Mosharaka for Research and Studies
Login/Sign Up
Main Menu
Conferences Menu
Quick Links
Next Congress
Congresses

All Forthcoming Congresses

Conferences

All Forthcoming Conferences

Books
144 days remaining to submit papers to InfoTek 2026 in Irbid, Jordan
1st Mosharaka International Conference on Security of Communication and Computing Systems and Networks (MIC-Security )
1 January - 31 December 1969, ,
Conferences Links
  • Introduction
  • Author Kit
  • Submissions
  • HardSec
  • Welcome
  • Why MIC-Security ?
  • Dates
Welcome to MIC-Security
Welcome to the 1st Mosharaka International Conference on Security of Communication and Computing Systems and Networks (MIC-Security ). This event is intended to represent a major forum for researchers, professionals and students from all over the world to meet in the beautiful and culturally rich city of in to present their latest research results and to exchange new ideas and practical experiences.

Scope

MIC-Security main scope includes, but is not limited to the following areas: Network Security and Privacy; Information Security and Privacy; Software Security and Privacy; Communication System Security and Privacy; Hardware Based Security;

MIC-Security is planned to feature special sessions, keynote talks and tutorial sessions by leading experts, paper presentations, poster shows, demo shows, discussion panels, as well as other interesting technical activities.

MIC-Security Tracks

Network Security and Privacy
(NetSec)
Information Security and Privacy
(InfoSec)
Software Security and Privacy
(SoftSec)
Communication System Security and Privacy
(CommSec)
Hardware Based Security
(HardSec)
Why Take Part in MIC-Security ?
* Enjoy attending MIC-Security at , in , .
* Enjoy moderate registration fees. Based on the user contribution index (UCI), proportionate registration discounts apply.
* Have the possiblity to extend and publish your conference papers with some of the top journal publishers.
* Only full paper submissions are allowed at all our conferences. No summary or abstract submissions are allowed. Conference topic coverage includes the most current and exciting fields of knowledge and research.
* Papers can be accepted to our conferences only after rigorous peer reviewing.
* Our outstanding reviewing process is facilitated by careful selection of technical program committee members from among the best international experts. Each submitted paper is subject to no less than three peer reviews before it can be considered for acceptance.
* Published papers of MIC-Security are indexed by Google Scholar. More indexing is on the way.
* At each congress, and based on paper review scores, the paper with the highest scores receives the Best Paper Award. This is an award to which only presented papers are eligible. The best paper award is usually delivered to the presenter of the winning paper at the main conference dinner.
MIC-Security Dates
MIC-Security Days Thursday - Thursday: 1 January - 31 December 1969
Full Paper Submission Deadline Tuesday, 2 December 1969
Author Notifications Tuesday, 16 December 1969
Final Paper Submissions Deadline Friday, 26 December 1969
Registration Deadline Friday, 26 December 1969
Registration Cancellation Deadline Thursday, 1 January 1970
MIC-Security Submissions
NetSec
Network Security and Privacy
MIC-Security Paper Submissions Closed
InfoSec
Information Security and Privacy
MIC-Security Paper Submissions Closed
SoftSec
Software Security and Privacy
MIC-Security Paper Submissions Closed
CommSec
Communication System Security and Privacy
MIC-Security Paper Submissions Closed
HardSec
Hardware Based Security
MIC-Security Paper Submissions Closed
MIC-Security

Event Submissiions
Are you preparing a paper to submit to MIC-Security ?
If so, please help the organizing committee make good predictions about the potential size of MIC-Security participation. To do so, please indicate your plan to submit a contribution by clicking here. This does not imply any commitment on your side. Kindly note that clicking the above link does not involve submission of any contribution.
MIC-Security Track on Hardware Based Security (HardSec)

HardSec track topics include, but are not limited to the following:

Countermeasures to Attacks on Hardware; Hardware Reverse Engineering; Hardware Security
HardSec TPC HardSec Paper Submissions
Closed on Tuesday, 2 December 1969