The International Research Conference Aims and Objectives
The International Research Conference is a federated organization dedicated to bringing together a significant number of diverse scholarly events for presentation
within the conference program. Events will run over a span of time during the conference depending on the number and length of the presentations.
With its high quality, it provides an exceptional value for students, academics and industry researchers.
ICCNSS 2021: 15. International Conference on Computer Networks and Systems Security
aims to bring together leading academic scientists, researchers and research scholars to exchange and share their experiences and research results on all aspects of
Computer Networks and Systems Security.
It also provides a premier interdisciplinary platform for researchers, practitioners and educators to present and discuss the most recent innovations,
trends, and concerns as well as practical challenges encountered and solutions adopted in the fields of Computer Networks and Systems Security
Call for Contributions
Prospective authors are kindly encouraged to contribute to and help shape the conference through submissions of their research abstracts, papers and e-posters.
Also, high quality research contributions describing original and unpublished results of conceptual, constructive, empirical, experimental, or
theoretical work in all areas of Computer Networks and Systems Security are cordially invited for presentation at the conference.
The conference solicits contributions of abstracts, papers and e-posters that address themes and topics of the conference, including figures, tables and references of
novel research materials.
Guidelines for Authors
Please ensure your submission meets the conference's strict guidelines for accepting scholarly papers.
Downloadable versions of the check list for
Full-Text Papers and
Abstract Papers.
Please refer to the
Paper Submission Guideline,
Abstract Submission Guideline and
Author Information
before submitting your paper.
Conference Proceedings
All submitted conference papers will be blind peer reviewed by three competent reviewers.
The peer-reviewed conference proceedings are indexed in the Open Science Index,
Google Scholar,
Semantic Scholar,
Zenedo,
OpenAIRE,
BASE,
WorldCAT,
Sherpa/RoMEO,
and other index databases. Impact Factor Indicators.
Special Journal Issues
ICCNSS 2021 has teamed up with the Special Journal Issue on
Computer Networks and Systems Security.
A number of selected high-impact full text papers will also be considered for the special journal issues.
All submitted papers will have the opportunity to be considered for this Special Journal Issue.
The paper selection will be carried out during the peer review process as well as at the conference presentation stage.
Submitted papers must not be under consideration by any other journal or publication.
The final decision for paper selection will be made based on peer review reports by the Guest Editors and the Editor-in-Chief jointly.
Selected full-text papers will be published online free of charge.
Conference Sponsor and Exhibitor Opportunities
The Conference offers the opportunity to become a conference sponsor or exhibitor.
To participate as a sponsor or exhibitor, please download and complete the
Conference Sponsorship Request Form.
Selected Papers
-
User Requirements Analysis for the Development of Assistive Navigation Mobile Apps for Blind and Visually Impaired People
Paraskevi Theodorou, Apostolos Meliones
-
Dual-Polarized Multi-Antenna System for Massive MIMO Cellular Communications
Naser Ojaroudi Parchin, Haleh Jahanbakhsh Basherlou, Raed A. Abd-Alhameed, Peter S. Excell
-
Design of Wireless and Traceable Sensors for Internally Illuminated Photoreactors
Alexander Sutor, David Demetz
-
A Design of Beam-Steerable Antenna Array for Use in Future Mobile Handsets
Naser Ojaroudi Parchin, Atta Ullah, Haleh Jahanbakhsh Basherlou, Raed A. Abd-Alhameed, Peter S. Excell
-
Discussing Embedded versus Central Machine Learning in Wireless Sensor Networks
Anne-Lena Kampen, Øivind Kure
-
Keyloggers Prevention with Time-Sensitive Obfuscation
Chien-Wei Hung, Fu-Hau Hsu, Chuan-Sheng Wang, Chia-Hao Lee
-
The Use of Mobile Phones by Refugees to Create Social Connectedness: A Literature Review
Sarah Vuningoma, Maria Rosa Lorini, Wallace Chigona
-
International Service Learning 3.0: Using Technology to Improve Outcomes and Sustainability
Anthony Vandarakis
-
Reduction of Energy Consumption Using Smart Home Techniques in the Household Sector
Ahmed Al-Adaileh, Souheil Khaddaj
-
Improving Cyber Resilience in Mobile Field Hospitals: Towards an Assessment Model
Nasir Baba Ahmed, Nicolas Daclin, Marc Olivaux, Gilles Dusserre
-
Algorithm for Path Recognition in-between Tree Rows for Agricultural Wheeled-Mobile Robots
Anderson Rocha, Pedro Miguel de Figueiredo Dinis Oliveira Gaspar
-
Cybersecurity Protection Structures: The Case of Lesotho
N. N. Mosola, K. F. Moeketsi, R. Sehobai, N. Pule
-
Context Aware Anomaly Behavior Analysis for Smart Home Systems
Zhiwen Pan, Jesus Pacheco, Salim Hariri, Yiqiang Chen, Bozhi Liu
-
An Improved Dynamic Window Approach with Environment Awareness for Local Obstacle Avoidance of Mobile Robots
Baoshan Wei, Shuai Han, Xing Zhang
-
A Functional Thermochemical Energy Storage System for Mobile Applications: Design and Performance Analysis
Jure Galović, Peter Hofmann
Digital Program consists of the e-proceedings book which is available online-only
and includes the conference communications (proceedings abstracts and papers).
Registered participants can access the digitally available conference
proceedings ( and certificates ) by visiting their profile pages.
Computer Networks and Systems Security
Active Defense Systems
Adaptive Defense Systems
Benchmark, Analysis and Evaluation of Security Systems
Distributed Access Control and Trust Management
Distributed Attack Systems and Mechanisms
Distributed Intrusion Detection/Prevention Systems
Denial-of-Service Attacks and Countermeasures
High Performance Security Systems
Identity Management and Authentication
Implementation, Deployment and Management of Security Systems
Information Systems Security
Intelligent Defense Systems
Internet and Network Forensics
Large-scale Attacks and Defense
RFID Security and Privacy
Security Architectures in Distributed Network Systems
Security for Critical Infrastructures
Security for P2P systems and Grid Systems
Security in E-Commerce
Security and Privacy in Wireless Networks
Secure Mobile Agents and Mobile Code
Security Protocols
Security Simulation and Tools
Security Theory and Tools in Network Systems
Standards and Assurance Methods
Viruses, Worms, and Other Malicious Code
World Wide Web Security
Abstracts/Full-Text Paper Submission Deadline |
|
January 06, 2021 |
Notification of Acceptance/Rejection |
|
January 28, 2021 |
Final Paper (Camera Ready) Submission & Early Bird Registration Deadline |
|
January 28, 2021 |
Conference Dates |
|
February 25-26, 2021 |
E. Prince Edward |
Sri Krishna Polytechnic College, IN |
Xiangjun Xin |
Zhengzhou University of Light Industry, CN |
Xiaoge Xu |
University of Nottingham Ningbo China, CN |
Li Xu |
Fujian Normal University, CN |
Guozhi Song |
Tianjin Polytechnic University, CN |
Adnan Qureshi |
University of Jinan, CN |
Yilun Shang |
Tongji University, CN |
Honghao Gao |
Shanghai university, CN |
Minhui Yan |
Shanghai Maritime University, CN |
Debiao He |
Wuhan Univerisity, CN |
Yuntao Wu |
Wuhan Institute of Technology, CN |
Liang He |
Nankai University, CN |
Jiyi WU |
Hangzhou Normal University , CN |
Soumit Salman Rahman |
Microsoft Corporation, CN |
Zhaogan Lu |
Xi'an Jiaoton University, CN |
YongBin Zhou |
Institute of Software, Chinese Academy of Sciences, CN |
Ali Al-Sherbaz |
The University of Northampton, UK |
Anjali Das |
TTE Systems Ltd (spin-out company from the University of Leicester), UK |
Salil Gunashekar |
University of Leicester, UK |
Gurvinder Singh Baicher |
University of Wales, Newport, UK |
Mohammed Rezaul Karim |
Guildhall College, UK |
Ayaz Keerio |
University of Sussex, UK |
Khaled Elbehiery |
DeVry University, US |
Poonam Dharam |
Saginaw Valley State University, US |
Rajasekhar Chaganti |
University of Texas at San Antonio, US |
Douglas Kelly |
Johns Hopkins University Applied Physics Laboratory, US |
Seyedmohammad Salehi |
University of Delaware, US |
Chen-Hsiang Yu |
Wentworth Institute of Technology, US |
Cong Wang |
University of North Carolina at Chapel Hill, US |
Shashank Shanbhag |
Salesforce, US |
Participation Type |
Early Registration Fees |
Registration Fees |
Non-Student Oral/Poster Presenter Registration |
€ 450 |
€ 500 |
Student Oral/Poster Presenter Registration |
€ 350 |
€ 400 |
Listener Registration |
€ 250 |
€ 300 |
Additional Paper Publication |
€ 100 |
All conference materials and services will be delivered digitally to the participant with the online conference management system.
Conference registration includes the following digital materials and services:
- e-certificates [for Authors: Certificate of Attendance and Presentation; for Listeners: Certificate of Attendance; for Chairs: Certificate of Attendance and Appreciation; for Presenters: Certificate of Best Presentation (if conferred based appraisal)]
- e-program
- e-book
- e-name badge
- e-receipt
- e-presentation
Presentation Types:
-
Physical presentation is an oral conferencing presentation that is made using digital technology including embedded digital elements ( texts, tables, graphs, or videos ) for PowerPoint sharing.
-
Digital presentation is a digital conferencing presentation that is made using digital technology including embedded digital elements ( texts, tables, graphs, or videos ) for PowerPoint sharing.
Early Bird Registration
Early Bird registration is valid until 2021-01-28 23:59:59
Online Credit Card Processing
Online payment option available for author
and listener delegates.
Conference participants can make online credit card payments for conference registration fees.