Conferences Links
|
- Introduction
- Author Kit
- Submissions
- CFP
- Welcome
- Why MIC-Security 2024?
- Dates
Welcome to MIC-Security 2024 |
Welcome to the
1st Mosharaka International Conference on Security of Communication and Computing Systems and Networks (MIC-Security 2024). This event is intended to represent a major forum for researchers, professionals and students from all over the world to meet in hybrid mode (remotely or onsite) in in the beautiful and culturally rich city of Irbid in Jordan to present their latest research results and to exchange new ideas and practical experiences.
ScopeMIC-Security 2024 main scope includes, but is not limited to the following areas: Network Security and Privacy; Information Security and Privacy; Software Security and Privacy; Hardware Based Security; MIC-Security 2024 is planned to feature special sessions, keynote talks and tutorial sessions by leading experts, paper presentations, poster shows, demo shows, discussion panels, as well as other interesting technical activities.
JordanComing to Jordan represents a unique opportunity to witness the embrace of history and future. As small in area as it is, Jordan has a rich history spanning thousands of years, a history that a tourist can only admire. Places like Petra and the Dead Sea are only examples of the many one-of-a-kind places to visit in Jordan. On top of all that, Jordan, as a peaceful country in a turbulent area, enjoys extreme levels of safety and security. Jordanian people are internationally known for generosity, hospitality and cultural awareness and tolerance. |
MIC-Security 2024 Tracks |
|
|
Why Take Part in MIC-Security 2024? |
* |
Enjoy attending MIC-Security 2024 at Seven Days Hotel, in Irbid, Jordan. |
* |
Enjoy moderate registration fees. Based on the user contribution index (UCI), proportionate registration discounts apply. |
* |
Have the possiblity to extend and publish your conference papers with some of the top journal publishers. |
* |
Only full paper submissions are allowed at all our conferences. No summary or abstract submissions are allowed. Conference topic coverage includes the most current and exciting fields of knowledge and research. |
* |
Papers can be accepted to our conferences only after rigorous peer reviewing. |
* |
Our outstanding reviewing process is facilitated by careful selection of technical program committee members from among the best international experts. Each submitted paper is subject to no less than three peer reviews before it can be considered for acceptance. |
* |
Published papers of MIC-Security 2024 are indexed by Google Scholar. More indexing is on the way. |
* |
At each congress, and based on paper review scores, the paper with the highest scores receives the Best Paper Award. This is an award to which only presented papers are eligible. The best paper award is usually delivered to the presenter of the winning paper at the main conference dinner. |
|
MIC-Security 2024 Dates |
MIC-Security 2024 Days |
Friday - Sunday: 6-8 December 2024 (Hybrid Mode) |
Full Paper Submission Deadline |
Thursday, 3 October 2024 |
Author Notifications |
Thursday, 17 October 2024 |
Final Paper Submissions Deadline |
Sunday, 27 October 2024 |
Registration Deadline |
Sunday, 27 October 2024 |
Registration Cancellation Deadline |
Saturday, 2 November 2024 |
|
MIC-Security 2024 Author Kit |
|
MIC-Security 2024 Submissions |
|
MIC-Security 2024 Call for Papers |
WelcomeWelcome to the 1st Mosharaka International Conference on Security of Communication and Computing Systems and Networks (MIC-Security 2024). This event is intended to represent a major forum for professors, students, and professionals from all over the world to meet in the beautiful and culturally rich city of Irbid in the period 6-8 December 2024 (Hybrid Mode) to present their latest research results, and to exchange new ideas and practical experiences in the most up-to-date areas of this exciting field.
Coming to Jordan represents a unique opportunity to witness the embrace of history and future. As small in area as it is, Jordan has a rich history spanning thousands of years, a history that a tourist can only admire. Places like Petra and the Dead Sea are only examples of the many one-of-a-kind places to visit in Jordan. On top of all that, Jordan, as a peaceful country in a turbulent area, enjoys extreme levels of safety and security. Jordanian people are internationally known for generosity, hospitality and cultural awareness and tolerance.
SubmissionsThe types of articles that will be considered for publication include case studies, reviews, as well as theoretical and empirical research. Only papers with top technical quality will be accepted; a fact that is assured by a world-class technical program committee (TPC) and a thorough and rigorous peer review process. All submitted manuscripts are peer reviewed, and acceptance/rejection decisions are based mainly on the importance, originality, clarity, and contribution of the submission to knowledge in the scope of MIC-Security 2024.
Accepted Papers
Accepted papers must be presented at the conference to be included in the official proceedings and in the online paper database. Unpresented papers lose status of belonging to the conference in any way, and cannot be considered for any possible post-conference collaboration with any other party.
Registration Fees
Regular Registration (up to two papers) |
€300 |
Regular Registration (over two papers) |
€100/Paper |
Student Registration (up to two papers) |
€150 |
Student Registration (over two papers) |
€50/Paper |
All Registrations After Registration Deadline |
Add 25% |
Registration fees are per person. Reigstrants are welcome to all conference sessions, and they receive the following:
- conference kits,
- pass for conference dinner.
In all paper registrations, the discount percentage of registering author applies. |
|
Dates
Submission Deadline |
3 October 2024 |
Author Notifications |
17 October 2024 |
Final Papers |
27 October 2024 |
Topics
- Network Security and Privacy
- Malware and Worm Defenses
- Internet Security
- Network Access Control
- Trust Management in Communication Networks
- Cryptography and Data Security
- Authentication and Authorization
- Intrusion and Fraud Detection
- Mobile Code and Agent Security
- Semantics of Security
- Software Security
- Spam Counter Measures
- Security Algorithms and Vulnerability Analysis
- Web Security
- Security and Privacy in Vehicular Networks
- Social Aspects of Security
- Cyber-Physical System Security
- Computer and Network Forensics
- Application Level Security, Privacy and Trust
- Secure Future Home Networks
- Identity Management
- Denial-of-Service Attacks And Countermeasures
- Digital Rights Management
- Intellectual Property Protection
- Wireless and Mobile Network Security
- Security of Personal Communication Systems
- Deep Packet Inspection
- Security of Peer-to-Peer and Overlay Networks
- Key Management Systems
- Smart Phone Security
- Physical Layer Security
- Security, Privacy and Trust in Clouds
- Adaptive Attack Mitigation
- CPS Adaptive Attack Mitigation
- Distributed Systems Security
- Embedded System Security
- Content Distribution Network Security
- Attack Detection and Prevention
- Availability and Survivability of Secure Systems
- Biometric Security
- Firewall Technologies
- Active and Adaptive Defense Systems
- Benchmarking of Security Systems
- Big Data Security, Privacy and Trust
- Complex Systems Security
- Anti-Forensic Techniques
- Computer Security
- Cross-Layer Network Security
- Security, Privacy and Trust Management
- System and Network Security Policies
- Data Privacy Enhancing Technologies
- Data Security
- Data Privacy
- Data Center Security
- Mobile Cloud Security
- Database Security
- Big Data Threat and Vulnerability Analysis
- Big Bata Security Applications
- Security, Privacy and Trust in eHealth
- Security Metrics for Applications
- Access Control for Applications
- Secure Software Development
- Application Level Security, Privacy and Trust
- Availability and Survivability of Secure Systems
- Benchmarking of Security Systems
- Big Data Security
- Biometric Security
- Blockchain Security
- Business Information System Security
- Cryptography and Data Security
- Database Security
- Data Center Security
- Information System Security
- Internet and Web Security
- Secure Cloud Architectures
- Security as a Service
- Semantics of Security
- Social Aspects of Security
- Dependable and Secure Software and Services
- Secure Software Development
- Software Security
- Software Vulnerabilities
|
|
|