征稿已开启

查看我的稿件

注册已开启

查看我的门票

已截止
活动简介

The conferences on network security and communication engineering is meant to serve as a forum for exchanging new developments and research progresses between scholars, scientists and engineers all over the world and providing a unique opportunity to exchange information, to present the latest results as well as to review the relevant issues on contemporary research in network security and communication engineering.

The joint conferences aimed at bringing together researchers, engineers and practitioners interested on Cyber Security and communication technologies,  including data communication networking, Intrusion Detection System , optical communication systems, security and cryptography. The purpose of these conferences is to investigate the current research trends, and help the stakeholders in industry and academia to better understand challenges, recent advances, and potential research directions in the developing field of security.

International Conferences on Cyber Security and Communication Systems invites researchers and practitioners from academia, industry and government, and accepts original, previously unpublished work. The scope of the conference is narrow to ensure a complementary match between capability and need. Papers should either be empirically or rationally based explorations of problems in cyber security and cyber forensic, or propose solutions and/or countermeasures to the most pressing cybercrimes.

 

The conference topics scope covers the standing series topics which includes among other topics Trust, Security and Privacy in Computing and Communications. In addition to the high technical standard expected of this conference, we aim to give all participants a real taste of the true Australian culture in the great city of Melbourne which internationally voted, for seven years in a row (2011-2017), the “World’s Most Liveable City”! 

The dedicated conference teams are currently working hard on making this conference not only intellectually stimulating but also an unforgettable pleasant experience for all participants.

We look forward to welcome you in IB2COM 2018 and CCC 2018 and wish you a fruitful and enjoyable stay in Australia.

组委会

Program Committee

  • A/Prof Johnson Agbinya, Melbourne Institute Technology, Australia

  • A/Prof Mamoun Alazab, Charles Darwin University, Australia

 

Organizing committee

  • Dr. Ammar Alazab, Melbourne Institute Technology, Australia

  • Dr. Imran Ali Jokhio, Melbourne Institute Technology, Australia

征稿信息

重要日期

2018-10-10
初稿截稿日期

All papers must be original and not simultaneously submitted to another journal or conference.

征稿范围

CyberSecuirty  (but are not limited to:)

Basic research and application papers related, but not limited to, the following topics are welcome:

 Cybercrime scenario analysis and reconstruction

  • Techniques for evidence collection, search, analysis, correlation and preservation and presentation
  • Security & Social Networks
  • Anomaly detection of web-based attacks
  • Malicious Spam detection
  • Botnet Detection and prevention
  • Wireless Network Security and Forensics
  • Cloud Computing Security and the Forensics of Big Data
  • Privacy, ethical and legal issues
  • Forensic Investigation of the Internet of Things
  • Anti-Forensics and Data Hiding Techniques and Discoveries
  • Malware Analysis and Memory Forensic Techniques
  •  Advanced Persistent Threats (APTs)
  • System Forensic Techniques for Windows, Linux, Mac, etc
  • File System Forensic Analysis
  • Hacking Techniques: Client-Side Attacks
  • Malicious Content Detection and Analysis Techniques
  • Societal Impact of Cybercrime
  • Defense against cyberterrorism
  • Monitoring and incident response
  • Tools and techniques for network forensics
  • Methodologies for digital forensics
  • Applications of Data Mining for Cybersecurity
  • Cybercrime detection and prevention
  • Mobile Forensics (e.g. Android and iOS devices) and the investigation of embedded devices
  • Forensic software tools and applications
  • Cybercrime Profiling
  •  Cybercrime: evolution, new trends and detection
  • Anti-malware techniques: detection, analysis, and prevention
  • Combating cybercrime: anti-phishing, anti-spam, anti-fraud techniques
  • Privacy and anonymity technologies
  •  Intrusion prevention, detection, and response
  • 5G Research Topics
  • Massive MIMO
  • Large-Scale Phased Arrays
  • Beam switching and tracking in 5G
  • Multilayer circular arrays in 5G
  • 5G Energy efficient systems
  • Generalized frequency division multiplex (GFDM),
  • Filter bank multicarrier (FBMC),
  • Universal filtered multicarrier (UFMC),
  • Filtered OFDM (f-OFDM)
  • Handover in 5G networks
  • 5G Propagation Models
  • 5G Channel Models and Measurements
  • Channel Coding
  • Small cells
  • Virtual Base Stations
  • Software defined networking
  • High efficiency Power amplifiers
  • Concurrent multi-band power amplifiers
  • New waveforms
  • None Orthogonal Multiple Access Schemes
  • Millimeter Wave Communications
  • Smart Cities
  • Smart Connected Homes
  • Massive Internet of Things (mIoT)
  • Massive Spatial Modulation Schemes
  • Vehicular Communication Systems
  • Relay Networks
  • Cooperative 5G Networks
  • 5G Security and Privacy
  • 5G Trials and Experiments
  • Hardware and Devices
  • 5G Transceiver Architectures
  • 5G STBC
  • 5G Cellular localisation
  • Low Latency Cellular and Vehicular Networks
  • Autonomous Networks
  • Cloud Radio Access Networks
  •  
  •  
  • Symposium on Wireless Power Transfer
  • Frequency splitting applications
  • Massive Inductive System Power control
  • Inductive Underwater communication systems
  • Micro-Power Systems for IoT devices
  • Inductive Power Base Stations
  • Multi-Dimensional WPT systems
  • Electric Vehicles
  • WPT for electric vehicles
  • WPT applications
  • Wireless Power Focusing
  • Energy Harvesting
  • Wireless Power Transfer Platforms
  • HetNets
  •  IoT and M2M
  • IoT and Machine to Machine Communications
  • IoT platforms
  • Medical IoT Systems
  • IoT Agric Applications
  • Autonomous Vehicles
  • Drone Networks
  • UAV Relaying
  • Massive Drone Route Planning
  • Biosensors
  • IoT Sensors
  • Internet of Vehicles
  • IoT Security Systems
  • Cryptographic Schemes for IoT
留言
验证码 看不清楚,更换一张
全部留言
重要日期
  • 会议日期

    12月10日

    2018

    12月12日

    2018

  • 10月10日 2018

    初稿截稿日期

  • 12月12日 2018

    注册截止日期

移动端
在手机上打开
小程序
打开微信小程序
客服
扫码或点此咨询