Welcome to the
2026 Global Congress on Communications and Computer Technologies (GC-Technology 2026). This event is intended to represent a major forum for researchers, professionals and students from all over the world to meet in the beautiful and culturally rich city of Irbid in Jordan to present their latest research results and to exchange new ideas and practical experiences.
Scope
GC-Technology 2026 main scope includes, but is not limited to the following areas: Emergency Networks for Disaster Relief; Machine Vision Systems and Technologies; Industry 4 Perspectives and Directions; Ubiquitous Intelligent Systems; Smart Cities of the Future; Internet of Things for Smart Technologies; Smart Healthcare; Smart Devices and Technologies; Smart Architecture; Smart Transportation and Smart Vehicles; Smart Grid Technologies; Immersive Multimedia; Multimedia Signal Processing; Multimedia Systems, Networks and Technologies; Multimedia Security and Digital Forensics; Network Security and Privacy; Information Security and Privacy; Software Security and Privacy; Hardware Based Security; eLearning Models, Services and Applications; Education Programs with and for the Industry; Internet Monitoring, Control and Performance;
GC-Technology 2026 is planned to feature special sessions, keynote talks and tutorial sessions by leading experts, paper presentations, poster shows, demo shows, discussion panels, as well as other interesting technical activities.
Jordan
Coming to Jordan represents a unique opportunity to witness the embrace of history and future. As small in area as it is, Jordan has a rich history spanning thousands of years, a history that a tourist can only admire. Places like Petra and the Dead Sea are only examples of the many one-of-a-kind places to visit in Jordan. On top of all that, Jordan, as a peaceful country in a turbulent area, enjoys extreme levels of safety and security. Jordanian people are internationally known for generosity, hospitality and cultural awareness and tolerance.
Enjoy attending GC-Technology 2026 at Seven Days Hotel, in Irbid, Jordan.
*
Enjoy moderate registration fees, and register up to two papers for the same registration fee. Students receive substantial registration discounts.
*
Have the possiblity to extend and publish your conference papers with some of the top journal publishers.
*
Only full paper submissions are allowed at all our conferences. No summary or abstract submissions are allowed. Conference topic coverage includes the most current and exciting fields of knowledge and research.
*
Papers can be accepted to our conferences only after rigorous peer reviewing.
*
Our outstanding reviewing process is facilitated by careful selection of technical program committee members from among the best international experts. Each submitted paper is subject to no less than two peer reviews before it can be considered for acceptance.
*
Published papers of GC-Technology 2026 are indexed by Google Scholar. More indexing is on the way.
*
At each conference, and based on paper review scores, the paper with the highest scores receives the Best Paper Award. This is an award to which only presented papers are eligible. The best paper award is usually delivered to the presenter of the winning paper at the main conference dinner.
Are you preparing a paper to submit to GC-Technology 2026?
If so, please help the organizing committee make good predictions about the potential size of GC-Technology 2026 participation. To do so, please indicate your plan to submit a contribution by clicking here. This does not imply any commitment on your side. Kindly note that clicking the above link does not involve submission of any contribution.
Tracks
Chairs
TPC
Reviewers
Statistics
CRC Press Books
NetSec
MIC-Security 2026 Tracks
Welcome to the 1st Mosharaka International Conference on Security of Communication and Computing Systems and Networks (MIC-Security 2026). This is a member conference of the
2026 Global Congress on Communications and Computer Technologies (GC-Technology 2026).
The scope of MIC-Security 2026 is organized into the following conference tracks:
CRC Press Books on Security of Communication and Computing Systems and Networks
Book authors and/or editors are needed in the (Security of Communication and Computing Systems and Networks) area, to be published by CRC Press under the book series (Prospects in Computing Systems Engineering, Technologies, and Applications: P-Computing).
MIC-Security 2026 Track on Network Security and Privacy (NetSec)
NetSec track topics include, but are not limited to the following:
Access Control for Applications; Active and Adaptive Defense Systems; Adaptive Attack Mitigation; Anti-Forensic Techniques; Application Level Security, Privacy and Trust; Attack Detection and Prevention; Authentication and Authorization; Availability and Survivability of Secure Systems; Benchmarking of Security Systems; Big Bata Security Applications; Big Data Security, Privacy and Trust; Big Data Threat and Vulnerability Analysis; Biometric Security; CPS Adaptive Attack Mitigation; Complex Systems Security; Computer Security; Computer and Network Forensics; Content Distribution Network Security; Cross-Layer Network Security; Cryptography and Data Security; Cyber-Physical System Security; Data Center Security; Data Privacy; Data Privacy Enhancing Technologies; Data Security; Database Security; Deep Packet Inspection; Denial-of-Service Attacks And Countermeasures; Digital Rights Management; Distributed Systems Security; Embedded System Security; Firewall Technologies; Identity Management; Intellectual Property Protection; Internet Security; Intrusion and Fraud Detection; Key Management Systems; Malware and Worm Defenses; Mobile Cloud Security; Mobile Code and Agent Security; Network Access Control; Network Security and Privacy; Physical Layer Security; Secure Future Home Networks; Secure Software Development; Security Algorithms and Vulnerability Analysis; Security Metrics for Applications; Security and Privacy in Vehicular Networks; Security of Peer-to-Peer and Overlay Networks; Security of Personal Communication Systems; Security, Privacy and Trust Management; Security, Privacy and Trust in Clouds; Security, Privacy and Trust in eHealth; Semantics of Security; Smart Phone Security; Social Aspects of Security; Software Security; Spam Counter Measures; System and Network Security Policies; Trust Management in Communication Networks; Web Security; Wireless and Mobile Network Security