Conference Information
ISNCC 2017 : International Symposium on Networks, Computers and Communications
http://www.isncc-conf.org
Submission Date:
2017-02-05 Extended
Notification Date:
2017-03-26
Conference Date:
2017-05-17
Location:
Marrakech, Morocco
Years:
4
Viewed: 2818   Tracked: 5   Attend: 1

Conference Location
Advertisment
Call For Papers
The multi-thematic program of this symposium edition of ISNCC will focus on the major future Issues in Networking, Computing and Communications.

The symposium has Four tracks. Topics of interest include, but not limited to: 

Wireless and Mobile Communications & Networking

Wireless Ad hoc, Mesh and Sensor Networks
Vehicular Networks
Delay Tolerant Networks
Body Area Networks
Cloud Networking
Cellular Systems, 3G/4G and beyond
Peer to Peer Networking
Reconfigurable Wireless Networks
Resource  and Mobility Management
Cross-Layer Design and Optimization
Performance Analysis and QoS Provisioning
Network Planning, Capacity Analysis, and
Monitoring and Network Management Algorithms
Network Reliability, Privacy & Security
Software Defined Networking 
Adaptive Antennas and Beamforming
Multi-Antenna and MIMO Systems
Transmitter and Receiver Techniques
Cognitive Radio and Dynamic Spectrum Access
Convergence of Wireless Systems
Cognitive Radio and Dynamic Spectrum Access
Modulation, Coding, and Diversity Techniques
Channel Estimation, Modeling and Equalization
QoS and Scheduling
Wireless Communications Testbed Development
Signal Processing Interfaces in Cognitive Radio
Blind Signal Processing for Communications
Spectrum Shaping and Filters
VLSI and RF Circuits for Wireless Communications
	
Cloud, Grid and Social Computing & Networking

Cloud and Cluster Computing
Hybrid Information Technology
Intelligent and Pervasive Applications
Bioinformatics and Bio-Inspired Computing
Knowledge System and Intelligent Agent
Human-centric Computing and Social Networks
Engineering Applications of IT
Emerging Wireless/Mobile Applications
Application Services Oriented Networks
Context and Location-Aware 4G Services
Service discovery and integration
Adaptive Services management
Policies and strategies for deployment
Supervision and control
SIP Based convergent services
Content Distribution
Internet computing
NGOSS and tools
Supervision and Control
Interoperability, Mobile Data Management

Internet of Things & Big Data Analytics

Smart city theory, modeling and simulation
Intelligent infrastructure
Sensors and actuators
Smart economy development
e-health and emergency management
e-health applications and services
Smart environment and policy development
Citizen engagement and smart governance
Connected Vehicle (CV) technologies
Smart mobility and transportation
Automated driving
ITS for public transport
Computer vision for ITS applications
Urban Traffic simulation, modelling and Control
Internet of Things (IoT) and smart cities
IoT Enabling Technologies
IoT Application and Services
Intelligent vehicle-to-infrastructure integration
Smart grids
Digital city and smart growth
Smart home and smart buildings
Smart city Implementation
Advanced technology for Pedestrian and bicyclist safety
Smart city for Special Needs
Environmental monitoring tech. Knowledge acquisition from Big Data on the Web
Reasoning over uncertain Web data
Efficient models and solutions for querying and processing Big Data on the Web
Algorithms and systems for Web-scale mining
Web-based crowdsourcing and data analytics
Big Data and Web of Things
Clustering, classification, and summarization of Web data
Web-based social sensing and data analytics
Analytic Web services for Big Data
Open Linked Data and the Semantic Web
Web data integration
Machine learning on deep Web data
Data stream mining and spatio-temporal data analytics on Web of Things
Business analytics & Big Data practice on the Web
	
Security, Anonymity and Privacy

Mobile and wireless security
Mobile, Ad Hoc and Sensor Network Security
Internet/Intranet Security
Access control, Anonymity, Audit and audit reduction & Authentication and authorization
Applied cryptography, Cryptanalysis, Digital Signatures
Biometric security
Boundary control devices
Data and system integrity, Database security
Defensive information warfare
Denial of service protection, Intrusion Detection, Anti-malware
Distributed systems security
Electronic commerce
E-mail security, Spam, Phishing, E-mail fraud, Virus, worms, Trojan Protection
Information hiding and watermarking & Information survivability
Insider threat protection, Integrity
Intellectual property protection
Key management and key recovery
Language-based security
Monitoring and surveillance
Multimedia security ,Operating system security, Peer-to-peer security
Performance Evaluations of Protocols & Security Application
Privacy and data protection
Product evaluation criteria and compliance
Risk evaluation and security certification
Risk/vulnerability assessment
Security & Network Management
Security and Assurance in Operational, Technological, commercial Area
Security Engineering and Its Application
Security Models & protocols
Security threats like DDoS, MiM, Session Hijacking, Replay attack etc & countermeasures
Trusted computing
Ubiquitous Computing Security
Virtualization security, VoIP security, Web security
Last updated by Dou Sun in 2017-01-14
Related Publications
Advertisment
Related Conferences
Related Journals
Recommendation