Conference Information
NISS' 2019: International Conference on Networking, Information Systems & Security
http://medi-ast.org/NISS19/
Submission Date:
2018-11-18
Notification Date:
2019-01-20
Conference Date:
2019-03-27
Location:
Rabat, Morocco
Years:
2
Viewed: 1791   Tracked: 0   Attend: 0

Conference Location
Call For Papers
Topics

Potential topics in this conference include, but are not limited to:

Networking

    Wireless/mobile networks (WBAN/WPAN/WLAN/WMAN/WWAN)
    5G/6G cellular systems and heterogeneous networks
    WSN
    Autonomous networking
    Cognitive radio, cooperative communication and networking
    Content distribution network (CDN)
    Contents/Information centric networking (CCN/ICN)
    Cross-layer design and optimization
    Cyber-physical system (CPS)
    Delay/Disruption tolerant network (DTN)
    Device-to-device communications
    Energy-efficient protocols, green networks, and smart grid
    Internet of things (IoT) and machine-to-machine (M2M) communications
    Network performance analysis/measurement and evaluation
    Network security, trust and privacy
    Network simulation and modeling
    Network survivability and reliability
    Operating systems and middleware support for networking
    Peer-to-peer (P2P)/Overlay networks
    Pricing and billing
    QoS/QoE and resource management
    Software defined networking (SDN) and network virtualization
    Vehicular and underwater networks
    Ubiquitous home and office networking

Information Systems & Intelligence

    Fog/Edge Computing
    Machine Intelligence
    Soft Computing Techniques and Neural Networks
    Artificial Intelligence
    Swarm Intelligence and Optimization
    Data Mining and Business Intelligence
    Deep Learning
    Machine learning and pattern recognition
    Computational intelligence
    Granular computing and cloud computing
    Social computing and networks
    Web of Things (WoT) and web-based applications
    Parallel Processing
    Big data Analytics
    Image Processing
    Data Mining and Analytics
    Parallel and Distributed Computing for knowledge mining algorithms
    Knowledge Base Development Models for AI
    Knowledge Extraction tools and strategies
    Recommender Systems
    Strategies for knowledge based market development

Security

    Cryptography
    Quantum Cryptology
    Symmetric and Asymmetric Cryptographic Protocols
    Random generators and pseudorandom
    Algebraic Cryptanalysis and polynomial systems
    hardware implementations and side channel attacks
    protocols based on identity or attributes
    Intrusion Detection & Prevention
    Mobile Security
    Smart cards Security
    Identity and Security in IoT
    Security Policies, Formal methods & verification
    Access Control Models
    Security, Privacy, Trust infrastructure and technologies
    Communication and Information Security
    Network Security
    Security and Privacy for Smart Systems
    Security and privacy for big data
    Security architectures
    Distributed systems security
    Mobile and web security
    Cloud Security
    Embedded systems security
    Web-based Application security
    Information Hiding
    Steganography
    Watermarking
    Fingerprinting
    Cryptography of algebraic curves
    Euclidean networks Based Cryptography
    Stream ciphers

Digital Forensics

    Forensic processes and procedures
    Big Data in digital forensics
    Network and log forensics
    Software and hardware forensic tools
    Small-scale digital devices forensics
    Messaging forensics
    Anti-Forensic and steganography 
    Cloud forensics: technical, jurisdiction and legal challenges
    Digital forensics and cybercrime laws
    Role of Big Data in forensic analysis
    IoT forensics
    Cybercrime laws and procedures
    Digital forensics and social crimes
    Digital forensics and financial crimes
    Digital forensics and homeland security
    Email forensics
    Digital crime scene investigation
    Digital forensics tools testing and evaluation
Last updated by Dou Sun in 2018-10-20
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
cba1ICIPInternational Conference on Image Processing2020-01-312020-04-302020-10-25
CIoTInternational Conference Cloudification of the Internet of Things2018-02-022018-03-302018-07-02
EBISSInternational Conference on e-Business and Information System Security 2011-02-252011-02-262011-05-28
DMBDInternational Conference on Data Mining and Big Data2020-03-192020-03-312020-07-14
NBiSInternational Conference on Network-Based Information Systems2017-05-122017-05-252017-08-24
BDCIEEE/ACM International Symposium on Big Data Computing2015-07-032015-08-212015-12-07
cWALCOMInternational Workshop on Algorithms and Computation2015-10-172015-11-282016-03-29
SCOMInternational Conference on Soft Computing2020-09-272020-10-302020-12-12
ICNITInternational Conference on Networking and Information Technology2020-09-052020-09-302020-11-21
bb4WAOAWorkshop on Approximation and Online Algorithms2015-06-192015-07-242015-09-17
Related Journals
Recommendation