Conference Information
ICCNS 2020: International Conference on Communication and Network Security
http://www.iccns.org/
Submission Date:
2020-08-15 Extended
Notification Date:
2020-09-10
Conference Date:
2020-11-27
Location:
Tokyo, Japan
Years:
10
Viewed: 10447   Tracked: 14   Attend: 3

Conference Location
Call For Papers
Topics of interest for submission include, but are not limited to:

•Security & Privacy in Wired, Wireless, Mobile, Hybrid, Sensor, Ad Hoc networks
•Network Intrusion Detection and Prevention, Firewalls, Packet Filters
•Malware and botnets
•Communication Privacy and Anonymity
•Distributed denial of service
•Public Key Infrastructures, key management, credentials
•Web security
•Secure Routing, Naming/Addressing, Network Management
•Security & Privacy in Pervasive and Ubiquitous Computing
•Security & Privacy for emerging technologies: VoIP, peer-to-peer and overlay network systems

Review Process:

By submitting a paper to ICCNS, the authors agree to the review process and understand that papers undergo a peer-review process. Manuscripts will be reviewed by appropriately qualified experts in the field selected by the Conference Committee, who will give detailed comments and — if the submission gets accepted — the authors submit a revised ("camera-ready") version that takes into account this feedback.

All papers are reviewed using a single-blind review process: authors declare their names and affiliations in the manuscript for the reviewers to see, but reviewers do not know each other's identities, nor do the authors receive information about who has reviewed their manuscript.

The Committees of ICCNS 2020 invest great efforts in reviewing the papers submitted to the conference and organising the sessions to enable the participants to gain maximum benefit.
Plagiarism:

ICCNS is utterly intolerant of plagiarism. Submitted papers are expected to contain original work executed by the authors with adequate, proper and scholarly citations to the work of others. It is the job of the authors to clearly identify both their own contribution(s) and also published results / techniques on which they depend or build. Reviewers are charged to ensure these standards are met.

If the author is found to commit an act of plagiarism, the following acts of sanction will be taken:

1. Reject the article submitted or delete the article from the final publications.
2. Report the authors violation to his/her supervisor(s) and affiliated institution(s)
3. Report the authors violation to the appropriate overseeing office of academic ethics and research funding agency.
4. Reserve the right to publish the authors name(s), the title of the article, the name(s) of the affiliated institution and the details of misconduct, etc. of the plagiarist”.
Dual/Double Submissions:

By submitting a manuscript to ICCNS, authors acknowledge that it has not been previously published or accepted for publication in substantially similar form in any peer-reviewed venue with publicly accessible papers, including journals, conferences, workshops, or other peer-reviewed, archival forums. Furthermore, no paper substantially similar in content has been or will be submitted to another peer-reviewed conference or workshop with publicly accessible papers during the review period.

The authors also attest that they did not submit a substantially similar Submission Instruction 2019. As a rule of thumb, the ICCNS submission should contain no more than 20 percent of material from previous publications. Violation of any of these conditions will lead to rejection.
Last updated by Dou Sun in 2020-07-11
Related Conferences
Related Journals
CCFFull NameImpact FactorPublisherISSN
IEEE Transactions on Communications5.690IEEE0090-6778
Journal of Optical Communications and Networking2.183OSA Publishing1943-0620
New Ideas in Psychology1.353Elsevier0732-118X
Computing in Science & Engineering2.074IEEE1521-9615
Abstract and Applied Analysis Hindawi1085-3375
bJournal of Computer Security IOS Press0926-227X
IEEE Open Journal of the Communications SocietyIEEE2644-125X
bComputers & Security3.062Elsevier0167-4048
IEEE Communications Letters3.457IEEE1089-7798
cBehaviour & Information Technology1.388Taylor & Francis0144-929X
Recommendation