Mosharaka for Research and Studies
Login/Sign Up
Main Menu
Conferences Menu
Quick Links
Next Congress
Congresses

All Forthcoming Congresses

Conferences

All Forthcoming Conferences

Update on 21 October 2021: Paper 16.Cnf-118@MIC-CCA 2011 reaches 744 views and 210 downloads.
1st Mosharaka International Conference on Security of Communication and Computing Systems and Networks (MIC-Security 2026)
6-8 February 2026 (Hybrid Mode), Alexandria, Egypt
Conferences Links
  • Introduction
  • Author Kit
  • Submissions
  • CFP
  • Welcome
  • Why MIC-Security 2026?
  • Dates
Welcome to MIC-Security 2026
Welcome to the 1st Mosharaka International Conference on Security of Communication and Computing Systems and Networks (MIC-Security 2026). This event is intended to represent a major forum for researchers, professionals and students from all over the world to meet in hybrid mode (remotely or onsite) in in the beautiful and culturally rich city of Alexandria in Egypt to present their latest research results and to exchange new ideas and practical experiences.

Scope

MIC-Security 2026 main scope includes, but is not limited to the following areas: Network Security and Privacy; Information Security and Privacy; Software Security and Privacy; Hardware Based Security;

MIC-Security 2026 is planned to feature special sessions, keynote talks and tutorial sessions by leading experts, paper presentations, poster shows, demo shows, discussion panels, as well as other interesting technical activities.

MIC-Security 2026 Tracks

Network Security and Privacy
(NetSec)
Information Security and Privacy
(InfoSec)
Software Security and Privacy
(SoftSec)
Hardware Based Security
(HardSec)
Why Take Part in MIC-Security 2026?
* Enjoy attending MIC-Security 2026 at Hilton Alexandria Green Plaza, in Alexandria, Egypt.
* Enjoy moderate registration fees. Based on the user contribution index (UCI), proportionate registration discounts apply.
* Have the possiblity to extend and publish your conference papers with some of the top journal publishers.
* Only full paper submissions are allowed at all our conferences. No summary or abstract submissions are allowed. Conference topic coverage includes the most current and exciting fields of knowledge and research.
* Papers can be accepted to our conferences only after rigorous peer reviewing.
* Our outstanding reviewing process is facilitated by careful selection of technical program committee members from among the best international experts. Each submitted paper is subject to no less than three peer reviews before it can be considered for acceptance.
* Published papers of MIC-Security 2026 are indexed by Google Scholar. More indexing is on the way.
* At each congress, and based on paper review scores, the paper with the highest scores receives the Best Paper Award. This is an award to which only presented papers are eligible. The best paper award is usually delivered to the presenter of the winning paper at the main conference dinner.
MIC-Security 2026 Dates
MIC-Security 2026 Days Friday - Sunday: 6-8 February 2026 (Hybrid Mode)
Full Paper Submission Deadline Thursday, 4 December 2025
Author Notifications Thursday, 18 December 2025
Final Paper Submissions Deadline Sunday, 28 December 2025
Registration Deadline Sunday, 28 December 2025
Registration Cancellation Deadline Saturday, 3 January 2026
MIC-Security 2026 Submissions
MIC-Security 2026 Call for Papers

Welcome

Welcome to the 1st Mosharaka International Conference on Security of Communication and Computing Systems and Networks (MIC-Security 2026). This event is intended to represent a major forum for professors, students, and professionals from all over the world to meet in the beautiful and culturally rich city of Alexandria in the period 6-8 February 2026 (Hybrid Mode) to present their latest research results, and to exchange new ideas and practical experiences in the most up-to-date areas of this exciting field.

Submissions

The types of articles that will be considered for publication include case studies, reviews, as well as theoretical and empirical research. Only papers with top technical quality will be accepted; a fact that is assured by a world-class technical program committee (TPC) and a thorough and rigorous peer review process. All submitted manuscripts are peer reviewed, and acceptance/rejection decisions are based mainly on the importance, originality, clarity, and contribution of the submission to knowledge in the scope of MIC-Security 2026.

Paper Submission Link

Accepted Papers

Accepted papers must be presented at the conference to be included in the official proceedings and in the online paper database. Unpresented papers lose status of belonging to the conference in any way, and cannot be considered for any possible post-conference collaboration with any other party.

Registration Fees

Regular Registration (up to two papers) €400
Regular Registration (over two papers) €100/Paper
Student Registration (up to two papers) €200
Student Registration (over two papers) €50/Paper
Non-author Registration €100
All Registrations After Registration Deadline Add 25%

Above amounts are clean payments. All money transfer fees and commissions are to be paid by registrants.

Registration fees are per person. Reigstrants are welcome to all conference sessions, and they receive the following:

  • conference kits,
  • pass for conference dinner.

In all paper registrations, the discount percentage of registering author applies.

Dates

Submission Deadline 4 December 2025
Author Notifications 18 December 2025
Final Papers 28 December 2025

Topics

  • Network Security and Privacy
  • Malware and Worm Defenses
  • Internet Security
  • Network Access Control
  • Trust Management in Communication Networks
  • Cryptography and Data Security
  • Authentication and Authorization
  • Intrusion and Fraud Detection
  • Mobile Code and Agent Security
  • Semantics of Security
  • Software Security
  • Spam Counter Measures
  • Security Algorithms and Vulnerability Analysis
  • Web Security
  • Security and Privacy in Vehicular Networks
  • Social Aspects of Security
  • Cyber-Physical System Security
  • Computer and Network Forensics
  • Application Level Security, Privacy and Trust
  • Secure Future Home Networks
  • Identity Management
  • Denial-of-Service Attacks And Countermeasures
  • Digital Rights Management
  • Intellectual Property Protection
  • Wireless and Mobile Network Security
  • Security of Personal Communication Systems
  • Deep Packet Inspection
  • Security of Peer-to-Peer and Overlay Networks
  • Key Management Systems
  • Smart Phone Security
  • Physical Layer Security
  • Security, Privacy and Trust in Clouds
  • Adaptive Attack Mitigation
  • CPS Adaptive Attack Mitigation
  • Distributed Systems Security
  • Embedded System Security
  • Content Distribution Network Security
  • Attack Detection and Prevention
  • Availability and Survivability of Secure Systems
  • Biometric Security
  • Firewall Technologies
  • Active and Adaptive Defense Systems
  • Benchmarking of Security Systems
  • Big Data Security, Privacy and Trust
  • Complex Systems Security
  • Anti-Forensic Techniques
  • Computer Security
  • Cross-Layer Network Security
  • Security, Privacy and Trust Management
  • System and Network Security Policies
  • Data Privacy Enhancing Technologies
  • Data Security
  • Data Privacy
  • Data Center Security
  • Mobile Cloud Security
  • Database Security
  • Big Data Threat and Vulnerability Analysis
  • Big Bata Security Applications
  • Security, Privacy and Trust in eHealth
  • Security Metrics for Applications
  • Access Control for Applications
  • Secure Software Development
  • Application Level Security, Privacy and Trust
  • Availability and Survivability of Secure Systems
  • Benchmarking of Security Systems
  • Big Data Security
  • Biometric Security
  • Blockchain Security
  • Business Information System Security
  • Cryptography and Data Security
  • Database Security
  • Data Center Security
  • Information System Security
  • Internet and Web Security
  • Secure Cloud Architectures
  • Security as a Service
  • Semantics of Security
  • Social Aspects of Security
  • Dependable and Secure Software and Services
  • Secure Software Development
  • Software Security
  • Software Vulnerabilities
GC-Technology 2026 Visits: 4097||MIC-Security 2026 Visits: 743