Submit Paper Now

/br

All Accepted & Presented papers will be published in SCOPUS indexed Springer Nature's SN Computer Science journal.

Amid prevailing conditions due to COVID19, a virtual meeting platform may be made available for all registered authors who intend to submit their work but are unable to attend the conference.

Cardiff Metropolitan University-United Kingdom (UK)

University of South Wales, United Kingdom (UK)

University of the west of England, United Kingdom (UK)

Swansea University, United Kingdom (UK)

Cardiff University, United Kingdom (UK)

University of Wales Trinity Saint David, United Kingdom (UK)

ICCS 2022 Call for Papers

The proposed 8th International Conference on Cyber Security, Privacy in Communication Networks (ICCS) 2022 provides a platform for researchers and professionals to share their research and reports of new technologies and applications in Cyber Security and Privacy in Communication Networks.

The ICCS is a collaborative platform for academic experts, researchers, and corporate professionals for interacting their research in various domains of information security like security in cloud, cyber war, cybercrime analysis, crypto jacking and security software development etc.

All accepted and presented papers will be reviewed for possible publication in Springer Nature's SN Computer Science Journal.

Please consider submitting your works to this conference. We are interested in the entire range of concepts from theory to practice, including case studies, works-in-progress, and conceptual explorations.

Join us, 12-13 December 2022, to explore discovery, progress, and achievements related to various cyber security techniques and privacy issues in communication networks.

Submission Process

At the time of article submission, Please follow the given steps:

  • Step I - ONLY Submit your abstract through Easychair and wait for acceptance notification for abstract.
  • Step II - Follow the instructions to submit full paper as given in the acceptance mail.

For any submission related query, pls contact us at iccs@iaasse.org

Important Dates / Deadlines

  • Submission of Abstracts(Final Extension)                                  October 10, 2022

  • Submission of Full Paper(Final Extension)                                    October 15, 2022
  • Notification of Acceptance                                                     November 15, 2022

  • Early Bird Registration                                                            November 20, 2022

  • Oral presentation of selected works                                  December 12-13, 2022

  • Submission of Final paper                                                      December 31, 2022

The ONLINE submission  site is

  

  Click the above Easy Chair Logo to submit.

Submission Process

At the time of article submission, Please follow the given steps:

  • Step I - ONLY Submit your abstract through Easychair and wait for acceptance notification for abstract.
  • Step II - Follow the instructions to submit full paper as given in the acceptance mail of abstract.

For any submission related query, pls contact us at iccs@iaasse.org

Submission Guidelines

Papers reporting original* and unpublished research results pertaining to the related topics are solicited. *(papers with plagiarism more than 30% will be outrightly rejected)

To know more about paper format and other submission guidelines pls visit the following link of SN Computer Science Journal:

https://www.springer.com/journal/42979/submission-guidelines

Submissions should  include the author(s), affiliation(s), e-mail address(es), and postal address(es) in the manuscripts. Papers will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation. Paper submission implies the intent of at least one of the authors to register and present the paper, if accepted. 

Presentation through Virtual Platform

Amid prevailing conditions due to COVID19, a virtual meeting platform is to be made available for all registered authors who intend to submit their work but are unable to attend the conference. Authors may register and present their paper through the virtual platform.

Authors shall be sent a Certificate of Participation, Conference Proceedings link and relevant literature by mail.

Acceptance & Publication

After a double-blind peer review, qualifying Regular Papers may be accepted as either Full Papers or Short Papers.

  • All accepted and presented papers of the conference will be reviewed for possible publication in Springer Nature's SN Computer Science journal.
  • The papers must be part of the worldwide scholarly discourse in the field covered by the library. The reviews will be done to make sure papers are relevant for the chosen classifications to ensure subscribers receive relevant content.
  • NO extra fee is charged from authors for inclusion in proceedings.
  • Authors will grant a non-exclusive, revocable license that allows providing services to users.

Indexing

Post conference, proceedings will be made available to the following indexing services for possible inclusion:

Scopus
dblp - computer science bibliography
Clarivate Analytics
google scholar

Depending on the focus of the particular indexing services, they may decide to include or not. If included one can expect it in 15-18 months. DBLP and Google Scholar are fast.

Conference Tracks
Cyber Security
  • Foundations
  • Big Data Techniques in Cyber Security
  • Forensic Analysis of Cyber Crimes
  • Secure Design, Tooling, and Engineering
  • Security and Trust of Citizens
  • Database security
  • Cloud security
  • Advance Persistent Threat
  • Network Monitoring and Control
  • Advance Security techniques
Privacy in Communication Networks
  • Digital Signature Techniques
  • Network Protocols
  • Next-generation Communication Networks
  • Modeling & Simulation of communication networks and Systems
  • Routing and Flow Control in LANs, WANs and PANs
  • Secure Routing, Naming/Addressing, Network Management
  • Security & Privacy in Pervasive and Ubiquitous Computing, e.g., RFIDs
  • Security & Privacy in Peer-to-Peer and Overlay Networks
  • Security & Privacy for Emerging Technologies: VoIP, Social Networks
  • Security & Isolation in Cloud, Data Center and Software-Defined Network
Conference also welcomes organizing various special sessions/workshops.