您好,欢迎登录Mr.confs会先生官方网站!

ICCNS 2021: 15. International Conference on Communication and Networking Security

时间:2021-03-29 至 2021-03-30

ICCNS 2021: 15. International Conference on Communication and Networking Security
收藏0
ICCNS 2021: 15. International Conference on Communication and Networking Security
会议时间:2021-03-29 至 2021-03-30
会议地点: Singapore, Singapore,Singapore,Singapore 周边酒店预订

发票类型: 不支持开票
参会凭证:其它

门票信息
Participation Type Early Registration Ticket Fees Registration Ticket Fees
Non-Student Oral/Poster Presenter Registration € 450 € 500
Student Oral/Poster Presenter Registration € 350 € 400
Listener Registration € 250 € 300
Additional Paper Publication € 100
会议介绍

The International Research Conference Aims and Objectives

The International Research Conference is a federated organization dedicated to bringing together a significant number of diverse scholarly events for presentation within the conference program. Events will run over a span of time during the conference depending on the number and length of the presentations. With its high quality, it provides an exceptional value for students, academics and industry researchers.

ICCNS 2021: 15. International Conference on Communication and Networking Security aims to bring together leading academic scientists, researchers and research scholars to exchange and share their experiences and research results on all aspects of Communication and Networking Security. It also provides a premier interdisciplinary platform for researchers, practitioners and educators to present and discuss the most recent innovations, trends, and concerns as well as practical challenges encountered and solutions adopted in the fields of Communication and Networking Security

Call for Contributions

Prospective authors are kindly encouraged to contribute to and help shape the conference through submissions of their research abstracts, papers and e-posters. Also, high quality research contributions describing original and unpublished results of conceptual, constructive, empirical, experimental, or theoretical work in all areas of Communication and Networking Security are cordially invited for presentation at the conference. The conference solicits contributions of abstracts, papers and e-posters that address themes and topics of the conference, including figures, tables and references of novel research materials.

Guidelines for Authors

Please ensure your submission meets the conference's strict guidelines for accepting scholarly papers. Downloadable versions of the check list for Full-Text Papers and Abstract Papers.

Please refer to the Paper Submission Guideline, Abstract Submission Guideline and Author Information before submitting your paper.

Conference Proceedings

All submitted conference papers will be blind peer reviewed by three competent reviewers. The peer-reviewed conference proceedings are indexed in the Open Science Index, Google Scholar, Semantic Scholar, Zenedo, OpenAIRE, BASE, WorldCAT, Sherpa/RoMEO, and other index databases. Impact Factor Indicators.

Special Journal Issues

ICCNS 2021 has teamed up with the Special Journal Issue on Communication and Networking Security. A number of selected high-impact full text papers will also be considered for the special journal issues. All submitted papers will have the opportunity to be considered for this Special Journal Issue. The paper selection will be carried out during the peer review process as well as at the conference presentation stage. Submitted papers must not be under consideration by any other journal or publication. The final decision for paper selection will be made based on peer review reports by the Guest Editors and the Editor-in-Chief jointly. Selected full-text papers will be published online free of charge.

Conference Sponsor and Exhibitor Opportunities

The Conference offers the opportunity to become a conference sponsor or exhibitor. To participate as a sponsor or exhibitor, please download and complete the Conference Sponsorship Request Form.

Selected Papers

  1. Exploring the Need to Study the Efficacy of VR Training Compared to Traditional Cybersecurity Training
    Shaila Rana, Wasim Alhamdani
  2. The Effects of Cross-Border Use of Drones in Nigerian National Security
    H. P. Kerry
  3. A Review in Recent Development of Network Threats and Security Measures
    Roza Dastres, Mohsen Soori
  4. Trusting Smart Speakers: Analysing the Different Levels of Trust between Technologies
    Alec Wells, Aminu Bello Usman, Justin McKeown
  5. Antenna for Energy Harvesting in Wireless Connected Objects
    Nizar Sakli, Chayma Bahar, Chokri Baccouch, Hedi Sakli
  6. A Secure Auditing Framework for Load Balancing in Cloud Environment
    R. Geetha, T. Padmavathy
  7. Knowledge Management in Academic: A Perspective of Academic Research Contribution to Economic Development of a Nation
    Hilary J. Watsilla, Narasimha R. Vajjhala
  8. Spreading Japan's National Image through China during the Era of Mass Tourism: The Japan National Tourism Organization’s Use of Sina Weibo
    Abigail Qian Zhou
  9. Modeling Engagement with Multimodal Multisensor Data: The Continuous Performance Test as an Objective Tool to Track Flow
    Mohammad H. Taheri, David J. Brown, Nasser Sherkat
  10. 60 GHz Multi-Sector Antenna Array with Switchable Radiation-Beams for Small Cell 5G Networks
    N. Ojaroudi Parchin, H. Jahanbakhsh Basherlou, Y. Al-Yasir, A. M. Abdulkhaleq, R. A. Abd-Alhameed, P. S. Excell
  11. Dual-Polarized Multi-Antenna System for Massive MIMO Cellular Communications
    Naser Ojaroudi Parchin, Haleh Jahanbakhsh Basherlou, Raed A. Abd-Alhameed, Peter S. Excell
  12. Investigation of the Physical Computing in Computational Thinking Practices, Computer Programming Concepts and Self-Efficacy for Crosscutting Ideas in STEM Content Environments
    Sarantos Psycharis
  13. A Character Detection Method for Ancient Yi Books Based on Connected Components and Regressive Character Segmentation
    Xu Han, Shanxiong Chen, Shiyu Zhu, Xiaoyu Lin, Fujia Zhao, Dingwang Wang
  14. Design of Wireless and Traceable Sensors for Internally Illuminated Photoreactors
    Alexander Sutor, David Demetz
  15. Malicious Vehicle Detection Using Monitoring Algorithm in Vehicular Adhoc Networks
    S. Padmapriya
E. Prince Edward Sri Krishna Polytechnic College, IN
Joaquim Brigas Institute Polytechnic of Guarda, PT
Liliana Vale Costa University of Aveiro, PT
Marisol B. Correia Algarve University, PT
Luís Mendes Gomes University of the Azores, PT
Tauseef Jamal Lusófona University, PT
Francisco Cesário ISPA Instituto Universitário, PT
Muhammad Ajmal Azad Faculdade de Engenharia da Universidade do Porto, PT
Antonio Costa Valente Aveiro University, PT
Binod Vaidya Institute of Telecommunications, PT
Ezendu Ariwa University of Bedfordshire, UK
Ali Al-Sherbaz The University of Northampton, UK
Elhadj Benkhelifa Staffordshire University, UK
Anjali Das TTE Systems Ltd (spin-out company from the University of Leicester), UK
Salil Gunashekar University of Leicester, UK
Mohamed Abdel-Maguid Staffordshire University, UK
Jian - Guo Zhang London South Bank University, UK
Norlaily Yaacob Coventry University, UK
Gurvinder Singh Baicher University of Wales, Newport, UK
Mohammed Rezaul Karim Guildhall College, UK
Zaigham Mahmood University of Derby, UK
Yuping Yang University of Exeter, UK
Ahmad Lotfi Nottingham Trent University, UK
Rushit Dave University Of Wisconsin, Eau Claire, US
Zhixuan Cao ANSYS Inc., US
Khaled Elbehiery DeVry University, US
Poonam Dharam Saginaw Valley State University, US
Rajasekhar Chaganti University of Texas at San Antonio, US
Douglas Kelly Johns Hopkins University Applied Physics Laboratory, US
Marquita Byrd San Jose State University, US
会议日程
Abstracts/Full-Text Paper Submission Deadline   February 15, 2021
Notification of Acceptance/Rejection   March 01, 2021
Final Paper (Camera Ready) Submission & Early Bird Registration Deadline   February 28, 2021
Conference Dates   March 29-30, 2021
参会指南
会议地点
×