Algorithm Design
Analysis of Algorithms
Application Security for IoT
Attacks and Countermeasures on IoT
Authentication Issues in Cloud
Authorization Issues in Cloud
Benchmarks Based on Cloud
Big Data
Bioinformatics
Biometrics
Channel and traffic models
Cloud Computing
Cloud Computing Architecture
Cloud Computing Designs
Cloud Computing Models
Cloud Computing Paradigms
Cloud Computing Services and Applications
Cloud Computing Simulations
Cloud Computing Systems
Cloud Computing Technologies
Cloud Information Hiding
Cloud Information Security
Cloud Management and Operations
Cloud Security
Cognitive Science
Computability Theory
Computational Complexity Theory
Computational Linguistics
Computational Neuroscience
Computer Animation
Computer Graphics
Computer Programming
Coverless Information Hiding
Covert/Subliminal Channels
Data Aggregation
Data Security and Privacy in the IoT
Database and Data Mining
Database Management Systems
Digital Watermarking
Distributed Sensing and Control
Distributed, Cloud and Scalable Computing
Embedded & Real Systems
Evolutionary Computation
Expert Systems
Green Computing
High Performance Computing
Image Processing
Information Retrieval and Management
Information Science and Technology
Information Sharing
Information theory
Intelligent Data Processing
Intelligent Information Systems
Intelligent Management
Internet of Things
IoT radio communications
IoT Security
Logic Programming
Long/short range access network technologies
MAC protocols for IoT
Machine Learning
Mobile and Pervasive Computing
Mobile using WSN
Models Based on Big Data
Multimedia Authentication and Encryption
Multimedia systems and services
Naming and address management
Natural Language Processing
Network Security
Network Technologies
Network Topology
Networking and Network Security
Networks and Communications
Numerical Algorithms
Numerical Analysis
Operating Systems
Parallel Processing
Pattern Recognition
Programming Paradigms
Quantum Computing Theory
Radio/wireline access network technologies
Reliability Issues in Cloud
Reliability, Security, Privacy and Trust
RFID, sensors, actuator technologies
Risks Management
Scientific Computing
Secure Hardware and Software for IoT
Security and Privacy in Cloud Computing
Security and privacy issues for devices
Security Evaluation Based on Cloud
Security Policy
Security Theory
Soft Computing
Software Design
Software Development Process
Software Testing
Steganography and Steganalysis
System architecture and components
System Design Modeling and Evaluation
Test-beds and field trials
Trust Model
Ubiquitous Computing
Video Analytics
Video Processing
Virtual Reality
Web and Internet Computing
Wireless Ad Hoc & Sensor Networks
Contact us
Email: ccitis@163.com
Tel: +86 155 2328 8869
Time: Mon - Sat 9:00 AM - 6:00 PM
Latest News
CCITIS will be indexed by many well-known databases.
CCITIS conference will be held both online and in-person.
CCITIS conference will Invite keynote speakers.
CCITIS conference will be published by IEEE press.