Topics
Potential topics in this conference include, but are not limited to:
Networking
- Wireless/mobile networks (WBAN/WPAN/WLAN/WMAN/WWAN)
- 5G/6G cellular systems and heterogeneous networks
- WSN
- Autonomous networking
- Cognitive radio, cooperative communication and networking
- Content distribution network (CDN)
- Contents/Information centric networking (CCN/ICN)
- Cross-layer design and optimization
- Cyber-physical system (CPS)
- Delay/Disruption tolerant network (DTN)
- Device-to-device communications
- Energy-efficient protocols, green networks, and smart grid
- Internet of things (IoT) and machine-to-machine (M2M) communications
- Network performance analysis/measurement and evaluation
- Network security, trust and privacy
- Network simulation and modeling
- Network survivability and reliability
- Operating systems and middleware support for networking
- Peer-to-peer (P2P)/Overlay networks
- Pricing and billing
- QoS/QoE and resource management
- Software defined networking (SDN) and network virtualization
- Vehicular and underwater networks
- Ubiquitous home and office networking
|
Information Systems & Intelligence
- Fog/Edge Computing
- Machine Intelligence
- Soft Computing Techniques and Neural Networks
- Artificial Intelligence
- Swarm Intelligence and Optimization
- Data Mining and Business Intelligence
- Deep Learning
- Machine learning and pattern recognition
- Computational intelligence
- Granular computing and cloud computing
- Social computing and networks
- Web of Things (WoT) and web-based applications
- Parallel Processing
- Big data Analytics
- Image Processing
- Data Mining and Analytics
- Parallel and Distributed Computing for knowledge mining algorithms
- Knowledge Base Development Models for AI
- Knowledge Extraction tools and strategies
- Recommender Systems
- Strategies for knowledge based market development
|
Security
- Cryptography
- Quantum Cryptology
- Symmetric and Asymmetric Cryptographic Protocols
- Random generators and pseudorandom
- Algebraic Cryptanalysis and polynomial systems
- hardware implementations and side channel attacks
- protocols based on identity or attributes
- Intrusion Detection & Prevention
- Mobile Security
- Smart cards Security
- Identity and Security in IoT
- Security Policies, Formal methods & verification
- Access Control Models
- Security, Privacy, Trust infrastructure and technologies
- Communication and Information Security
- Network Security
- Security and Privacy for Smart Systems
- Security and privacy for big data
- Security architectures
- Distributed systems security
- Mobile and web security
- Cloud Security
- Embedded systems security
- Web-based Application security
- Information Hiding
- Steganography
- Watermarking
- Fingerprinting
- Cryptography of algebraic curves
- Euclidean networks Based Cryptography
- Stream ciphers
|
Digital Forensics
- Forensic processes and procedures
- Big Data in digital forensics
- Network and log forensics
- Software and hardware forensic tools
- Small-scale digital devices forensics
- Messaging forensics
- Anti-Forensic and steganography
- Cloud forensics: technical, jurisdiction and legal challenges
- Digital forensics and cybercrime laws
- Role of Big Data in forensic analysis
- IoT forensics
- Cybercrime laws and procedures
- Digital forensics and social crimes
- Digital forensics and financial crimes
- Digital forensics and homeland security
- Email forensics
- Digital crime scene investigation
- Digital forensics tools testing and evaluation
|
..
IMPORTANT DATES
Paper Submission Due |
November 18, 2018 |
Acceptance Notification |
January 20, 2019 |
Camera-ready Papers Due |
February 10, 2019 |
Author Registration Due |
February 17, 2019 |
Conference Dates |
March 27-28, 2019 |