7th International Conference on Cyber Security and Privacy in Communication Networks (ICCS) 2021
09-10 December 2021
Cardiff Metropolitan University-United Kingdom (UK)
In Collaboration with

Conference Proceedings
All Accepted & Presented papers will be reviewed for possible publication in Springer Nature's SN Computer Science journal.

Springer
Registration : Till December 09, 2021.

Click here To view ICCS 2021 Schedule


 

About Conference

The ICCS 2021 is an unparalleled opportunity to discuss cyberthreat analysis, operations, research, and law enforcement to coordinate various efforts to create a more secure world. The ICCS 2021 serves as a platform for researchers and practitioners from academia, industry, and government to present, discuss, and exchange ideas that address real-world problems with security and privacy in communication networks. The conference program will include special sessions, presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures and keynote speeches.

Through sharing and networking, ICCS 2021 will provide an opportunity for researchers, practitioners and educators to exchange research evidence, practical experiences and innovative ideas on issues related to the Conference theme.

Please consider submitting to this conference. We are interested in the entire range of concepts from theory to practice, including case studies, works-in-progress, and conceptual explorations.

Read More

Key Note Speaker

Professor Mohammad Hammoudeh, SMIEEE, MCIIS
Professor Mohammad Hammoudeh, SMIEEE, MCIIS,
Chair in Cyber Security Founder & EiC of ACM's Distributed Ledger Technologies: Research & Practice Journal Wireless and IoT Lead, IEEE UK & Ireland Cyber Security Head of the CfACS IoT Lab Department of Computing and Mathematics Manchester Metropolitan University | Manchester

Mohammad Hammoudeh is a Professor (Chair) of Cyber Security in the Department of Computing and Mathematics at the Manchester Metropolitan University. He is the founder and Editor in Chief of ACM's journal on Distributed Ledger Technologies: Research & Practice. Mohammad heads the CfACS Cyber Security & IoT Lab he founded in 2016 where he leads a multi-disciplinary group of research associates and Ph.D. students. From this, he established the Lab as a leading research hub in secure smart infrastructure with a broad portfolio of successful, industry-sponsored projects. Mohammad has been awarded above £6.5M in competitive research funding as Principal/Co-Investigator for 16 research projects. He has a global collaborative research network spanning the academic community, industry, policymakers, and wider technology stakeholders in the field of cybersecurity, blockchain, the Internet of Things, and complex highly decentralised systems. He currently investigates ways of improving industry practice to allow for guaranteed security and distributed computing applications using the zero trust security model. Throughout his 15 years research career, Mohammad developed significant insight and expertise into a number of computer science disciplines (such as cryptography and Artificial Intelligence) adjacent to his area of specialism (distributed systems).

Title: Digital forensics in emerging technologies, the cases of Blockchain and the Internet of Things

Abstract: Technology is moving faster than ever before. From Industry 5.0 to Society 5.0, emerging technologies started to transform the way we live and work. As technology is adopted at rates unrivalled in history, it is inconceivable to think of a crime where digital evidence does not play a role in its investigation. This ubiquity of digital traces has created an overwhelming problem for forensic investigators. Emerging technologies have inherent features, e.g., borderless infrastructures, seamless connectivity, encryption and anonymity, which make them anti-forensics by design. This calls for law enforcement to engage with such hyper-connected systems in more proactive methods of gathering evidence that go beyond seize and search. This talk covers the unprecedented challenges faced by digital forensics investigators in identifying relevant evidence sources and analysing vast amounts of data to extract digital footprints that meet the standards we expect from criminal investigations. It considers two use cases, namely blockchain and the Internet of Things, to identify the renewed challenges and the advancements to effectively protect our computerised societies and pursue (cyber)criminals.

Read more: https://www.mmu.ac.uk/computing-and-maths/staff/profile/index.php?id=2384.

Focused Networking
Provides a free and open atmosphere where attendees talk and engage in creative ways.
Expert Speakers
Our speakers represent the cream of research and development practitioners worldwide.
Brilliant Ideas
High-impact, collaborative and new approaches to some of the world’s toughest problems.
Exceptional Program
Includes demonstrations, keynote speeches, plenary panel, breakout sessions as well as the industry program.
Global Participation
Anticipating attendees from various countries all over the world.
Inspirational Learning
Bringing together a researchers from several fields to collaborate together and create lasting change.

Deadlines

Submission of Abstracts (Final Extension)

September 28, 2021

Submission of Full papers (Final Extension)

September 30, 2021

Acceptance

October 20, 2021

Camera-Ready

November 20, 2021

Early Bird Registration

October 30, 2021

Conference

December 09-10, 2021

Indexing

Post-conference, proceedings will be made available to the following indexing services for possible inclusion:

Scopus
dblp - computer science bibliography
Clarivate Analytics
google scholar

Countdown

Enthusiastic minds will be all together on the same floor to exchange ideas, share the trends and converge towards a usable knowledge application in the fascinating world of IoT.

Yes, with you we are also counting moments, see you during the Conference.

Conference Tracks
Cyber Security
  • Foundations
  • Big Data Techniques in Cyber Security
  • Forensic Analysis of Cyber Crimes
  • Secure Design, Tooling, and Engineering
  • Security and Trust of Citizens
  • Database security
  • Cloud security
  • Advance Persistent Threat
  • Network Monitoring and Control
  • Advance Security techniques
Privacy in Communication Networks
  • Digital Signature Techniques
  • Network Protocols
  • Next-generation Communication Networks
  • Modeling & Simulation of communication networks and Systems
  • Routing and Flow Control in LANs, WANs and PANs
  • Secure Routing, Naming/Addressing, Network Management
  • Security & Privacy in Pervasive and Ubiquitous Computing, e.g., RFIDs
  • Security & Privacy in Peer-to-Peer and Overlay Networks
  • Security & Privacy for Emerging Technologies: VoIP, Social Networks
  • Security & Isolation in Cloud, Data Center and Software-Defined Network
Conference also welcomes organizing various special sessions/workshops.