您好,欢迎登录Mr.confs会先生官方网站!

ICSCIS 2021: 15. International Conference on Secure Communications and Information Systems

时间:2021-03-04 至 2021-03-05

ICSCIS 2021: 15. International Conference on Secure Communications and Information Systems
收藏0
ICSCIS 2021: 15. International Conference on Secure Communications and Information Systems
会议时间:2021-03-04 至 2021-03-05
会议地点: Rome, Italy,Rome,Italy 周边酒店预订

发票类型: 不支持开票
参会凭证:其它

门票信息
Participation Type Early Registration Fees Registration Fees
Non-Student Oral/Poster Presenter Registration € 450 € 500
Student Oral/Poster Presenter Registration € 350 € 400
Listener Registration € 250 € 300
Additional Paper Publication € 100
会议介绍

The International Research Conference Aims and Objectives

The International Research Conference is a federated organization dedicated to bringing together a significant number of diverse scholarly events for presentation within the conference program. Events will run over a span of time during the conference depending on the number and length of the presentations. With its high quality, it provides an exceptional value for students, academics and industry researchers.

ICSCIS 2021: 15. International Conference on Secure Communications and Information Systems aims to bring together leading academic scientists, researchers and research scholars to exchange and share their experiences and research results on all aspects of Secure Communications and Information Systems. It also provides a premier interdisciplinary platform for researchers, practitioners and educators to present and discuss the most recent innovations, trends, and concerns as well as practical challenges encountered and solutions adopted in the fields of Secure Communications and Information Systems

Call for Contributions

Prospective authors are kindly encouraged to contribute to and help shape the conference through submissions of their research abstracts, papers and e-posters. Also, high quality research contributions describing original and unpublished results of conceptual, constructive, empirical, experimental, or theoretical work in all areas of Secure Communications and Information Systems are cordially invited for presentation at the conference. The conference solicits contributions of abstracts, papers and e-posters that address themes and topics of the conference, including figures, tables and references of novel research materials.

Guidelines for Authors

Please ensure your submission meets the conference's strict guidelines for accepting scholarly papers. Downloadable versions of the check list for Full-Text Papers and Abstract Papers.

Please refer to the Paper Submission Guideline, Abstract Submission Guideline and Author Information before submitting your paper.

Conference Proceedings

All submitted conference papers will be blind peer reviewed by three competent reviewers. The peer-reviewed conference proceedings are indexed in the Open Science Index, Google Scholar, Semantic Scholar, Zenedo, OpenAIRE, BASE, WorldCAT, Sherpa/RoMEO, and other index databases. Impact Factor Indicators.

Special Journal Issues

ICSCIS 2021 has teamed up with the Special Journal Issue on Secure Communications and Information Systems. A number of selected high-impact full text papers will also be considered for the special journal issues. All submitted papers will have the opportunity to be considered for this Special Journal Issue. The paper selection will be carried out during the peer review process as well as at the conference presentation stage. Submitted papers must not be under consideration by any other journal or publication. The final decision for paper selection will be made based on peer review reports by the Guest Editors and the Editor-in-Chief jointly. Selected full-text papers will be published online free of charge.

Conference Sponsor and Exhibitor Opportunities

The Conference offers the opportunity to become a conference sponsor or exhibitor. To participate as a sponsor or exhibitor, please download and complete the Conference Sponsorship Request Form.

Selected Papers

  1. Malicious Vehicle Detection Using Monitoring Algorithm in Vehicular Adhoc Networks
    S. Padmapriya
  2. Keyloggers Prevention with Time-Sensitive Obfuscation
    Chien-Wei Hung, Fu-Hau Hsu, Chuan-Sheng Wang, Chia-Hao Lee
  3. A Socio-Technical Approach to Cyber-Risk Assessment
    Kitty Kioskli, Nineta Polemi
  4. Computational Approaches for Ballistic Impact Response of Stainless Steel 304
    A. Mostafa
  5. Influence of Security on Fan Attendance during Nigeria Professional Football League Matches
    B. O. Diyaolu
  6. Authentication of Physical Objects with Dot-Based 2D Code
    Michał Glet, Kamil Kaczyński
  7. Leveraging Li-Fi to Enhance Security and Performance of Medical Devices
    Trevor Kroeger, Hayden Williams, Edward Holzinger, David Coleman, Brian Haberman
  8. Secure Socket Layer in the Network and Web Security
    Roza Dastres, Mohsen Soori
  9. Data Integrity: Challenges in Health Information Systems in South Africa
    T. Thulare, M. Herselman, A. Botha
  10. Judicial Review of Indonesia's Position as the First Archipelagic State to implement the Traffic Separation Scheme to Establish Maritime Safety and Security
    Rosmini Yanti, Safira Aviolita, Marsetio
  11. Decentralised Edge Authentication in the Industrial Enterprise IoT Space
    C. P. Autry, A.W. Roscoe
  12. Spatial-Temporal Awareness Approach for Extensive Re-Identification
    Tyng-Rong Roan, Fuji Foo, Wenwey Hseush
  13. Cybersecurity Protection Structures: The Case of Lesotho
    N. N. Mosola, K. F. Moeketsi, R. Sehobai, N. Pule
  14. Context Aware Anomaly Behavior Analysis for Smart Home Systems
    Zhiwen Pan, Jesus Pacheco, Salim Hariri, Yiqiang Chen, Bozhi Liu
  15. The Two Layers of Food Safety and GMOs in the Hungarian Agricultural Law
    Gergely Horváth
Antonio Capodieci University of Salento, IT
Riccardo Martoglia University of Modena and Reggio Emilia, IT
Francesco Flammini Ansaldo STS, IT
Ezendu Ariwa University of Bedfordshire, UK
Ali Al-Sherbaz The University of Northampton, UK
Elhadj Benkhelifa Staffordshire University, UK
Anjali Das TTE Systems Ltd (spin-out company from the University of Leicester), UK
Mohamed Abdel-Maguid Staffordshire University, UK
Mohammed Rezaul Karim Guildhall College, UK
Zaigham Mahmood University of Derby, UK
Poonam Dharam Saginaw Valley State University, US
Rajasekhar Chaganti University of Texas at San Antonio, US
Sue Feldman University of Alabama, US
Douglas Kelly Johns Hopkins University Applied Physics Laboratory, US
Vahid Heydari Rowan University, US
Lekshmy Sankar University of Denver, US
Dennis Jjuuko University of Massachusetts Boston, US
Pat Nelson Minnesota State University Mankato, US
Jessy Abouarab Florida International University, US
Nalanda Roy Georgia Southern University, US
Marian Leerburger US Government, US
Shalva Marjanishvili Hinman Consulting Engineers, Inc, US
Yizhen Liu Research Institue of Huawei at U.S., US
Katherine Payne Brigham Young University, US
James Nelson New Mexico State University, US
Apurva Mohan Honeywell Research Labs, US
Ping Wang University of Maryland University College, US
Maurice Dawson Alabama A&M University, US
Ronald Gonzales National University, US
Antonios Marsellos University of Florida, US
会议日程
Abstracts/Full-Text Paper Submission Deadline   January 06, 2020
Notification of Acceptance/Rejection   January 28, 2020
Final Paper (Camera Ready) Submission & Early Bird Registration Deadline   February 05, 2021
Conference Dates   March 04-05, 2021
参会指南
会议地点
×