International Conference on Security in Computing and Cloud Computing 2023

12oct(oct 12)9:00 am13(oct 13)5:00 pmInternational Conference on Security in Computing and Cloud Computing 2023ICSCCC 2023


Event Details

ICSCCC 2023 is an opportunity for academics, students, scholars, scientists, and engineers from around the world who are involved in the study, management, development, and implementation of systems and concepts to combat information warfare or to improve Security in Computing and Cloud Computing to come together and exchange ideas. This conference is trying to establish itself as a key event for the understanding of threats and risks to information systems, the development of a strong security culture, and incident investigation.

Please consider submitting to this conference. We are interested in the entire range of concepts from theory to practice, including case studies, works-in-progress, and conceptual explorations.

Prospective authors are invited to submit original technical papers by the deadline for publication in the ICSCCC 2023 Conference Proceedings and for presentation(s) in the symposia listed below. Deadlines will be strictly matched and late papers will be summarily rejected. The conference welcomes papers on the following (but not limited to) research topics.

Tracks of the Conference

  • Cloud Computing
  • Cloud Computing Architecture and Systems
  • Cloud Computing Models, Simulations, Designs, and Paradigms
  • Cloud Management and Operations
  • Dynamic Resource Provision and Consuming
  • Cloud Computing Technologies, Services and Applications
  • Cloud Security
  • Security Evaluation and Benchmarks Based on Cloud
  • Security Policy, Security Theory and Models Based on Big Data
  • Authentication, Authorization and Reliability Issues in Cloud
  • Security and Privacy in Cloud Computing
  • Information Security and Risks Management
  • Machine Learning for Security
  • Information Hiding
  • Coverless Information Hiding
  • Steganography and Steganalysis
  • Digital Watermarking, Fingerprinting and Forensics
  • Multimedia Authentication and Encryption
  • Covert/Subliminal Channels
  • IoT Security
  • Data Security and Privacy in the IoT
  • Attacks and Countermeasures on IoT Systems
  • Trust Model, Data Aggregation and Information Sharing
  • Secure Hardware and Software for IoT
  • Application Security for IoT
  • Multimedia Forensics
  • Active and Passive Forensics
  • Portable Electronic Device Forensics
  • Big Data Forensics
  • Network Forensics
  • Anti-Forensics
  • Encryption
  • Measurements for Cybersecurity
  • Post Quantum Cybersecurity
  • Visualization for Security
  • Applied Cryptography
  • Language-based Security
  • Security, Privacy in E-Commerce

Article/Paper Submissions Link:



12 (Thursday) 9:00 am - 13 (Friday) 5:00 pm


Paris, France [Physical/Online]