posted by organizer: aziza || 116 views || tracked by 1 users: [display]

NTMS 2025 : 12th International Conference on New Technologies, Mobility and Security

FacebookTwitterLinkedInGoogle

Link: https://ntms.dnac.org/
 
When Jun 18, 2025 - Jun 20, 2025
Where Paris, France
Submission Deadline Jan 18, 2025
Notification Due Mar 15, 2025
Final Version Due Mar 25, 2025
Categories    communications   networks   networking   cybersecurity
 

Call For Papers

*********************************************************************************
CALL FOR PAPERS

12th International Conference on New Technologies, Mobility and Security

NTMS 2025

June 18 - 20, 2025 // Paris, France

https://ntms.dnac.org/

*********************************************************************************

Submissions: https://edas.info/N33067

IMPORTANT DATES
--------------------------
- Papers Submission Deadline: January 18, 2025
- Papers Acceptance Notification: March 15, 2025
- Papers camera-ready: March 25, 2025


NTMS'2025 is the 12th IFIP International Conference on New Technologies, Mobility and Security that will be held on 18 - 20 June 2025 in Paris, France. The conference aims at fostering advances in the areas of New Technologies, Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS, Network Security and E-commerce, to mention a few, and provides a dynamic forum for researchers, students and professionals to present their state-of-the-art research and development in these interesting areas.
The event will be combined with tutorial sessions and workshops. Tutorials will precede the main program, aiming at the dissemination of mature knowledge and technology advances in the field.
Two or more Workshops will immediately follow the main conference, offering the opportunity for a more focused exchange of ideas and presentation of on-going research relevant to following tracks:

Track 1: Mobility & Wireless networks
Track 2: Security
Track 3: New Technologies & services


Track 1 : Mobility & Wireless networks
- Beyond 5G, 6G, and WiMAX Networks
- Wireless Local Area Networks
- Wireless Personal Area Networks
- Wireless Ad Hoc and Mesh Networks
- Wireless Vehicular Networks
- Cognitive Radio Networks
- Satellite Networks
- Self-organizing and Re-configurable Wireless Networks
- Energy Efficient Wireless Sensor Network Solutions
- Wireless MAC Protocols
- Scheduling Techniques for Wireless Networks
- Wireless QoS Routing Algorithms
- Radio Resource Allocation and Management
- Cross-layer Design and Optimization in Wireless Networks
- Clustering, Topology Control, Coverage and Connectivity
- Cooperation and Relaying in Wireless Networks
- Analysis, Simulation and Performance Evaluation
- Integration of Heterogeneous Mobile, Wireless and Wire-line Radio
- Mobility, Location Management and Handover Techniques for Wireless Mobile Networks
- Multimedia over Wireless and Mobile Systems
- Power-aware Architectures, Algorithms and Protocols for Wireless/Mobile Networks
- Wireless Services and Middleware Platforms
- Green Radio Communications
- Measurements, Testbeds and Deployment of Wireless Systems
- AI-Based Optimization for Secure and Efficient Wireless Communication Systems
- Machine Learning for Dynamic Spectrum Access and Wireless Network Security
- Deep Learning for Wireless Intrusion Detection in 5G/6G and Beyond Networks

Track 2: Cyber Security
- Security engineering. Methodologies, formalisms, modeling, tools, code instrumentation
- Security of 5G and 6G
- Security of WiFi and mobile networks
- Cryptography. Algorithms, protocols, attacks
- Security in distributed systems.
- Cryptographic Hardware and Embedded Systems.
- Light-weight cryptography.
- Information Hiding.
- Steganography
- Privacy and Anonymity.
- Security assurance. Evaluation, testing, formal proofs, certification.
- Quantum Cryptography and QKD.
- Trusted computing. Analyses and attacks, practical applications...
- Surveillance and monitoring. Intrusion detection, monitoring techniques, architectures,...
- Infrastructure. Middleware, proxies, PKIs, AAAs, SSO, credentials...
- Social and psychological aspects of security. User-centered security evaluation, perception of security and threats...
- Security and usability.
- AI-Powered Threat Detection and Response for Advanced Cyber Attacks
- Machine Learning for Predictive Cybersecurity: Anticipating and Mitigating Threats
- Deep Learning for Automated Malware Detection and Classification

Track 3: New Technologies & services
- New generation Internet, Post IP and IPv6
- Virtualization
- NGN architectures, protocols and services management and delivery
- Web 2.0 applications and IMS (IP Multimedia Subsystems)
- Next generation systems & Service-oriented techniques
- IPTV and content distribution networks
- User-centric networking and services
- multimedia indexing and retrieval
- Personalized access to media systems
- Context/content-aware services
- Smart Homes and E-Health
- Web Commerce & Services, Data models, Web searching & querying
- Web service based Grid computing and P2P computing
- Advanced identification techniques (Biometrics, RFID, etc.)
- Virtualization technologies for grid and parallel computing.
- Interactive media, voice and video, games, immersive applications
- Network virtualization, virtual private networks (VPN), and services - VoIP protocols and services
- Content-based networking: caching, distribution, load balancing, resiliency
- AI for Dynamic Resource Allocation in Virtualized Network Environments
- Artificial Intelligence for Enhancing User-Centric Networking and Services
- Machine Learning for Predictive Management of Next-Generation Network Architectures


NFORMATION FOR AUTHORS
-----------------------------------------
Authors are invited to submit papers for presentation at the conference, describing original, previously unpublished work, not currently under review by another conference, workshop, or journal.

Papers must be submitted electronically to EDAS at https://edas.info/N33067 in PDF format, US-Letter size (not A4), with all fonts embedded (the PDF-A standard meets this requirement). Please format your submission using the IEEE templates found at https://www.ieee.org/conferences/publishing/templates.html.
- Full papers (between 6 and 8 pages, 10 pt font in IEEE format) should present novel perspectives within the general scope of the conference. A best paper will be recognized based on the quality of research and results, as well as on the quality of presentation by the author.
- Short papers are an opportunity to present preliminary or interim results, and are limited to 04 camera-ready pages (10pt font in IEEE format).
- Abstract papers are an opportunity to present new ideas and are limited to 02 camera-ready pages.
Questions about authors’ submissions can be directed to the Track chairs.

***************************************************************************

TPC Chairs:
- Lyes KHOUKHI, Normandie University, France
- Ahmad FADLALLAH, University of Sciences and Arts, Lebanon
- Ahmed Serhrouchni, Telecom Paris Tech, France


General Chairs:
- Bijan JABBARI, George Mason University, USA
- Samia Bouzefrane, CNAM, France


Details: https://ntms.dnac.org/

Looking forward to your submissions!

Related Resources

IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
UBICOMM 2025   The Nineteenth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
SECURWARE 2025   The Nineteenth International Conference on Emerging Security Information, Systems and Technologies
IEEE-Ei/Scopus-CNIOT 2025   2025 IEEE 6th International Conference on Computing, Networks and Internet of Things (CNIOT 2025) -EI Compendex
SENSORCOMM 2025   The Nineteenth International Conference on Sensor Technologies and Applications
IJCACS 2025   International Journal of Control, Automation, Communication and Systems
CYBER 2025   The Tenth International Conference on Cyber-Technologies and Cyber-Systems
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)
NTIJ 2025   Nanoscience and Technology: An International Journal