Open Science Research Excellence

ICCNSS 2020 : International Conference on Computer Networks and Systems Security

Rio de Janeiro, Brazil
March 2 - 3, 2020

Conference Code: 20BR03ICCNSS

Conference Proceedings

All submitted conference papers will be blind peer reviewed by three competent reviewers. The peer-reviewed conference proceedings are indexed in the Open Science Index, Google Scholar, Semantic Scholar, Zenedo, OpenAIRE, BASE, WorldCAT, Sherpa/RoMEO, and other index databases. Impact Factor Indicators.

Special Journal Issues

ICCNSS 2020 has teamed up with the Special Journal Issue on Computer Networks and Systems Security. A number of selected high-impact full text papers will also be considered for the special journal issues. All submitted papers will have the opportunity to be considered for this Special Journal Issue. The paper selection will be carried out during the peer review process as well as at the conference presentation stage. Submitted papers must not be under consideration by any other journal or publication. The final decision for paper selection will be made based on peer review reports by the Guest Editors and the Editor-in-Chief jointly. Selected full-text papers will be published online free of charge.

Conference Sponsor and Exhibitor Opportunities

The Conference offers the opportunity to become a conference sponsor or exhibitor. To participate as a sponsor or exhibitor, please download and complete the Conference Sponsorship Request Form.

Important Dates

Abstracts/Full-Text Paper Submission Deadline   July 1, 2019
Notification of Acceptance/Rejection   July 16, 2019
Final Paper (Camera Ready) Submission & Early Bird Registration Deadline   February 4, 2020
Conference Dates   March 2 - 3, 2020

Important Notes

Please ensure your submission meets the conference's strict guidelines for accepting scholarly papers. Downloadable versions of the check list for Full-Text Papers and Abstract Papers.

Please refer to the Paper Submission GUIDE before submitting your paper.

Selected Conference Papers

1) Algorithm for Path Recognition in-between Tree Rows for Agricultural Wheeled-Mobile Robots
Anderson Rocha, Pedro Miguel de Figueiredo Dinis Oliveira Gaspar
2) Standalone Docking Station with Combined Charging Methods for Agricultural Mobile Robots
Leonor Varandas, Pedro D. Gaspar, Martim L. Aguiar
3) A Study of the Assistant Application for Tourists Taking Metros
Anqi Wang, Linye Zhang
4) Path-Tracking Controller for Tracked Mobile Robot on Rough Terrain
Toshifumi Hiramatsu, Satoshi Morita, Manuel Pencelli, Marta Niccolini, Matteo Ragaglia, Alfredo Argiolas
5) Cybersecurity Protection Structures: The Case of Lesotho
N. N. Mosola, K. F. Moeketsi, R. Sehobai, N. Pule
6) A Functional Thermochemical Energy Storage System for Mobile Applications: Design and Performance Analysis
Jure Galović, Peter Hofmann
7) An Active Rectifier with Time-Domain Delay Compensation to Enhance the Power Conversion Efficiency
Shao-Ku Kao
8) An Improved Dynamic Window Approach with Environment Awareness for Local Obstacle Avoidance of Mobile Robots
Baoshan Wei, Shuai Han, Xing Zhang
9) Study on Wireless Transmission for Reconnaissance UAV with Wireless Sensor Network and Cylindrical Array of Microstrip Antennas
Chien-Chun Hung, Chun-Fong Wu
10) Context Aware Anomaly Behavior Analysis for Smart Home Systems
Zhiwen Pan, Jesus Pacheco, Salim Hariri, Yiqiang Chen, Bozhi Liu
11) State of Play of Mobile Government Apps on Google Play Store
Abdelbaset Rabaiah
12) Managing City Pipe Leaks through Community Participation Using a Web and Mobile Application in South Africa
Mpai Mokoena, Nsenda Lukumwena
13) Specific Emitter Identification Based on Refined Composite Multiscale Dispersion Entropy
Shaoying Guo, Yanyun Xu, Meng Zhang, Weiqing Huang
14) Maximization of Lifetime for Wireless Sensor Networks Based on Energy Efficient Clustering Algorithm
Frodouard Minani
15) The Security Trade-Offs in Resource Constrained Nodes for IoT Application
Sultan Alharby, Nick Harris, Alex Weddell, Jeff Reeve

Similar conferences about Computer and Information Engineering