CSCT2024: International Conference on Cyberspace Security and Communication Technology Haikou Marriott Hotel Haikou, China, October 25-27, 2024 |
Conference website | http://www.csctconference.com/index.asp |
Submission link | https://easychair.org/conferences/?conf=csct2024 |
The 2024 International Conference on Cyberspace Security and Communication Technology(CSCT 2024), is an international forum for scientists, engineers, and practitioners to present their latest research and development results in all areas of Cyberspace Security and Communication Technology, CSCT 2024. The conference will feature tutorials, technical paper presentations, and distinguished keynote speeches.Extended versions of selected accepted papers from the conference will be published in special issue(s)/Section(s) of Scholarly journals.
Submission Guidelines
All papers must be original and not simultaneously submitted to another journal or conference. The following paper categories are welcome:
Communication Technology
■ Network management
■ Network reliability and security
■ Network traffic characterization
■ Cross-layer design and optimization
■ Communication and information theory
■ Communication software and services
■ Protocol and algorithms for communications
■ Wireless communications and networking
■ Broadband wireless access
■ Cooperative communications and networking
■ Optical communications and networking
■ Broadband networking and protocols
■ Internet services, systems and applications
■ P2P communications and networking
■ Pervasive computing and grid networking
■ 5G and 6G systems
■ Visible light communication
■ Cognitive radio and AI-enabled networks
■ Quality of service (QoS)
■ Modeling and simulation of communication and network systems
■ Communication software
■ Software defines networks
■ Communication and networks theory
■ Green communication and networks
■ Next generation networks
■ Signal processing for networks
■ Machine learning applications to communication and network systems
■ Satellite and space communication systems
■ Smart grid communication systems
■ Social networks
Network Security
■ Security in cloud and grid systems
■ Security in e-commerce, e-government and e-services
■ Information leakage
■ Information theft
■ Data tampering
■ Data deletion
■ computer virus
■ Security breach
■ Attack monitoring
■ Encrypted communication systems
■ Information dissemination safety
■ Network isolation
■ Application security
■ Email security
■ Anti-virus and anti-malware software
■ Network segmentation
■ Behavioral analytics
■ Cloud security
■ Intrusion prevention systems
■ Mobile device security
■ Security information and event management
■ Wireless systems’ security
■ Database and system security
■ Security simulation and tools
■ Security for critical infrastructures and key resources (CIKR)
■ Privacy issues in communication systems
■ Biometric-based security systems and protocol
■ Database security
■ Quantum security and cryptography
■ Intrusion detection
Cyberspace Security
■ Security protocol analysis
■ Cloud computing and big data security
■ Digital forensics technology
■ Network countermeasure principles
■ Trusted computing
■ Trust management
■ Hardware security
■ Identity management
■ Intelligent defense systems
■ Insider threats
■ Internet and network forensics
■ Intrusion detection and Prevention
Submission Instructions
1.English is the official language of the conference, automatic translation is not permitted, and all of the papers should be written and presented only in English.
2.All of the papers should be submitted in WORD and PDF formats, and all of the papers should be typeset according to the template on the official website, all the accepted paper must present on the conference by oral, video or poster.
3.All of the papers submitted to the conference should report original, previously unpublished research results, experimental or theoretical, and the copyrights of the papers should not have been demised to any institution, organization or individual.
4.After acceptance, all the final version signed copy right and related materials ,which must be revised and refined according to the reviewers’ and conference committee’s requests, need to sent as the conference secretary/manager’s notification.
Submission Method
Prospective authors are invited to submit their full papers (including all sections, figures, tables and references) via Email at csctconference@163.com
Committees
General Chair
Prof. Mohammad S. Obaidat,University of Texas- Permian Basin, USA
Prof.Kun Zhang,Hainan Normal University, China
Advisor Chair
Prof.Jianping An,Beijing Institute of Technology, China
Prof. Haixia Long,Hainan Normal University, China
Executive General Chair
Prof.Kuei-Fang Hsiao,University of Sharjah, Sharjah
Programme Chair
Dr. Muhammad Ibrar,Shenyang Normal University, China
Dr. Mehboob Ali,Guangxi Minzu University, China
Dr. Faisal Mehmood,Peking university, China
Publication ChairDr. Shahid Karim,Northwestern Polytechnical University, China
Organizing Chair
Prof. Dr. Hang Li,Shenyang Normal University, China
Dr. Shoulin Yin,Shenyang Normal University, China
Dr. Anas Bilal,Hainan Normal University, China
Technical Chair,Associate Researcher. Yu ZhouHainan Normal University, China
Assoc. Prof. Haifeng,WangHainan Tropical Ocean University, China
Overseas Advisory Chair
Dr. David Williams,Dublin Business School, Ireland
Dr. Alok Kumar,Ericsson-Tallinn, Estonia
Dr. Muhammad Khuram Shahzad, Khawaja Fareed University of Engineering and information Technology, Pakistan
Corporate Technology Chair, Shengrong Zhang, General ManagerCETC Guohaixintong Technology (Hainan) Co., Ltd
Publication
All papers, both invited and contributed, will be reviewed by at least 2 experts from the committees. After a careful reviewing process before the final decision and detailed presentation at the conference.
Contact
All questions about submissions should be emailed to csctconference@163.com.