Welcome to NCS 2024

16th International Conference on Network and Communications Security (NCS 2024)

July 27 ~ 28, 2024, London, United Kingdom

Hybrid--Registered authors can present their work online or face to face New

Program Committee

More Details...



Accepted Papers

More Details...



London, United Kingdom

More Details...



Scope Call for Participation Program Schedule


16th International Conference on Network and Communications Security (NCS 2024) is a shift away from the traditional client-server model to systems based on the peer-to peer network, which allows users share resources effectively. Also, due to increase in number of Internet applications & users, the security issues and pivotal challenges include integrity verification, authentication, and access control etc., are also increasing. As a consequence, the subject of security protection in Network & Communication area has attracted intensive research activities in academia and industry. With the recent advances in Communication & network technology, the applications in commercial security scenario become increasing essential.


Registered authors are now able to present their work through our online platforms

Call for Papers


16th International Conference on Network and Communications Security (NCS 2024) is a shift away from the traditional client-server model to systems based on the peer-to peer network, which allows users share resources effectively. Also, due to increase in number of Internet applications & users, the security issues and pivotal challenges include integrity verification, authentication, and access control etc., are also increasing. As a consequence, the subject of security protection in Network & Communication area has attracted intensive research activities in academia and industry. With the recent advances in Communication & network technology, the applications in commercial security scenario become increasing essential.

Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to.


Topics of interest include, but are not limited to, the following


  • Access Control, Anonymity, Audit
  • Applied Cryptography, Cryptanalysis, Digital Signatures
  • Audit Reduction & Authentication
  • Authorization
  • Big Data Security, Privacy and Trust
  • Biometric Security
  • Blockchain
  • Boundary Control Devices
  • Certification and Accreditation
  • Cross-Layer Design for Security
  • Data and System Integrity, Database Security
  • Defensive Information Warfare
  • Denial of Service Protection, Intrusion Detection, Anti-Malware
  • Distributed Systems Security
  • Electronic Commerce
  • E-mail Security, Spam, Phishing, E-mail Fraud, Virus, Worms, Trojon Protection
  • Game and Software Engineering
  • Grid Security
  • Information Hiding and Watermarking
  • Information Survivability
  • Insider Threat Protection, Integrity
  • Intellectual Property Protection
  • Internet/Intranet Security
  • Key Management and Key Recovery
  • Language-Based Security
  • Machine Learning based Security
  • Mobile and Wireless Security
  • Mobile, Ad Hoc and Sensor Network Security
  • Monitoring and Surveillance
  • Multimedia Security ,Operating System Security, Peer-to-Peer Security
  • NLP for Security
  • Performance Evaluations of Protocols & Security Application
  • Privacy and Data Protection
  • Product Evaluation Criteria and Compliance
  • Risk Evaluation and Security Certification
  • Risk/Vulnerability Assessment
  • Security & Network Management
  • Security and Information Hiding in Data Mining
  • Security and Privacy for IoTt
  • Security Models & protocols
  • Security Threats & Countermeasures (DDoS, MiM, Session Hijacking,Replay attack etc,)
  • Trusted Computing
  • Ubiquitous Computing Security

Paper Submission

Authors are invited to submit papers through the conference Submission System by Closed. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & Information Technology (CS & IT) series (Confirmed).

Important Dates

Second Batch : (Submissions after May 04, 2024)

Submission Deadline

Closed

Authors Notification

July 24, 2024

Registration & camera - Ready Paper Due

July 25, 2024

Proceedings

Hard copy of the proceedings will be distributed during the Conference. The softcopy will be available on AIRCC Digital Library

Sponsors





Speakers


Yujia Mao
United States of America

David Weissman
Colorado State University
USA

Vinayak Elangovan
Penn State University Abington
United States of America

Samia Saidane
University of Trento
Italy

Manfred Sneps-Sneppe
Ventspils University of Applied Sciences
Latvia

Helena RifĂ -Pous
Universitat Oberta de Catalunya
Spain

Radhouane Boughammoura
Université de Monastir
Tunisia

Gilbert Busolo Lusweti
jomo Kenyatta University of Agriculture and Technology
kenya

Dong-geon Lee
Korea Universityy
South Korea

Zhiyao Zha
USA

Kamrul Hasan
Grand Valley State University
USA

Brian C. Xu
Flintridge Preparatory School
United States

Parthasarathy Srinivasan
USA