The International Research Conference Aims and Objectives
The International Research Conference is a federated organization dedicated to bringing together a significant number of diverse scholarly events for presentation
within the conference program. Events will run over a span of time during the conference depending on the number and length of the presentations.
With its high quality, it provides an exceptional value for students, academics and industry researchers.
International Conference on Communications and Network Security
aims to bring together leading academic scientists, researchers and research scholars to exchange and share their experiences and research results on all aspects of
Communications and Network Security.
It also provides a premier interdisciplinary platform for researchers, practitioners and educators to present and discuss the most recent innovations,
trends, and concerns as well as practical challenges encountered and solutions adopted in the fields of Communications and Network Security.
Call for Contributions
Prospective authors are kindly encouraged to contribute to and help shape the conference through submissions of their research abstracts, papers and e-posters.
Also, high quality research contributions describing original and unpublished results of conceptual, constructive, empirical, experimental, or
theoretical work in all areas of Communications and Network Security are cordially invited for presentation at the conference.
The conference solicits contributions of abstracts, papers and e-posters that address themes and topics of the conference, including figures, tables and references of
novel research materials.
Guidelines for Authors
Please ensure your submission meets the conference's strict guidelines for accepting scholarly papers.
Downloadable versions of the check list for
Full-Text Papers and
Abstract Papers.
Please refer to the
Paper Submission Guideline,
Abstract Submission Guideline and
Author Information
before submitting your paper.
Conference Proceedings
All submitted conference papers will be blind peer reviewed by three competent reviewers.
The peer-reviewed conference proceedings are indexed in the Open Science Index,
Google Scholar,
Semantic Scholar,
Zenedo,
BASE,
WorldCAT,
Sherpa/RoMEO,
and other index databases. Impact Factor Indicators.
Special Journal Issues
20. International Conference on Communications and Network Security has teamed up with the Special Journal Issue on
Communications and Network Security.
A number of selected high-impact full text papers will also be considered for the special journal issues.
All submitted papers will have the opportunity to be considered for this Special Journal Issue.
The paper selection will be carried out during the peer review process as well as at the conference presentation stage.
Submitted papers must not be under consideration by any other journal or publication.
The final decision for paper selection will be made based on peer review reports by the Guest Editors and the Editor-in-Chief jointly.
Selected full-text papers will be published online free of charge.
Conference Sponsor and Exhibitor Opportunities
The Conference offers the opportunity to become a conference sponsor or exhibitor.
To participate as a sponsor or exhibitor, please download and complete the
Conference Sponsorship Request Form.
Selected Papers
-
Usage of Channel Coding Techniques for Peak-to-Average Power Ratio Reduction in Visible Light Communications Systems
P.L.D.N.M. de Silva, S.G. Edirisinghe, R. Weerasuriya
-
A Practice of Zero Trust Architecture in Financial Transactions
L. Wang, Y. Chen, T. Wu, S. Hu
-
Experimental Characterization of the Color Quality and Error Rate for an Red, Green, and Blue-Based Light Emission Diode-Fixture Used in Visible Light Communications
Juan F. Gutierrez, Jesus M. Quintero, Diego Sandoval
-
Cyber Security Enhancement via Software-Defined Pseudo-Random Private IP Address Hopping
Andre Slonopas, Warren Thompson, Zona Kostic
-
A Review in Recent Development of Network Threats and Security Measures
Roza Dastres, Mohsen Soori
-
Antenna for Energy Harvesting in Wireless Connected Objects
Nizar Sakli, Chayma Bahar, Chokri Baccouch, Hedi Sakli
-
An Overview of Technology Availability to Support Remote Decentralized Clinical Trials
S. Huber, B. Schnalzer, B. Alcalde, S. Hanke, L. Mpaltadoros, T. G. Stavropoulos, S. Nikolopoulos, I. Kompatsiaris, L. Pérez-Breva, V. Rodrigo-Casares, J. Fons-Martínez, J. de Bruin
-
Reducing the Need for Multi-Input Multi-Output in Multi-Beam Base Transceiver Station Antennas Using Orthogonally-Polarized Feeds with an Arbitrary Number of Ports
Mohamed Sanad, Noha Hassan
-
Alternative Key Exchange Algorithm Based on Elliptic Curve Digital Signature Algorithm Certificate and Usage in Applications
A. Andreasyan, C. Connors
-
Dual-Polarized Multi-Antenna System for Massive MIMO Cellular Communications
Naser Ojaroudi Parchin, Haleh Jahanbakhsh Basherlou, Raed A. Abd-Alhameed, Peter S. Excell
-
60 GHz Multi-Sector Antenna Array with Switchable Radiation-Beams for Small Cell 5G Networks
N. Ojaroudi Parchin, H. Jahanbakhsh Basherlou, Y. Al-Yasir, A. M. Abdulkhaleq, R. A. Abd-Alhameed, P. S. Excell
-
Context Aware Anomaly Behavior Analysis for Smart Home Systems
Zhiwen Pan, Jesus Pacheco, Salim Hariri, Yiqiang Chen, Bozhi Liu
-
Changes in Student Definition of De-Escalation in Professional Peace Officer Education
Pat Nelson
-
Off-Policy Q-learning Technique for Intrusion Response in Network Security
Zheni S. Stefanova, Kandethody M. Ramachandran
-
Relation of Optimal Pilot Offsets in the Shifted Constellation-Based Method for the Detection of Pilot Contamination Attacks
Dimitriya A. Mihaylova, Zlatka V. Valkova-Jarvis, Georgi L. Iliev
Conference venue information will be released soon.
Communications and network security
Anonymity and privacy technologies
Computer and network forensics
Cyber deterrence strategies
Game-theoretic security technologies
Implementation and evaluation of networked security systems
Information-theoretic security
Intrusion detection, prevention, and response
Key management, public key infrastructures, certification, revocation, and authentication
Malware detection and mitigation
Security metrics and models
Physical-layer and cross-layer security technologies
Security and privacy for big data
Security and privacy for data and network outsourcing services
Security and privacy for mobile and wearable devices
Security and privacy in cellular networks
Security and privacy in cloud and edge computing
Security and privacy in crowdsourcing
Security and privacy in emerging wireless technologies (dynamic spectrum sharing, cognitive radio networks, millimeter wave communications, MIMO systems, etc.)
Security and privacy in peer-to-peer and overlay networks
Security and privacy in WiFi, ad hoc, mesh, sensor, vehicular, body-area, disruption/delay tolerant, and social networks.
Security and privacy in smart cities, smart and connected health, IoT, and RFID systems
Security for critical infrastructures (smart grids, transportation systems, etc.)
Security for future Internet architectures and designs
Security for software-defined and data center networks
Social, economic, and policy issues of trust, security, and privacy
Traffic analysis
Usable security and privacy
Web, e-commerce, m-commerce, and e-mail security
Abstracts/Full-Text Paper Submission Deadline |
|
February 13, 2025 |
Notification of Acceptance/Rejection |
|
February 27, 2025 |
Final Paper (Camera Ready) Submission & Early Bird Registration Deadline |
|
April 23, 2026 |
Conference Dates |
|
May 24-25, 2026 |