ICCSCS2018: International Conferences on Cyber Security and Communication Systems Melbourne Institute of Technology Melbourne, Australia, December 10-12, 2018 |
Conference website | http://iccscs.org/home |
Submission link | https://easychair.org/conferences/?conf=iccscs2018 |
Submission deadline | November 15, 2018 |
The conferences on network security and communication engineering is meant to serve as a forum for exchanging new developments and research progresses between scholars, scientists and engineers all over the world and providing a unique opportunity to exchange information, to present the latest results as well as to review the relevant issues on contemporary research in network security and communication engineering.
The Joint Conference in Melbourne brings together
- The 9th International conference on Broadband Communications and National Broadband Networks (IB2COM 2018)
In Conjunction with
- The 3th Cybersecurity and Cyberforensics Conference (CCC 2018)
The joint conferences aimed at bringing together researchers, engineers and practitioners interested on Cyber Security and communication technologies, including data communication networking, Intrusion Detection System , optical communication systems, security and cryptography. The purpose of these conferences is to investigate the current research trends, and help the stakeholders in industry and academia to better understand challenges, recent advances, and potential research directions in the developing field of security.
International Conferences on Cyber Security and Communication Systems invites researchers and practitioners from academia, industry and government, and accepts original, previously unpublished work. The scope of the conference is narrow to ensure a complementary match between capability and need. Papers should either be empirically or rationally based explorations of problems in cyber security and cyber forensic, or propose solutions and/or countermeasures to the most pressing cybercrimes.
The conference topics scope covers the standing series topics which includes among other topics Trust, Security and Privacy in Computing and Communications. In addition to the high technical standard expected of this conference, we aim to give all participants a real taste of the true Australian culture in the great city of Melbourne which internationally voted, for seven years in a row (2011-2017), the “World’s Most Liveable City”!
The dedicated conference teams are currently working hard on making this conference not only intellectually stimulating but also an unforgettable pleasant experience for all participants.
We look forward to welcome you in IB2COM 2018 and CCC 2018 and wish you a fruitful and enjoyable stay in Australia.
Submission Guidelines
All papers must be original and not simultaneously submitted to another journal or conference. The following paper categories are welcome:
Authors are invited to submit full papers showing original research contributions. The work should not have been presented or published or being considered for review or publication by other conferences or journals.
All submissions will be reviewed by at least 3 members of the Program Committee; additional reviewers will be consulted if needed.Paper submission implies that one of the authors will present the paper if it is accepted.
All accepted papers will be published by Springer in Communications in Computer and Information Science Series (CCIS), Springer.CCIS is indexed in DBLP, Google Scholar, EI-Compendex, Mathematical Reviews, SCImago and Scopus. CCIS volumes are also submitted for the inclusion in ISI Proceedings. The current SCImago Journal Rank (SJR) of CCIS is 0.162 (H Index 35). A submitted manuscript should be formatted according to Springer guidelines. The maximum length is 8 pages in A4 paper size.
Authors should refer to the Author's Instructions on Springer's LNCS web site for more information on the paper format and to download the style/template files (get them here). Please note that instructions on Springer's web site may refer to the "camera-ready" version of a paper. Authors can use the same instructions for their first submission, as well as for the camera-ready version upon acceptance of their papers. Authors are not required to submit a copyright form with their first submission.
Only electronic submission will be accepted through the conference paper submission web page. Please use only PDF format for the submitted paper.
For the initial submission provide only a pdf of your paper. If your paper is accepted, you will be asked to submit all the sources of the camera-ready version of your paper for inclusion in the conference proceedings. Acceptable formats for the source version are LaTeX and Microsoft Word (LaTeX is preferred), using Springer's style/template files.
Templates
- Springer-LNCS Author Instructions (PDF)
- Springer-LNCS LaTeX Package (ZIP)
- Microsoft Word Proceedings Templates (ZIP)
- Microsoft Word 2003 Proceedings Templates(ZIP)
List of Topics
- CyberSecuirty (but are not limited to:)
Basic research and application papers related, but not limited to, the following topics are welcome:
Cybercrime scenario analysis and reconstruction
- Techniques for evidence collection, search, analysis, correlation and preservation and presentation
- Security & Social Networks
- Anomaly detection of web-based attacks
- Malicious Spam detection
- Botnet Detection and prevention
- Wireless Network Security and Forensics
- Cloud Computing Security and the Forensics of Big Data
- Privacy, ethical and legal issues
- Forensic Investigation of the Internet of Things
- Anti-Forensics and Data Hiding Techniques and Discoveries
- Malware Analysis and Memory Forensic Techniques
- Advanced Persistent Threats (APTs)
- System Forensic Techniques for Windows, Linux, Mac, etc
- File System Forensic Analysis
- Hacking Techniques: Client-Side Attacks
- Malicious Content Detection and Analysis Techniques
- Societal Impact of Cybercrime
- Defense against cyberterrorism
- Monitoring and incident response
- Tools and techniques for network forensics
- Methodologies for digital forensics
- Applications of Data Mining for Cybersecurity
- Cybercrime detection and prevention
- Mobile Forensics (e.g. Android and iOS devices) and the investigation of embedded devices
- Forensic software tools and applications
- Cybercrime Profiling
- Cybercrime: evolution, new trends and detection
- Anti-malware techniques: detection, analysis, and prevention
- Combating cybercrime: anti-phishing, anti-spam, anti-fraud techniques
- Privacy and anonymity technologies
- Intrusion prevention, detection, and response
- 5G Research Topics
- Massive MIMO
- Large-Scale Phased Arrays
- Beam switching and tracking in 5G
- Multilayer circular arrays in 5G
- 5G Energy efficient systems
- Generalized frequency division multiplex (GFDM),
- Filter bank multicarrier (FBMC),
- Universal filtered multicarrier (UFMC),
- Filtered OFDM (f-OFDM)
- Handover in 5G networks
- 5G Propagation Models
- 5G Channel Models and Measurements
- Channel Coding
- Small cells
- Virtual Base Stations
- Software defined networking
- High efficiency Power amplifiers
- Concurrent multi-band power amplifiers
- New waveforms
- None Orthogonal Multiple Access Schemes
- Millimeter Wave Communications
- Smart Cities
- Smart Connected Homes
- Massive Internet of Things (mIoT)
- Massive Spatial Modulation Schemes
- Vehicular Communication Systems
- Relay Networks
- Cooperative 5G Networks
- 5G Security and Privacy
- 5G Trials and Experiments
- Hardware and Devices
- 5G Transceiver Architectures
- 5G STBC
- 5G Cellular localisation
- Low Latency Cellular and Vehicular Networks
- Autonomous Networks
- Cloud Radio Access Networks
- Symposium on Wireless Power Transfer
- Frequency splitting applications
- Massive Inductive System Power control
- Inductive Underwater communication systems
- Micro-Power Systems for IoT devices
- Inductive Power Base Stations
- Multi-Dimensional WPT systems
- Electric Vehicles
- WPT for electric vehicles
- WPT applications
- Wireless Power Focusing
- Energy Harvesting
- Wireless Power Transfer Platforms
- HetNets
- IoT and M2M
- IoT and Machine to Machine Communications
- IoT platforms
- Medical IoT Systems
- IoT Agric Applications
- Autonomous Vehicles
- Drone Networks
- UAV Relaying
- Massive Drone Route Planning
- Biosensors
- IoT Sensors
- Internet of Vehicles
- IoT Security Systems
- Cryptographic Schemes for IoT
Committees
General Chairs
|
|
|
Local chairs
- Dr. Ammar Alazab, Melbourne Institute Technology, Australia
- Dr. Imran Ali Jokhio, Melbourne Institute Technology, Australia
Invited Speakers
- TBA
Publication
All accepted papers will be published by Springer in Communications in Computer and Information Science Series (CCIS), Springer.CCIS is indexed in DBLP, Google Scholar, EI-Compendex, Mathematical Reviews, SCImago and Scopus. CCIS volumes are also submitted for the inclusion in ISI Proceedings. The current SCImago Journal Rank (SJR) of CCIS is 0.162 (H Index 35). A submitted manuscript should be formatted according to Springer guidelines. The maximum length is 8 pages in A4 paper size.
Venue
The conference will be held in Melbourne Institue Technology, Melbourne, Australia
Contact
All questions about submissions should be emailed to
|
|
|
|
|
|
|
|