International Conference on Cyber Security (ICCS) 2016

Deadlines to Remember

 

Abstract Submission                           May 15,  2016

Abstract Submission (Extended)         June 20, 2016

Acceptance Notification                       June 05, 2016

Acceptance Notification (Extended)     June 25, 2016 

Registration (Early Bird-Extended)    July  07, 2016  

Full Paper Submission (Extended)       July  10, 2016 

Conference                                 August 13-14, 2016

 

Conference Proceedings Publication

 

The proceedings will be reviewed for possible publication within the SCOPUS (Elsevier), or Compendex (Elsevier) or THOMSON REUTERS (SCI) indexed journals

Best Paper Award

 

The best paper will be selected by separate committee and will be the one that reports the most novel and promising research work that has a high potential impact in the real world. 

Bookmark and Share

Call For Papers


ICCS 2016 is an opportunity for academics, students, scholars, scientists and engineers from around the world who are involved in the study, management, development and implementation of systems and concepts to combat information warfare or to improve information systems security to come together and exchange ideas.This conference is trying to establish itself as a key event for the understanding of threats and risks to information systems, the development of a strong security culture, and incident investigation.


Please consider submitting to this conference.  We are interested in the entire range of concepts from theory to practice, including case studies, works-in-progress, and conceptual explorations. Topics for submissions may include, but are not limited to:

 


Proposed Conference Tracks


  • Database Security
  • Big Data Techniques in Cyber Security
  • Digital Signature Techniques
  • Forensic Analysis of Cyber Crimes
  • Secure User Authentication
  • Spam Protection
  • Advance Persistent Threat
  • Secret Sharing
  • Key Management
  • Security inMobileNetworks
  • Hardware Security
  • Cloud Security
  • Cyber Physical System 
  • Network Protocols
  • Next-generation Communication Networks
  • Mobile & Ubiquitous Communication Networks
  • Mobile Cloud
  • Cloud and Systems Management
  • Cloud Computing and Networking
  • Internet Technologies
  • Information-Centric Networking
  • Big Data Communication and Analytics
  • Data Network Management
  • Data as a Service
  • Data Sharing and Infrastructures
  • Network Architectures
  • Modeling & Simulation of communication networks and Systems
  • Network Monitoring and Control
  • Traffic Measurement, Analysis, Modeling and Visualization
  • Quality of Service (QoS)
  • Routing and Flow Control in LANs, WANs and PANs
  • Sensor Nets and Embedded Systems
  • Network applications (web, multimedia streaming, gaming, etc.)
  • Social Computing and Networks
  • Software-Defined Networking
  • Network Security
  • Authentication Systems: Public Key Infrastructures, Key Management, Credential Management
  • Secure Routing, Naming/Addressing, Network Management
  • Security & Privacy in Pervasive and Ubiquitous Computing, e.g., RFIDs
  • Security & Privacy in Peer-to-Peer and Overlay Networks
  • Security & Privacy for Emerging Technologies: VoIP, Internet-of-Things, Social Networks
  • Security & Isolation in Cloud, Data Center and Software-Defined Networks