Welcome to the
1st Mosharaka International Conference on Security of Communication and Computing Systems and Networks (MIC-Security 2026). This event is intended to represent a major forum for researchers, professionals and students from all over the world to meet in hybrid mode (remotely or onsite) in in the beautiful and culturally rich city of Irbid in Jordan to present their latest research results and to exchange new ideas and practical experiences.
Scope
MIC-Security 2026 main scope includes, but is not limited to the following areas: Network Security and Privacy; Information Security and Privacy; Software Security and Privacy; Communication System Security and Privacy; Hardware Based Security;
MIC-Security 2026 is planned to feature special sessions, keynote talks and tutorial sessions by leading experts, paper presentations, poster shows, demo shows, discussion panels, as well as other interesting technical activities.
Jordan
Coming to Jordan represents a unique opportunity to witness the embrace of history and future. As small in area as it is, Jordan has a rich history spanning thousands of years, a history that a tourist can only admire. Places like Petra and the Dead Sea are only examples of the many one-of-a-kind places to visit in Jordan. On top of all that, Jordan, as a peaceful country in a turbulent area, enjoys extreme levels of safety and security. Jordanian people are internationally known for generosity, hospitality and cultural awareness and tolerance.
Enjoy attending MIC-Security 2026 at Seven Days Hotel, in Irbid, Jordan.
*
Enjoy moderate registration fees. Based on the user contribution index (UCI), proportionate registration discounts apply.
*
Have the possiblity to extend and publish your conference papers with some of the top journal publishers.
*
Only full paper submissions are allowed at all our conferences. No summary or abstract submissions are allowed. Conference topic coverage includes the most current and exciting fields of knowledge and research.
*
Papers can be accepted to our conferences only after rigorous peer reviewing.
*
Our outstanding reviewing process is facilitated by careful selection of technical program committee members from among the best international experts. Each submitted paper is subject to no less than three peer reviews before it can be considered for acceptance.
*
Published papers of MIC-Security 2026 are indexed by Google Scholar. More indexing is on the way.
*
At each congress, and based on paper review scores, the paper with the highest scores receives the Best Paper Award. This is an award to which only presented papers are eligible. The best paper award is usually delivered to the presenter of the winning paper at the main conference dinner.
Are you preparing a paper to submit to MIC-Security 2026?
If so, please help the organizing committee make good predictions about the potential size of MIC-Security 2026 participation. To do so, please indicate your plan to submit a contribution by clicking here. This does not imply any commitment on your side. Kindly note that clicking the above link does not involve submission of any contribution.
MIC-Security 2026 Call for Papers
Welcome
Welcome to the 1st Mosharaka International Conference on Security of Communication and Computing Systems and Networks (MIC-Security 2026). This event is intended to represent a major forum for professors, students, and professionals from all over the world to meet in the beautiful and culturally rich city of Irbid in the period 4-6 December 2026 (Hybrid Mode) to present their latest research results, and to exchange new ideas and practical experiences in the most up-to-date areas of this exciting field.
Coming to Jordan represents a unique opportunity to witness the embrace of history and future. As small in area as it is, Jordan has a rich history spanning thousands of years, a history that a tourist can only admire. Places like Petra and the Dead Sea are only examples of the many one-of-a-kind places to visit in Jordan. On top of all that, Jordan, as a peaceful country in a turbulent area, enjoys extreme levels of safety and security. Jordanian people are internationally known for generosity, hospitality and cultural awareness and tolerance.
Submissions
The types of articles that will be considered for publication include case studies, reviews, as well as theoretical and empirical research. Only papers with top technical quality will be accepted; a fact that is assured by a world-class technical program committee (TPC) and a thorough and rigorous peer review process. All submitted manuscripts are peer reviewed, and acceptance/rejection decisions are based mainly on the importance, originality, clarity, and contribution of the submission to knowledge in the scope of MIC-Security 2026.
Accepted papers must be presented at the conference to be included in the official proceedings and in the online paper database. Unpresented papers lose status of belonging to the conference in any way, and cannot be considered for any possible post-conference collaboration with any other party.
Registration Fees
Regular Registration Per Person (up to two papers)
€200
Regular Registration Per Person (over two papers)
€100/Paper
Student Registration Per Person (up to two papers)
€100
Student Registration Per Person (over two papers)
€50/Paper
Non-author Registration
€100
Reigstrants are welcome to all conference sessions. They receive the following:
conference kits,
pass for conference dinner.
Discount percentage of registering author applies.
Online Registration Per Paper
€100
All authors of registered papers are welcome to online sessions.
No discounts are applied to online registrations.
All Registrations After Registration Deadline
Add 25%
All above amounts are clean payments.
All money transfer fees and commissions are to be paid by registrants.
Dates
Submission Deadline
1 October 2026
Author Notifications
15 October 2026
Final Papers
25 October 2026
Topics
Network Security and Privacy
Malware and Worm Defenses
Internet Security
Network Access Control
Trust Management in Communication Networks
Cryptography and Data Security
Authentication and Authorization
Intrusion and Fraud Detection
Mobile Code and Agent Security
Semantics of Security
Software Security
Spam Counter Measures
Security Algorithms and Vulnerability Analysis
Web Security
Security and Privacy in Vehicular Networks
Social Aspects of Security
Cyber-Physical System Security
Computer and Network Forensics
Application Level Security, Privacy and Trust
Secure Future Home Networks
Identity Management
Denial-of-Service Attacks And Countermeasures
Digital Rights Management
Intellectual Property Protection
Wireless and Mobile Network Security
Security of Personal Communication Systems
Deep Packet Inspection
Security of Peer-to-Peer and Overlay Networks
Key Management Systems
Smart Phone Security
Physical Layer Security
Security, Privacy and Trust in Clouds
Adaptive Attack Mitigation
CPS Adaptive Attack Mitigation
Distributed Systems Security
Embedded System Security
Content Distribution Network Security
Attack Detection and Prevention
Availability and Survivability of Secure Systems
Biometric Security
Firewall Technologies
Active and Adaptive Defense Systems
Benchmarking of Security Systems
Big Data Security, Privacy and Trust
Complex Systems Security
Anti-Forensic Techniques
Computer Security
Cross-Layer Network Security
Security, Privacy and Trust Management
System and Network Security Policies
Data Privacy Enhancing Technologies
Data Security
Data Privacy
Data Center Security
Mobile Cloud Security
Database Security
Big Data Threat and Vulnerability Analysis
Big Bata Security Applications
Security, Privacy and Trust in eHealth
Security Metrics for Applications
Access Control for Applications
Secure Software Development
Application Level Security, Privacy and Trust
Availability and Survivability of Secure Systems
Benchmarking of Security Systems
Big Data Security
Biometric Security
Blockchain Security
Business Information System Security
Cryptography and Data Security
Database Security
Data Center Security
Information System Security
Internet and Web Security
Secure Cloud Architectures
Security as a Service
Semantics of Security
Social Aspects of Security
Dependable and Secure Software and Services
Secure Software Development
Software Security
Software Vulnerabilities
5G&Beyond Physical Layer Security
Body Area Network Security
Cross-Layer Network Security
FSO Security and Privacy
Multimedia Network Protection, Privacy, and Security