Mosharaka for Research and Studies
Login/Sign Up
Main Menu
Conferences Menu
Quick Links
Next Congress
Congresses

All Forthcoming Congresses

Conferences

All Forthcoming Conferences

32 days remaining to submit papers to MIC-ElectricApps 2024 in Irbid, Jordan
1st Mosharaka International Conference on Security of Communication and Computing Systems and Networks (MIC-Security -0001)
30-29 November -0001, ,

GC- -0001 Special

Technology
Conferences Links
  • Introduction
  • Author Kit
  • Submissions
  • CFP
  • Welcome
  • Why MIC-Security -0001?
  • Dates
Welcome to MIC-Security -0001
Welcome to the 1st Mosharaka International Conference on Security of Communication and Computing Systems and Networks (MIC-Security -0001). This event is intended to represent a major forum for researchers, professionals and students from all over the world to meet in the beautiful and culturally rich city of in to present their latest research results and to exchange new ideas and practical experiences.

Scope

MIC-Security -0001 main scope includes, but is not limited to the following areas: Network Security and Privacy; Information Security and Privacy; Software Security and Privacy; Hardware Based Security;

MIC-Security -0001 is planned to feature special sessions, keynote talks and tutorial sessions by leading experts, paper presentations, poster shows, demo shows, discussion panels, as well as other interesting technical activities.

MIC-Security -0001 Tracks

Network Security and Privacy
(NetSec)
Information Security and Privacy
(InfoSec)
Software Security and Privacy
(SoftSec)
Hardware Based Security
(HardSec)
Why Take Part in MIC-Security -0001?
* Enjoy attending MIC-Security -0001 at , in , .
* Enjoy moderate registration fees. Based on the user contribution index (UCI), proportionate registration discounts apply.
* Have the possiblity to extend and publish your conference papers with some of the top journal publishers.
* Only full paper submissions are allowed at all our conferences. No summary or abstract submissions are allowed. Conference topic coverage includes the most current and exciting fields of knowledge and research.
* Papers can be accepted to our conferences only after rigorous peer reviewing.
* Our outstanding reviewing process is facilitated by careful selection of technical program committee members from among the best international experts. Each submitted paper is subject to no less than three peer reviews before it can be considered for acceptance.
* Published papers of MIC-Security -0001 are indexed by Google Scholar. More indexing is on the way.
* At each congress, and based on paper review scores, the paper with the highest scores receives the Best Paper Award. This is an award to which only presented papers are eligible. The best paper award is usually delivered to the presenter of the winning paper at the main conference dinner.
MIC-Security -0001 Dates
MIC-Security -0001 Days Wednesday - Tuesday: 30-29 November -0001
Full Paper Submission Deadline Tuesday, 27 September -0001
Author Notifications Tuesday, 11 October -0001
Final Paper Submissions Deadline Friday, 21 October -0001
Registration Deadline Friday, 21 October -0001
Registration Cancellation Deadline Thursday, 27 October -0001
MIC-Security -0001 Submissions
MIC-Security -0001 Call for Papers

Welcome

Welcome to the 1st Mosharaka International Conference on Security of Communication and Computing Systems and Networks (MIC-Security -0001). This event is intended to represent a major forum for professors, students, and professionals from all over the world to meet in the beautiful and culturally rich city of in the period 30-29 November -0001 to present their latest research results, and to exchange new ideas and practical experiences in the most up-to-date areas of this exciting field.

Submissions

The types of articles that will be considered for publication include case studies, reviews, as well as theoretical and empirical research. Only papers with top technical quality will be accepted; a fact that is assured by a world-class technical program committee (TPC) and a thorough and rigorous peer review process. All submitted manuscripts are peer reviewed, and acceptance/rejection decisions are based mainly on the importance, originality, clarity, and contribution of the submission to knowledge in the scope of MIC-Security -0001.

Paper Submission Link

Accepted Papers

Accepted papers must be presented at the conference to be included in the official proceedings and in the online paper database. Unpresented papers lose status of belonging to the conference in any way, and cannot be considered for any possible post-conference collaboration with any other party.

Registration Fees

Regular Registration (up to two papers) €400
Regular Registration (over two papers) €100/Paper
Student Registration (up to two papers) €200
Student Registration (over two papers) €50/Paper
Non-author Registration €100
All Registrations After Registration Deadline Add 25%

Above amounts are clean payments. All money transfer fees and commissions are to be paid by registrants.

Registration fees are per person. Reigstrants are welcome to all conference sessions, and they receive the following:

  • conference kits,
  • pass for conference dinner.

In all paper registrations, the discount percentage of registering author applies.

Dates

Submission Deadline 27 September -0001
Author Notifications 11 October -0001
Final Papers 21 October -0001

Topics

  • Network Security and Privacy
  • Malware and Worm Defenses
  • Internet Security
  • Network Access Control
  • Trust Management in Communication Networks
  • Cryptography and Data Security
  • Authentication and Authorization
  • Intrusion and Fraud Detection
  • Mobile Code and Agent Security
  • Semantics of Security
  • Software Security
  • Spam Counter Measures
  • Security Algorithms and Vulnerability Analysis
  • Web Security
  • Security and Privacy in Vehicular Networks
  • Social Aspects of Security
  • Cyber-Physical System Security
  • Computer and Network Forensics
  • Application Level Security, Privacy and Trust
  • Secure Future Home Networks
  • Identity Management
  • Denial-of-Service Attacks And Countermeasures
  • Digital Rights Management
  • Intellectual Property Protection
  • Wireless and Mobile Network Security
  • Security of Personal Communication Systems
  • Deep Packet Inspection
  • Security of Peer-to-Peer and Overlay Networks
  • Key Management Systems
  • Smart Phone Security
  • Physical Layer Security
  • Security, Privacy and Trust in Clouds
  • Adaptive Attack Mitigation
  • CPS Adaptive Attack Mitigation
  • Distributed Systems Security
  • Embedded System Security
  • Content Distribution Network Security
  • Attack Detection and Prevention
  • Availability and Survivability of Secure Systems
  • Biometric Security
  • Firewall Technologies
  • Active and Adaptive Defense Systems
  • Benchmarking of Security Systems
  • Big Data Security, Privacy and Trust
  • Complex Systems Security
  • Anti-Forensic Techniques
  • Computer Security
  • Cross-Layer Network Security
  • Security, Privacy and Trust Management
  • System and Network Security Policies
  • Data Privacy Enhancing Technologies
  • Data Security
  • Data Privacy
  • Data Center Security
  • Mobile Cloud Security
  • Database Security
  • Big Data Threat and Vulnerability Analysis
  • Big Bata Security Applications
  • Security, Privacy and Trust in eHealth
  • Security Metrics for Applications
  • Access Control for Applications
  • Secure Software Development
  • Application Level Security, Privacy and Trust
  • Availability and Survivability of Secure Systems
  • Benchmarking of Security Systems
  • Big Data Security
  • Biometric Security
  • Blockchain Security
  • Business Information System Security
  • Cryptography and Data Security
  • Database Security
  • Data Center Security
  • Information System Security
  • Internet and Web Security
  • Secure Cloud Architectures
  • Security as a Service
  • Semantics of Security
  • Social Aspects of Security
  • Dependable and Secure Software and Services
  • Secure Software Development
  • Software Security
  • Software Vulnerabilities
GC- -0001 Visits: 4166||MIC-Security -0001 Visits: 927