您好,欢迎登录Mr.confs会先生官方网站!

ICSCSAI 2021: 15. International Conference on Secure Communicating Systems: Design, Analysis, and Implementation

时间:2021-06-03 至 2021-06-04

ICSCSAI 2021: 15. International Conference on Secure Communicating Systems: Design, Analysis, and Implementation
收藏0
ICSCSAI 2021: 15. International Conference on Secure Communicating Systems: Design, Analysis, and Implementation
会议时间:2021-06-03 至 2021-06-04
会议地点: New York, United States,Paris,France 周边酒店预订

发票类型: 不支持开票
参会凭证:其它

门票信息
Participation Type Early Registration Fees Registration Fees
Non-Student Oral/Poster Presenter Registration € 450 € 500
Student Oral/Poster Presenter Registration € 350 € 400
Listener Registration € 250 € 300
Additional Paper Publication € 100
会议介绍

The International Research Conference Aims and Objectives

The International Research Conference is a federated organization dedicated to bringing together a significant number of diverse scholarly events for presentation within the conference program. Events will run over a span of time during the conference depending on the number and length of the presentations. With its high quality, it provides an exceptional value for students, academics and industry researchers.

ICSCSAI 2021: 15. International Conference on Secure Communicating Systems: Design, Analysis, and Implementation aims to bring together leading academic scientists, researchers and research scholars to exchange and share their experiences and research results on all aspects of Secure Communicating Systems: Design, Analysis, and Implementation. It also provides a premier interdisciplinary platform for researchers, practitioners and educators to present and discuss the most recent innovations, trends, and concerns as well as practical challenges encountered and solutions adopted in the fields of Secure Communicating Systems: Design, Analysis, and Implementation

Call for Contributions

Prospective authors are kindly encouraged to contribute to and help shape the conference through submissions of their research abstracts, papers and e-posters. Also, high quality research contributions describing original and unpublished results of conceptual, constructive, empirical, experimental, or theoretical work in all areas of Secure Communicating Systems: Design, Analysis, and Implementation are cordially invited for presentation at the conference. The conference solicits contributions of abstracts, papers and e-posters that address themes and topics of the conference, including figures, tables and references of novel research materials.

Guidelines for Authors

Please ensure your submission meets the conference's strict guidelines for accepting scholarly papers. Downloadable versions of the check list for Full-Text Papers and Abstract Papers.

Please refer to the Paper Submission Guideline, Abstract Submission Guideline and Author Information before submitting your paper.

Conference Proceedings

All submitted conference papers will be blind peer reviewed by three competent reviewers. The peer-reviewed conference proceedings are indexed in the Open Science Index, Google Scholar, Semantic Scholar, Zenedo, OpenAIRE, BASE, WorldCAT, Sherpa/RoMEO, and other index databases. Impact Factor Indicators.

Special Journal Issues

ICSCSAI 2021 has teamed up with the Special Journal Issue on Secure Communicating Systems: Design, Analysis, and Implementation. A number of selected high-impact full text papers will also be considered for the special journal issues. All submitted papers will have the opportunity to be considered for this Special Journal Issue. The paper selection will be carried out during the peer review process as well as at the conference presentation stage. Submitted papers must not be under consideration by any other journal or publication. The final decision for paper selection will be made based on peer review reports by the Guest Editors and the Editor-in-Chief jointly. Selected full-text papers will be published online free of charge.

Conference Sponsor and Exhibitor Opportunities

The Conference offers the opportunity to become a conference sponsor or exhibitor. To participate as a sponsor or exhibitor, please download and complete the Conference Sponsorship Request Form.

Selected Papers

  1. A Secure Auditing Framework for Load Balancing in Cloud Environment
    R. Geetha, T. Padmavathy
  2. Keyloggers Prevention with Time-Sensitive Obfuscation
    Chien-Wei Hung, Fu-Hau Hsu, Chuan-Sheng Wang, Chia-Hao Lee
  3. A Machine Learning Based Framework for Education Levelling in Multicultural Countries: UAE as a Case Study
    Shatha Ghareeb, Rawaa Al-Jumeily, Thar Baker
  4. Reduction of Energy Consumption Using Smart Home Techniques in the Household Sector
    Ahmed Al-Adaileh, Souheil Khaddaj
  5. Survey of Access Controls in Cloud Computing
    Monirah Alkathiry, Hanan Aljarwan
  6. Cybersecurity Protection Structures: The Case of Lesotho
    N. N. Mosola, K. F. Moeketsi, R. Sehobai, N. Pule
  7. Eight-State BB84: A C# Simulation
    Liliana Zisu
  8. Context Aware Anomaly Behavior Analysis for Smart Home Systems
    Zhiwen Pan, Jesus Pacheco, Salim Hariri, Yiqiang Chen, Bozhi Liu
  9. Proposal of Optimality Evaluation for Quantum Secure Communication Protocols by Taking the Average of the Main Protocol Parameters: Efficiency, Security and Practicality
    Georgi Bebrov, Rozalina Dimova
  10. Information Security Risk Management in IT-Based Process Virtualization: A Methodological Design Based on Action Research
    Jefferson Camacho Mejía, Jenny Paola Forero Pachón, Luis Carlos Gómez Flórez
  11. Analysis of Network Performance Using Aspect of Quantum Cryptography
    Nisarg A. Patel, Hiren B. Patel
  12. An Analysis of Digital Forensic Laboratory Development among Malaysia’s Law Enforcement Agencies
    Sarah K. Taylor, Miratun M. Saharuddin, Zabri A. Talib
  13. A Multi-Science Study of Modern Synergetic War and Its Information Security Component
    Alexander G. Yushchenko
  14. Hybrid Anomaly Detection Using Decision Tree and Support Vector Machine
    Elham Serkani, Hossein Gharaee Garakani, Naser Mohammadzadeh, Elaheh Vaezpour
  15. An Authentication Protocol for Quantum Enabled Mobile Devices
    Natarajan Venkatachalam, Subrahmanya V. R. K. Rao, Vijay Karthikeyan Dhandapani, Swaminathan Saravanavel
Poonam Dharam Saginaw Valley State University, US
Rajasekhar Chaganti University of Texas at San Antonio, US
Douglas Kelly Johns Hopkins University Applied Physics Laboratory, US
Cong Wang University of North Carolina at Chapel Hill, US
Harvey Hyman Saint Leo University, US
Shashank Shanbhag Salesforce, US
Yizhen Liu Research Institue of Huawei at U.S., US
Rajdeep Bhowmik Cisco Systems Inc., US
James Nelson New Mexico State University, US
Apurva Mohan Honeywell Research Labs, US
Ping Wang University of Maryland University College, US
Niraj Shakhakarmi Prairie View A and M University, US
Guoxiang Liu University of North Dakota, US
Danda Rawat Old Dominion University, US
Mengyu Qiao New Mexico Institute of Mining and Technology, US
Shiping Chen Sybase, Inc, US
Wei Yan Trend Micro Inc, US
Fangyang Shen Ali Northern New Mexico College, US
Guangzhi Qu Oakland University, US
Te - Shun Chou East Carolina University, US
Ali Al-Sherbaz The University of Northampton, UK
Elhadj Benkhelifa Staffordshire University, UK
Mohammed Rezaul Karim Guildhall College, UK
Kamal Alezabi UCSI University, MY
Khaled Nagaty The British University in Egypt, EG
Raaid Alubady University of Babylon, IQ
Ar Junejo Harbin Institute of Technology, CN
Abdulrahman Aloufi Curtin University, AU
Tahar Mekhaznia University of Tebessa, DZ
Sudhanshu Gonge Vishwakarma Institute of Technology, IN
会议日程
Abstracts/Full-Text Paper Submission Deadline   January 06, 2020
Notification of Acceptance/Rejection   January 28, 2020
Final Paper (Camera Ready) Submission & Early Bird Registration Deadline   May 04, 2021
Conference Dates   June 03-04, 2021
参会指南
会议地点
×