The International Research Conference Aims and Objectives
The International Research Conference is a federated organization dedicated to bringing together a significant number of diverse scholarly events for presentation
within the conference program. Events will run over a span of time during the conference depending on the number and length of the presentations.
With its high quality, it provides an exceptional value for students, academics and industry researchers.
ICDSS 2022: 16. International Conference on Defence and Security Sciences
aims to bring together leading academic scientists, researchers and research scholars to exchange and share their experiences and research results on all aspects of
Defence and Security Sciences.
It also provides a premier interdisciplinary platform for researchers, practitioners and educators to present and discuss the most recent innovations,
trends, and concerns as well as practical challenges encountered and solutions adopted in the fields of Defence and Security Sciences
Call for Contributions
Prospective authors are kindly encouraged to contribute to and help shape the conference through submissions of their research abstracts, papers and e-posters.
Also, high quality research contributions describing original and unpublished results of conceptual, constructive, empirical, experimental, or
theoretical work in all areas of Defence and Security Sciences are cordially invited for presentation at the conference.
The conference solicits contributions of abstracts, papers and e-posters that address themes and topics of the conference, including figures, tables and references of
novel research materials.
Guidelines for Authors
Please ensure your submission meets the conference's strict guidelines for accepting scholarly papers.
Downloadable versions of the check list for
Full-Text Papers and
Abstract Papers.
Please refer to the
Paper Submission Guideline,
Abstract Submission Guideline and
Author Information
before submitting your paper.
Conference Proceedings
All submitted conference papers will be blind peer reviewed by three competent reviewers.
The peer-reviewed conference proceedings are indexed in the Open Science Index,
Google Scholar,
Semantic Scholar,
Zenedo,
OpenAIRE,
BASE,
WorldCAT,
Sherpa/RoMEO,
and other index databases. Impact Factor Indicators.
Special Journal Issues
ICDSS 2022 has teamed up with the Special Journal Issue on
Defence and Security Sciences.
A number of selected high-impact full text papers will also be considered for the special journal issues.
All submitted papers will have the opportunity to be considered for this Special Journal Issue.
The paper selection will be carried out during the peer review process as well as at the conference presentation stage.
Submitted papers must not be under consideration by any other journal or publication.
The final decision for paper selection will be made based on peer review reports by the Guest Editors and the Editor-in-Chief jointly.
Selected full-text papers will be published online free of charge.
Conference Sponsor and Exhibitor Opportunities
The Conference offers the opportunity to become a conference sponsor or exhibitor.
To participate as a sponsor or exhibitor, please download and complete the
Conference Sponsorship Request Form.
Selected Papers
-
Feature Analysis of Predictive Maintenance Models
Zhaoan Wang
-
Exploring the Need to Study the Efficacy of VR Training Compared to Traditional Cybersecurity Training
Shaila Rana, Wasim Alhamdani
-
Building an Integrated Relational Database from Swiss Nutrition National Survey and Swiss Health Datasets for Data Mining Purposes
Ilona Mewes, Helena Jenzer, Farshideh Einsele
-
Performance Analysis of Traffic Classification with Machine Learning
Htay Htay Yi, Zin May Aye
-
The Effects of Cross-Border Use of Drones in Nigerian National Security
H. P. Kerry
-
A Second Look at Gesture-Based Passwords: Usability and Vulnerability to Shoulder-Surfing Attacks
Lakshmidevi Sreeramareddy, Komalpreet Kaur, Nane Pothier
-
Trusting Smart Speakers: Analysing the Different Levels of Trust between Technologies
Alec Wells, Aminu Bello Usman, Justin McKeown
-
A Review in Recent Development of Network Threats and Security Measures
Roza Dastres, Mohsen Soori
-
Integration of Educational Data Mining Models to a Web-Based Support System for Predicting High School Student Performance
Sokkhey Phauk, Takeo Okazaki
-
Comparing Machine Learning Estimation of Fuel Consumption of Heavy-Duty Vehicles
Victor Bodell, Lukas Ekstrom, Somayeh Aghanavesi
-
An Application for Risk of Crime Prediction Using Machine Learning
Luis Fonseca, Filipe Cabral Pinto, Susana Sargento
-
Improving Fake News Detection Using K-means and Support Vector Machine Approaches
Kasra Majbouri Yazdi, Adel Majbouri Yazdi, Saeid Khodayi, Jingyu Hou, Wanlei Zhou, Saeed Saedy
-
Author Profiling: Prediction of Learners’ Gender on a MOOC Platform Based on Learners’ Comments
Tahani Aljohani, Jialin Yu, Alexandra. I. Cristea
-
Machine Learning Techniques in Bank Credit Analysis
Fernanda M. Assef, Maria Teresinha A. Steiner
-
The Forensic Swing of Things: The Current Legal and Technical Challenges of IoT Forensics
Pantaleon Lutta, Mohamed Sedky, Mohamed Hassan
Machine Learning for Data Mining
Data Mining Methods for Security
Agent and Multi-Agent Systems
Hybrid Systems
Unsupervised Learning
Classification Methods
Novelty Detection
Intrusion Detection Systems
Log Correlation Methods
Adaptive Defense of Network Infrastructure
Adaptive Reasoning
Information Forensics
Document Classification and Processing
Ontologies and Conceptual Information Processing
Semantic Information Representation
Natural Language Acquisition
Web Semantics in Intelligence and Law-Enforcement
Industrial and Commercial Applications of Intelligent Methods for Security
Intelligent Control and Monitoring of Critical Systems
Dynamic Adaptive Railway Operation
Centralized Control Systems
Adaptive Planning for Strategic Reasoning
Intelligent Methods in Energy and Transportation
Planning and Automated Reasoning in Large System Control
Biometric Identification and Recognition
Biometric Surveillance
Biometric Access Control
Extraction of Biometric Features (fingerprint, iris, face, voice, palm, gait)
Cryptography
Applied Cryptography and provably-secure cryptographic protocols
Design and analysis of efficient cryptographic primitives:
public-key and symmetric-key cryptosystems, block ciphers, and hash functions
Economic fraud on the Internet: phishing, pharming, spam, and click fraud
Email and web security
Intellectual property protection:
metering, watermarking, and digital rights management.
Computer Science, namely on HPC and Grid computing issues
Computational Sciences, with requirements in HPC and Grid
Computational Engineering with a similar focus.
Grid Middleware, Grid Computing, Data and Networking Infrastructures
Distributed and Large-Scale Data Access and Management
Data Repositories, Distributed Resource Management and Scheduling
Supercomputer/cluster/grid integration issues
Grid Performance Evaluation, QoS and SLA Negotiation
Grid and HPC Applications, including e-Science in general and also Science Gateways, Nanomaterials, High Energy Physics, e-Health, e-Business, e-Administration, Life Sciences, Earth Sciences, Civil Protection, Computational Sciences and Engineering, ...
User Development Environments and Programming Tools for Grid Computing.
Infrastructure as a service (IaaS)
Virtualization in data centers
Virtualization for resource management and QoS assurance
Security aspects of using virtualization in a distributed environment
Virtual networks
Virtual data, storage as a service
Fault tolerance in virtualized environments
Virtualization in P2P systems
Virtualization-based adaptive/autonomic systems
The creation and management of environments/appliances
Virtualization technologies
Performance modeling (applications and systems)
Virtualization techniques for energy/thermal management
Case studies of applications on IaaS platforms
Deployment studies of virtualization technologies
Tools relevant to virtualization
Abstracts/Full-Text Paper Submission Deadline |
|
March 16, 2021 |
Notification of Acceptance/Rejection |
|
April 01, 2021 |
Final Paper (Camera Ready) Submission & Early Bird Registration Deadline |
|
March 08, 2022 |
Conference Dates |
|
April 08-09, 2022 |
Elias Maragos |
University of Piraeus, GR |
Dimitrios Zissis |
University of the Aegean, GR |
Charalampos Bratsas |
Aristotle University of Thessaloniki, GR |
Efstratia Mourtou |
St. Andrew General Hospital,Patras, GR |
Sotiris Kotsiantis |
University of Patras, GR |
Ali Al-Sherbaz |
The University of Northampton, UK |
Norlaily Yaacob |
Coventry University, UK |
Mohammed Rezaul Karim |
Guildhall College, UK |
Chee Seng Chan |
University of Portsmouth, UK |
Huseyin Seker |
De Montfort University, UK |
Rushit Dave |
University Of Wisconsin, Eau Claire, US |
Akansha Kumar |
Texas A&M University, US |
Mohammad Shekaramiz |
Utah Valley University, US |
Poonam Dharam |
Saginaw Valley State University, US |
Rajasekhar Chaganti |
University of Texas at San Antonio, US |
Chung Hyun Goh |
University of Texas at Tyler, US |
Douglas Kelly |
Johns Hopkins University Applied Physics Laboratory, US |
Vahid Heydari |
Rowan University, US |
Akilesh Rajavenkatanarayanan |
The University of Texas at Arlington, US |
Mahdi Imani |
George Washington University, US |
Dennis Jjuuko |
University of Massachusetts Boston, US |
Arash Mahyari |
Florida Institute For Human and Machine Cognition, US |
Samir Iqbal |
University of Texas Rio Grande Valley, US |
Pat Nelson |
Minnesota State University Mankato, US |
Jessy Abouarab |
Florida International University, US |
Nalanda Roy |
Georgia Southern University, US |
Nagdev Amruthnath |
Western Michigan University, US |
Marian Leerburger |
US Government, US |
Sergio Davalos |
University of Washington Tacoma, US |
Ayush Singhal |
University of Minnesota, Twin Cities, US |
Participation Type |
Early Registration Ticket Fees |
Registration Ticket Fees |
Non-Student Oral/Poster Presenter Registration |
€ 450 |
€ 500 |
Student Oral/Poster Presenter Registration |
€ 350 |
€ 400 |
Listener Registration |
€ 250 |
€ 300 |
Additional Paper Publication |
€ 100 |
All conference materials and services will be delivered digitally to the participant with the online conference management system.
Conference registration includes the following digital materials and services:
- e-certificates [for Authors: Certificate of Attendance and Presentation; for Listeners: Certificate of Attendance; for Chairs: Certificate of Attendance and Appreciation; for Presenters: Certificate of Best Presentation (if conferred based appraisal)]
- e-program
- e-book
- e-name badge
- e-receipt
- e-presentation
Presentation Types:
-
Physical presentation is an oral conferencing presentation that is made using digital technology including embedded digital elements ( texts, tables, graphs, or videos ) for PowerPoint sharing.
-
Digital presentation is a digital conferencing presentation that is made using digital technology including embedded digital elements ( texts, tables, graphs, or videos ) for PowerPoint sharing.
Early Bird Registration
Early Bird registration is valid until 2022-03-08 23:59:59
Online Credit Card Processing
Online payment option available for author
and listener delegates.
Conference participants can make online credit card payments for conference registration fees.