Mosharaka for Research and Studies
Login/Sign Up
Main Menu
Conferences Menu
Quick Links
Next Congress
International Congress on Engineering Technologies (EngiTek 2022)
1-3 November 2022, Irbid, Jordan

EnginApps 2022

MechaniTek 2022

ElectriTek 2022
EngiTek 2022 MainEngiTek 2022 CFPEngiTek 2022 SubmissionsEngiTek 2022 ProgramEngiTek 2022 Registration

All Forthcoming Congresses


All Forthcoming Conferences

Update on Friday, 23 July 2021: Dr. Jesus Cano becomes Chairperson of MIC-Computing 2021.
2nd Mosharaka International Conference on (MIC- )
1 January - 31 December 1969, ,
MIC- is technically co-sponsored by the Institute of Electrical and Electronics Engineers
Papers will appear in IEEE Xplore.
Conferences Links
  • Introduction
  • Author Kit
  • Submissions
  • NetSec
  • Welcome
  • Why MIC- ?
  • Dates
Welcome to MIC-
Welcome to the 2nd Mosharaka International Conference on (MIC- ). This event is intended to represent a major forum for researchers, professionals and students from all over the world to meet in the beautiful and culturally rich city of in to present their latest research results and to exchange new ideas and practical experiences.


MIC- main scope includes, but is not limited to the following areas: Network Security and Privacy; Information Security and Privacy; Security and Privacy in Smart Systems; Multimedia Security and Digital Forensics; Hardware Based Security;

MIC- is planned to feature special sessions, keynote talks and tutorial sessions by leading experts, paper presentations, poster shows, demo shows, discussion panels, as well as other interesting technical activities.

MIC- Tracks

Network Security and Privacy
Information Security and Privacy
Security and Privacy in Smart Systems
Multimedia Security and Digital Forensics
Hardware Based Security
Why Take Part in MIC- ?
* MIC- is Technically Co-Sponsored by the Institute of Electrical and Electronics Engineers.
Papers will appear in IEEE Xplore.
* Enjoy attending MIC- at , in , .
* Enjoy moderate registration fees. Based on the user contribution index (UCI), proportionate registration discounts apply.
* Have the possiblity to extend and publish your conference papers with some of the top journal publishers.
* Only full paper submissions are allowed at all our conferences. No summary or abstract submissions are allowed. Conference topic coverage includes the most current and exciting fields of knowledge and research.
* Papers can be accepted to our conferences only after rigorous peer reviewing.
* Our outstanding reviewing process is facilitated by careful selection of technical program committee members from among the best international experts. Each submitted paper is subject to no less than three peer reviews before it can be considered for acceptance.
* Published papers of MIC- are indexed by Google Scholar. More indexing is on the way.
* At each congress, and based on paper review scores, the paper with the highest scores receives the Best Paper Award. This is an award to which only presented papers are eligible. The best paper award is usually delivered to the presenter of the winning paper at the main conference dinner.
MIC- Dates
MIC- Days Thursday - Thursday: 1 January - 31 December 1969
Full Paper Submission Deadline Tuesday, 2 December 1969
Author Notifications Tuesday, 16 December 1969
Final Paper Submissions Deadline Friday, 26 December 1969
Registration Deadline Friday, 26 December 1969
Registration Cancellation Deadline Thursday, 1 January 1970
MIC- Author Kit
MIC- Submissions
MIC- Track on Network Security and Privacy (NetSec)

NetSec track topics include, but are not limited to the following:

Access Control for Applications; Active and Adaptive Defense Systems; Adaptive Attack Mitigation; Anti-Forensic Techniques; Application Level Security, Privacy and Trust; Attack Detection and Prevention; Authentication and Authorization; Availability and Survivability of Secure Systems; Benchmarking of Security Systems; Big Bata Security Applications; Big Data Security, Privacy and Trust; Big Data Threat and Vulnerability Analysis; Biometric Security; CPS Adaptive Attack Mitigation; Complex Systems Security; Computer Security; Computer and Network Forensics; Content Distribution Network Security; Cross-Layer Network Security; Cryptography and Data Security; Cyber-Physical System Security; Data Center Security; Data Privacy; Data Privacy Enhancing Technologies; Data Security; Database Security; Deep Packet Inspection; Denial-of-Service Attacks And Countermeasures; Digital Rights Management; Distributed Systems Security; Embedded System Security; Firewall Technologies; Identity Management; Intellectual Property Protection; Internet Security; Intrusion and Fraud Detection; Key Management Systems; Malware and Worm Defenses; Mobile Cloud Security; Mobile Code and Agent Security; Network Access Control; Network Security and Privacy; Physical Layer Security; Secure Future Home Networks; Secure Software Development; Security Algorithms and Vulnerability Analysis; Security Metrics for Applications; Security and Privacy in Vehicular Networks; Security of Peer-to-Peer and Overlay Networks; Security of Personal Communication Systems; Security, Privacy and Trust Management; Security, Privacy and Trust in Clouds; Security, Privacy and Trust in eHealth; Semantics of Security; Smart Phone Security; Social Aspects of Security; Software Security; Spam Counter Measures; System and Network Security Policies; Trust Management in Communication Networks; Web Security; Wireless and Mobile Network Security
NetSec TPC NetSec Paper Submissions
Closed on Tuesday, 2 December 1969