6th International Conference on Cyber Security and Privacy in Communication Networks (ICCS) 2020
27-29 December 2020
Indian Institute of Technology, Patna
In Collaboration with

Conference Proceedings

SELECTED papers will be reviewed for possible publication in Springer Nature's SN Computer Science journal.
(All other presented papers will be published with ISBN or in ELSEVIER-SSRN)
Springer

  Submission is now open: Till November 30, 2020.Submit Now


Amid prevailing conditions due to COVID19, a virtual meeting platform is to be made available for all registered authors who intend to submit their work but are unable to attend the conference.

ICCS 2020 Call for Papers

The proposed 6th International Conference on Cyber Security, Privacy in Communication Networks (ICCS) 2020 provides a platform for researchers and professionals to share their research and reports of new technologies and applications in Cyber Security and Privacy in Communication Networks.

The ICCS is a collaborative platform for academic experts, researchers, and corporate professionals for interacting their research in various domains of information security like security in cloud, cyber war, cybercrime analysis, crypto jacking and security software development etc.

All accepted and presented papers will be reviewed for possible publication in Springer Nature's SN Computer Science Journal.

Please consider submitting your works to this conference. We are interested in the entire range of concepts from theory to practice, including case studies, works-in-progress, and conceptual explorations.

Join us, 27-29 December 2020, to explore discovery, progress, and achievements related to various cyber security techniques and privacy issues in communication networks.

Submission Process

At the time of article submission, Please follow the given steps:

  • Step I - Submit your abstract only through Easychair and wait for acceptance notification for abstract.
  • Step II - Follow the instructions to submit full paper as given in the acceptance mail.

For any submission related query, pls contact us at iccs@iaasse.org

Important Dates / Deadlines

  • Submission of Abstracts (Final Extension)             November 28, 2020

  • Submission of Full Paper (Final Extension)             November 30, 2020
  • Notification of Acceptance                                        December 18, 2020

  • Early Bird Registration                                                December 21, 2020

  • Oral presentation of selected works                    December 27-29, 2020

  • Submission of CRC                                                         January 10, 2021

The ONLINE submission  site is

  

  Click here to submit.

Submission Process

At the time of article submission, Please follow the given steps:

  • Step I - Submit your abstract only through Easychair and wait for acceptance notification for abstract.
  • Step II - Follow the instructions to submit full paper as given in the acceptance mail.

For any submission related query, pls contact us at iccs@iaasse.org

Submission Guidelines

Papers reporting original* and unpublished research results pertaining to the related topics are solicited. *(papers with plagiarism more than 30% will be outrightly rejected)

  • Full paper manuscripts must be in English of up to 10 pages as per  format.

To know more about paper format and other submission guidelines pls visit the following link of SN Computer Science Journal:

https://www.springer.com/journal/42979/submission-guidelines

Submissions should NOT include the author(s), affiliation(s), e-mail address(es), and postal address(es) in the manuscripts. Papers will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation. Paper submission implies the intent of at least one of the authors to register and present the paper, if accepted. 

Presentation through Virtual Platform

Amid prevailing conditions due to COVID19, a virtual meeting platform is to be made available for all registered authors who intend to submit their work but are unable to attend the conference. Authors may register and present their paper through the virtual platform.

Authors shall be sent a Certificate of Participation, Conference Proceedings link and relevant literature by mail.

Acceptance & Publication

After a double-blind peer review, qualifying Regular Papers may be accepted as either Full Papers or Short Papers.

  • All accepted and presented papers of the conference will be reviewed for possible publication in Springer Nature's SN Computer Science journal.
  • The papers must be part of the worldwide scholarly discourse in the field covered by the library. The reviews will be done to make sure papers are relevant for the chosen classifications to ensure subscribers receive relevant content.
  • NO extra fee is charged from authors for inclusion in proceedings.
  • Authors will grant a non-exclusive, revocable license that allows providing services to users.

Indexing

Post conference, proceedings will be made available to the following indexing services for possible inclusion:

Scopus
dblp - computer science bibliography
Clarivate Analytics
google scholar

Depending on the focus of the particular indexing services, they may decide to include or not. If included one can expect it in 15-18 months. DBLP and Google Scholar are fast.

Conference Tracks
Cyber Security
  • Foundations
  • Big Data Techniques in Cyber Security
  • Forensic Analysis of Cyber Crimes
  • Secure Design, Tooling, and Engineering
  • Security and Trust of Citizens
  • Database security
  • Cloud security
  • Advance Persistent Threat
  • Network Monitoring and Control
  • Advance Security techniques
Privacy in Communication Networks
  • Digital Signature Techniques
  • Network Protocols
  • Next-generation Communication Networks
  • Modeling & Simulation of communication networks and Systems
  • Routing and Flow Control in LANs, WANs and PANs
  • Secure Routing, Naming/Addressing, Network Management
  • Security & Privacy in Pervasive and Ubiquitous Computing, e.g., RFIDs
  • Security & Privacy in Peer-to-Peer and Overlay Networks
  • Security & Privacy for Emerging Technologies: VoIP, Social Networks
  • Security & Isolation in Cloud, Data Center and Software-Defined Network
Conference also welcomes organizing various special sessions/workshops..
Disclaimer: This site is designed by Web Team @ IAASSE and the contents are provided by IAASSE.