您好,欢迎登录Mr.confs会先生官方网站!

ICSSI 2021: 15. International Conference on Security Studies and Intelligence

时间:2021-01-14 至 2021-01-15

ICSSI 2021: 15. International Conference on Security Studies and Intelligence
收藏0
ICSSI 2021: 15. International Conference on Security Studies and Intelligence
会议时间:2021-01-14 至 2021-01-15
会议地点: Bali, Indonesia,Tokyo,Japan 周边酒店预订

发票类型: 不支持开票
参会凭证:其它

门票信息
Participation Type Early Registration Fees Registration Fees
Non-Student Oral/Poster Presenter Registration € 350 € 400
Student Oral/Poster Presenter Registration € 300 € 350
Listener Registration € 250 € 300
Additional Paper Publication € 100
会议介绍

The International Research Conference Aims and Objectives

The International Research Conference is a federated organization dedicated to bringing together a significant number of diverse scholarly events for presentation within the conference program. Events will run over a span of time during the conference depending on the number and length of the presentations. With its high quality, it provides an exceptional value for students, academics and industry researchers.

ICSSI 2021: 15. International Conference on Security Studies and Intelligence aims to bring together leading academic scientists, researchers and research scholars to exchange and share their experiences and research results on all aspects of Security Studies and Intelligence. It also provides a premier interdisciplinary platform for researchers, practitioners and educators to present and discuss the most recent innovations, trends, and concerns as well as practical challenges encountered and solutions adopted in the fields of Security Studies and Intelligence

Call for Contributions

Prospective authors are kindly encouraged to contribute to and help shape the conference through submissions of their research abstracts, papers and e-posters. Also, high quality research contributions describing original and unpublished results of conceptual, constructive, empirical, experimental, or theoretical work in all areas of Security Studies and Intelligence are cordially invited for presentation at the conference. The conference solicits contributions of abstracts, papers and e-posters that address themes and topics of the conference, including figures, tables and references of novel research materials.

Guidelines for Authors

Please ensure your submission meets the conference's strict guidelines for accepting scholarly papers. Downloadable versions of the check list for Full-Text Papers and Abstract Papers.

Please refer to the Paper Submission Guideline, Abstract Submission Guideline and Author Information before submitting your paper.

Conference Proceedings

All submitted conference papers will be blind peer reviewed by three competent reviewers. The peer-reviewed conference proceedings are indexed in the Open Science Index, Google Scholar, Semantic Scholar, Zenedo, OpenAIRE, BASE, WorldCAT, Sherpa/RoMEO, and other index databases. Impact Factor Indicators.

Special Journal Issues

ICSSI 2021 has teamed up with the Special Journal Issue on Security Studies and Intelligence. A number of selected high-impact full text papers will also be considered for the special journal issues. All submitted papers will have the opportunity to be considered for this Special Journal Issue. The paper selection will be carried out during the peer review process as well as at the conference presentation stage. Submitted papers must not be under consideration by any other journal or publication. The final decision for paper selection will be made based on peer review reports by the Guest Editors and the Editor-in-Chief jointly. Selected full-text papers will be published online free of charge.

Conference Sponsor and Exhibitor Opportunities

The Conference offers the opportunity to become a conference sponsor or exhibitor. To participate as a sponsor or exhibitor, please download and complete the Conference Sponsorship Request Form.

Selected Papers

  1. Automated Monitoring System to Support Investigation of Contributing Factors of Work-Related Disorders and Accidents
    Erika R. Chambriard, Sandro C. Izidoro, Davidson P. Mendes, Douglas E. V. Pires
  2. Malicious Vehicle Detection Using Monitoring Algorithm in Vehicular Adhoc Networks
    S. Padmapriya
  3. Keyloggers Prevention with Time-Sensitive Obfuscation
    Chien-Wei Hung, Fu-Hau Hsu, Chuan-Sheng Wang, Chia-Hao Lee
  4. A Socio-Technical Approach to Cyber-Risk Assessment
    Kitty Kioskli, Nineta Polemi
  5. Computational Approaches for Ballistic Impact Response of Stainless Steel 304
    A. Mostafa
  6. A Goal-Driven Crime Scripting Framework
    Hashem Dehghanniri
  7. Influence of Security on Fan Attendance during Nigeria Professional Football League Matches
    B. O. Diyaolu
  8. Authentication of Physical Objects with Dot-Based 2D Code
    Michał Glet, Kamil Kaczyński
  9. Leveraging Li-Fi to Enhance Security and Performance of Medical Devices
    Trevor Kroeger, Hayden Williams, Edward Holzinger, David Coleman, Brian Haberman
  10. Secure Socket Layer in the Network and Web Security
    Roza Dastres, Mohsen Soori
  11. Judicial Review of Indonesia's Position as the First Archipelagic State to implement the Traffic Separation Scheme to Establish Maritime Safety and Security
    Rosmini Yanti, Safira Aviolita, Marsetio
  12. Decentralised Edge Authentication in the Industrial Enterprise IoT Space
    C. P. Autry, A.W. Roscoe
  13. Spatial-Temporal Awareness Approach for Extensive Re-Identification
    Tyng-Rong Roan, Fuji Foo, Wenwey Hseush
  14. Cybersecurity Protection Structures: The Case of Lesotho
    N. N. Mosola, K. F. Moeketsi, R. Sehobai, N. Pule
  15. Context Aware Anomaly Behavior Analysis for Smart Home Systems
    Zhiwen Pan, Jesus Pacheco, Salim Hariri, Yiqiang Chen, Bozhi Liu
Vidyahwati Tenrisanna Hasanuddin University, ID
Deris Deris Stiawan University of Sriwijaya, ID
Marianna Charountaki Reading University, UK
Ali Al-Sherbaz The University of Northampton, UK
Mohammed Rezaul Karim Guildhall College, UK
Poonam Dharam Saginaw Valley State University, US
Rajasekhar Chaganti University of Texas at San Antonio, US
Douglas Kelly Johns Hopkins University Applied Physics Laboratory, US
Vahid Heydari Rowan University, US
Dennis Jjuuko University of Massachusetts Boston, US
Pat Nelson Minnesota State University Mankato, US
Jessy Abouarab Florida International University, US
Pamela Mccauley University of Central Florida, US
Nalanda Roy Georgia Southern University, US
Marian Leerburger US Government, US
Heather Mbaye University of West Georgia, US
Shalva Marjanishvili Hinman Consulting Engineers, Inc, US
Yizhen Liu Research Institue of Huawei at U.S., US
James Nelson New Mexico State University, US
Patrick Bell Florida International University, US
Apurva Mohan Honeywell Research Labs, US
Shailender Singh Kanwar University of Michigan, US
Ping Wang University of Maryland University College, US
Maurice Dawson Alabama A&M University, US
Ronald Gonzales National University, US
Niraj Shakhakarmi Prairie View A and M University, US
Guoxiang Liu University of North Dakota, US
Danda Rawat Old Dominion University, US
Mengyu Qiao New Mexico Institute of Mining and Technology, US
Simon Obeid ITT Technical Institute, US
会议日程
Abstracts/Full-Text Paper Submission Deadline   December 01, 2020
Notification of Acceptance/Rejection   December 15, 2020
Final Paper (Camera Ready) Submission & Early Bird Registration Deadline   December 15, 2020
Conference Dates   January 14-15, 2021
参会指南
会议地点
×