systems
  • Biometric Security
  • Trust models and metrics
  • Regulation and Trust Mechanisms
  • Data Integrity
  • Models for Authentication, Trust and Authorization
  • Wireless Network Security
  • Information Hiding
  • Data & System Integrity
  • E- Commerce
  • Access Control and Intrusion Detection
  • Intrusion Detection and Vulnerability Assessment
  • Authentication and Non-repudiation
  • Identification and Authentication
  • Insider Threats and Countermeasures
  • Intrusion Detection & Prevention
  • Secure Cloud Computing
  • Security Information Systems Architecture and Design and Security Patterns
  • Security Management
  • Security Requirements (threats, vulnerabilities, risk, formal methods, etc.)
  • Sensor and Mobile Ad Hoc Network Security
  • Service and Systems Design and Quos Network Security
  • Software Security
  • Security and Privacy in Mobile Systems
  • Security and Privacy in Pervasive/Ubiquitous Computing
  • Security and Privacy in Web Services
  • Security and Privacy Policies
  • Security Area Control
  • Security Deployment
  • Security Engineering
  • Security for Grid Computing
  • Security in Distributed Systems