posted by user: Busra || 5518 views || tracked by 4 users: [display]

NCS 2018 : Call for Participation - 10th International Conference on Network and Communications Security

FacebookTwitterLinkedInGoogle

Link: https://netcom2018.org/ncs/index.html
 
When Dec 22, 2018 - Dec 23, 2018
Where Dubai,UAE
Submission Deadline TBD
Categories    communications   wireless   networks   computer science
 

Call For Papers

Call for Participation - 10th International Conference on Network and Communications Security(NCS- 2018)

December 22 ~ 23, 2018, Dubai, UAE


Call for Participation


We invite you to join us in Dubai, UAE on December 22-23, 2018, for 10th International Conference on Network and Communications Security(NCS- 2018)

The will provide on the aWith the recent advances in Communication & network technology, the applications in commercial security scenario become increasing essential.

Highlights of CSEIT 2018 include:


Registration Participants


Non-Author / Co-Author/ Simple Participants (no paper)


350 USD (With proceedings)


For registration and details mail: ncs2018conf@yahoo.com (or) ncs_conf2018@netcom2018.org

Accepted Papers


  • ENCRYPTION MODEL USING PYTHON FOR SMART METER DATA PRIVACY

  • Warsame Ali, Aniekan Eno-Ibanga, John Fuller, Penrose Cofie and Samir Abood, Prairie View A&M University, USA

  • ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS

  • JACKELOU S. MAPA, College of Information Technology SAINT JOSEPH INSTITUTE OF TECHNOLOGY, Philippines

  • AN ONTOLOGY-BASED HIERARCHICAL BAYESIAN NETWORK CLASSIFICATION MODEL TO PREDICT THE EFFECT OF DNA REPAIRS GENES IN HUMAN AGEING PROCESS

  • JHasanein Alharbi, Al-Mustaqbal University College, Iraq

  • DESIGN OF MINIATURIZED SIW BAND PASS FILTER AT [32-36] GHZ

  • Rahali Bouchra1Otmani,Amina Abdeldjelil Amina,Belkacem Hadjira,STIC Laboratory, University of Tlemcen, Algeria

  • LIGHT WEIGHT AUTHENTICATION FOR LOW-END AUTOMOTIVE CONTROL UNITS WITH HARDWARE BASED INDIVIDUAL KEYS

    Sergei Bauer1, Martin Brunner2 and Peter Schartner31KAI Kompetenzzentrum fur Automobil und Industrieelektronik, Austria
    2Infineon Technologies AG, Munich, Germany
    3Alpen-Adria Universitat Klagenfurt, Austria

  • FUZZY BOOLEAN REASONING FOR DIAGNOSIS OF DIABETES
  • Mohamed Benamina, Baghdad Atmani and Sofia Benbelkacem, University of Oran 1 Ahmed Ben Bella BP 1524, Algeria

  • MICROSOFT DEVOPS APPLICATIONS ARCHITECTURE IN A UNIVERSITY ENVIRONMENT
  • J. Gutierrez and A. Sevillano, Universidad Peruana de Ciencias Aplicadas, Peru

  • VIRTUAL AIS GENERATION MANAGEMENT SYSTEM FOR WATERWAY RISK ASSESSMENT

  • JunSik Kim1, SeungWook Hong 2 and Suhyun Park31Dongseo University, Busan, Korea
    2ONE Data Technology, Sasang-gu, Busan, Korea
    3Division of Computer Engineering, Dongseo University, Busan, Korea

  • SURVEY: THE EVOLUTION OF THE USAGE OF AUGMENTED REALITY IN INDUSTRY 4.0.

  • Abir GALLALA, Bassem HICHRI and Peter PLAPPER, University of Luxembourg, Luxembourg

  • RANDOMIZED DYNAMIC TRICKLE TIMER ALGORITHM FOR INTERNET OF THINGS

  • Muneer Bani Yassein, Ansam Alnadi, Asmaa Bataineh, Jordan University of Science and Technology, Irbid, Jordan

  • BLACK HOLE ATTACK SECURITY ISSUES, CHALLENGES & SOLUTION IN MANET

  • Muneer Bani Yassein, Ismail Hmeidi, Yaser Khamayseh, Mohammad Al-Rousan Danah Arrabi, University of Science and Technology Jordan

  • RANDOMIZED DYNAMIC TRICKLE TIMER ALGORITHM FOR INTERNET OF THINGS

  • Muneer Bani Yassein, Ansam Alnadi, Asmaa Bataineh, Jordan University of Science and Technology, Irbid, Jordan
    Technology, Irbid, Jordan

  • AN ENHANCED TECHNIQUE OF SELF-CORRECTING LOCALIZATION ALGORITHM FOR VEHICULAR NODE POSITION ACCURACY IN THE DISTRIBUTED VANET
  • Hanan H. Al Malki1 and Abdellatif I. Moustafa 1,21Umm AL-Qura University, Makkah, Saudi Arabia
    2 Faculty of Eng., AL Azhar University, Cairo, Egypt

  • DATA MANAGEMENT PLATFORM SUPPORTING VOLUNTEER OCCUPATION SERVICES

  • ADamien Nicolas, Adnan Emeri, Marie Laure Watrinet and Djamel Khadraoui
    LIST: Luxembourg Institute of Science and Technology, Luxembourg

  • A PREFERMENT PLATFORM FOR IMPLEMENTING SECURITY MECHANISM FOR AUTOMOTIVE CAN BUS

  • MMabrouka Gmiden1, Mohamed Hedi Gmiden2 and Hafedh Gmiden2
    1,2National Engineers School of SfaxTunisia

  • SIGNAL SUPERPOSITION MODEL WITH MINERALOGY BASED SPECTROSCOPIC DIELECTRIC MODEL IN WIRELESS UNDERGROUND SENSOR NETWORKS

  • K.A. Nethravathi, R.V. College of Engineering, Bangalore, India

  • QOS ENHANCEMENT IN 6LOWPAN BY IPV6 PACKET COMPRESSION AND DYNAMIC BANDWIDTH ALLOCATION

  • Vinila Nagaraj,Kiran,Padmaja K,
    RVCE, Bangalore

  • CELL ASSOCIATION FOR MULTI BAND 5G CELLULAR HETNETS BASED ON NBS

  • Ahmed Zakaria 1 and Aziza I. Hussein2, 1Telecommunication Engineer, Telecom Egypt, Asyut, Egypt2Computer & Systems Eng. Dept. Minia University, Minia, Egypt Electrical & Computer Eng. Dept.Effat University, Jeddah, KSA

  • CELL ASSOCIATION FOR MULTI BAND 5G CELLULAR HETNETS BASED ON NBS

  • Ahmed Zakaria 1 and Aziza I. Hussein2, 1Telecommunication Engineer, Telecom Egypt, Asyut, Egypt 2Computer & Systems Eng. Dept. Minia University, Minia, Egypt Electrical & Computer Eng. Dept.Effat University, Jeddah, KSA

  • FW-TR: A NEW GENERATION OF FIREWALLS BASED ON TRUST-RISK ASSESSMENT OF FILTERING RULES AND POLICIES

  • Faouzi JAIDI, ESPRIT School of Engineering, Tunis, Tunisia

  • LATENCY AND ENERGY OPTIMIZATION USING MAC-AWARE ROUTING FOR WSNS

  • HSara Hebal and Lemia Louail, University Ferhat Abbas Sétif 1, Algeria

  • WISE DISSEMINATION AFTER AN EFFICIENT COLLECTION OF DATA BY CONFIDENCE INTERVAL IN WSN BASED ON IOT

  • Bedr-Eddine BENAISSA and Fedoua LAHFA, Abou Bekr Belkaid University, Tlemcen, Algeria

  • DESIGN OF FAULT-TOLERANT STRUCTURES FOR EFFICIENT COMMUNICATION IN AD HOC AND SENSOR NETWORKS USING EFFICIENTLY DOMINATABLE GRAPHS


  • A. Senthil Thilak, Sujatha V Shet and S.S. Kamath, National Institute of Technology Karnataka, India

  • INFLUENTIAL NODES DETECTION IN DYNAMIC SOCIAL NETWORKS


  • NesrineHAFIENE1,3,WafaKAROUI1,2 and LotfiBENROMDHANE1,3, 1Université de Sousse, Tunisie, 2Université de Tunis El Manar, Tunisie, 3Université de Sousse, Tunisie

  • CAMOUFLAGED WITH SIZE: A CASE STUDY OF ESPIONAGE USING ACQUIRABLE SINGLE-BOARD COMPUTERS

  • Kiavash Satvat1, Mahshid Hosseini, and Maliheh Shirvanian2
    1 University of Illinois at Chicago, Chicago, USA 2University of Alabama at Birmingham, Alabama, USA

  • PREDICTING SECURITY CRITICAL CONDITIONS OF CYBER PHYSICAL SYSTEMS WITH UNOBSERVABLES AND OBSERVATION TIMES

  • Alessio Coletta1, 2
    1Security and Trust Unit, Bruno Kessler Foundation, Italy 2 University of Trento, Italy

  • SECURE STRATEGY FOR OPTICAL IMAGE ENCRYPTION SYSTEM BASED ON AMPLITUDE MODULATION, PHASE MODULATION AND MODIFIED LOGISTIC MAP

  • Ahmed M. Elshamy1,Aziza I. Hussein2,3,Hesham F. A. Hamed4,M. A. Abdelghany4,and Hamdy M. Kelash5
    1Fujairah University, UAE 2Minia University,Egypt 3 Effat University, Jeddah, KSA 4Minia University, Minia, Egypt 5Menoufia University, Menouf, Egypt

  • RESEARCH ON NETWORK ANOMALY DETECTION METHOD BASED ON IMPROVED MSPCA


  • Zhenru Pan and Huaibin Wang , Tianjin University of Technology, China

  • SECURITY PROTOCOL FOR POLLUTION ATTACK USING NETWORK CODING


  • Kiattikul Sooksomsatarn, University of Phayao, Maeka, Muang, Thailand

  • AN ELASTIC-HYBRID HONEYNET FOR CLOUD ENVIRONMENT

  • SungWon Ahn, Minho Park, Soongsil University, Korea

  • ARTIFICIAL IMMUNE SYSTEMS BASED MECHANISM FOR THWARTING NETWORK PORT SCANNING TRAFFIC

  • Nuha Almasalmeh1, Firas Saidi2, Zouheir Trabelsi3, 1&3United Arab Emirates University, UAE, 2University of Manouba, Tunisia,

  • A MACHINE LEARNING APPROACH TO DETECT AND CLASSIFY 3D TWO-PHOTON POLYMERIZATION MICROSTRUCTURES USING OPTICAL MICROSCOPY IMAGES

  • Israel Goytom and Gu Yinwei
    Ningbo University, Faculty of Science, 315200, China

  • NEAR-DROWNING EARLY PREDICTION TECHNIQUE USING NOVEL EQUATIONS (NEPTUNE) FOR SWIMMING POOLS


  • B David Prakash, IAG Firemark Singapore

  • DEFECT DETECTION IN STEEL PLATE USING ULTRASONIC SIGNALS THROUGH FOURIER ANALYSIS


  • Mubarak Ahmad, Abdul Basit and Zinghua Liu, Beijing University of Technology, China.

  • VIDEO SEQUENCING BASED FACIAL EXPRESSION DETECTION WITH 3D LOCAL BINARY PATTERN VARIANTS

  • Kennedy Chengeta1 and Serestina Viriri, 1University of KwaZulu Natal,South Africa 2Westville Campus,South Africa

  • PAPR AND SPECTRUM ANALYSIS OF 4G AND 5G TECHNIQUES

  • Roopdeep kaur and Dr. Ashutosh Kumar Singh, Thapar University, India

    Related Resources

    ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
    IEEE-Ei/Scopus-SGGEA 2024   2024 Asia Conference on Smart Grid, Green Energy and Applications (SGGEA 2024) -EI Compendex
    ICTC 2025   2025 6th Information Communication Technologies Conference (ICTC 2025)--SCI
    IEEE-Ei/Scopus-ACEPE 2024   2024 IEEE Asia Conference on Advances in Electrical and Power Engineering (ACEPE 2024) -Ei Compendex
    ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
    Ei/Scopus-ACAI 2024   2024 7th International Conference on Algorithms, Computing and Artificial Intelligence(ACAI 2024)
    SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
    P2PTM 2024   14th International Conference on Peer-to-Peer Networks and Trust Management
    ICISPP--Ei 2025   2025 6th International Conference on Information Security and Privacy Protection (ICISPP 2025)
    EEI 2024   10th International Conference on Emerging Trends in Electrical, Electronics & Instrumentation Engineering