Open Science Research Excellence

ICMAS 2020 : International Conference on Mobile Application Security

Bangkok, Thailand
February 3 - 4, 2020

Conference Code: 20TH02ICMAS

Conference Proceedings

All submitted conference papers will be blind peer reviewed by three competent reviewers. The peer-reviewed conference proceedings are indexed in the Open Science Index, Google Scholar, Semantic Scholar, Zenedo, OpenAIRE, BASE, WorldCAT, Sherpa/RoMEO, and other index databases. Impact Factor Indicators.

Special Journal Issues

ICMAS 2020 has teamed up with the Special Journal Issue on Mobile Application Security. A number of selected high-impact full text papers will also be considered for the special journal issues. All submitted papers will have the opportunity to be considered for this Special Journal Issue. The paper selection will be carried out during the peer review process as well as at the conference presentation stage. Submitted papers must not be under consideration by any other journal or publication. The final decision for paper selection will be made based on peer review reports by the Guest Editors and the Editor-in-Chief jointly. Selected full-text papers will be published online free of charge.

Conference Sponsor and Exhibitor Opportunities

The Conference offers the opportunity to become a conference sponsor or exhibitor. To participate as a sponsor or exhibitor, please download and complete the Conference Sponsorship Request Form.

Important Dates

Abstracts/Full-Text Paper Submission Deadline   August 29, 2019
Notification of Acceptance/Rejection   September 10, 2019
Final Paper (Camera Ready) Submission & Early Bird Registration Deadline   January 4, 2020
Conference Dates   February 3 - 4, 2020

Important Notes

Please ensure your submission meets the conference's strict guidelines for accepting scholarly papers. Downloadable versions of the check list for Full-Text Papers and Abstract Papers.

Please refer to the Paper Submission GUIDE before submitting your paper.

Selected Conference Papers

1) Algorithm for Path Recognition in-between Tree Rows for Agricultural Wheeled-Mobile Robots
Anderson Rocha, Pedro Miguel de Figueiredo Dinis Oliveira Gaspar
2) Standalone Docking Station with Combined Charging Methods for Agricultural Mobile Robots
Leonor Varandas, Pedro D. Gaspar, Martim L. Aguiar
3) Cybersecurity Protection Structures: The Case of Lesotho
N. N. Mosola, K. F. Moeketsi, R. Sehobai, N. Pule
4) Lead and Cadmium Spatial Pattern and Risk Assessment around Coal Mine in Hyrcanian Forest, North Iran
Mahsa Tavakoli, Seyed Mohammad Hojjati, Yahya Kooch
5) Path-Tracking Controller for Tracked Mobile Robot on Rough Terrain
Toshifumi Hiramatsu, Satoshi Morita, Manuel Pencelli, Marta Niccolini, Matteo Ragaglia, Alfredo Argiolas
6) Proposal of Optimality Evaluation for Quantum Secure Communication Protocols by Taking the Average of the Main Protocol Parameters: Efficiency, Security and Practicality
Georgi Bebrov, Rozalina Dimova
7) A Study of the Assistant Application for Tourists Taking Metros
Anqi Wang, Linye Zhang
8) An Improved Dynamic Window Approach with Environment Awareness for Local Obstacle Avoidance of Mobile Robots
Baoshan Wei, Shuai Han, Xing Zhang
9) A Functional Thermochemical Energy Storage System for Mobile Applications: Design and Performance Analysis
Jure Galović, Peter Hofmann
10) A Combined Cipher Text Policy Attribute-Based Encryption and Timed-Release Encryption Method for Securing Medical Data in Cloud
G. Shruthi, Purohit Shrinivasacharya
11) Analyzing Environmental Emotive Triggers in Terrorist Propaganda
Travis Morris
12) The Two Layers of Food Safety and GMOs in the Hungarian Agricultural Law
Gergely Horváth
13) Context Aware Anomaly Behavior Analysis for Smart Home Systems
Zhiwen Pan, Jesus Pacheco, Salim Hariri, Yiqiang Chen, Bozhi Liu
14) State of Play of Mobile Government Apps on Google Play Store
Abdelbaset Rabaiah
15) The U.S. Missile Defense Shield and Global Security Destabilization: An Inconclusive Link
Michael A. Unbehauen, Gregory D. Sloan, Alberto J. Squatrito

Similar conferences about Computer and Information Engineering