ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

ISMCICADT 2019 - International Symposium on Military Communications, Intelligence, Crime Analysis and Defense Technologies

Date2019-05-29 - 2019-05-31


VenueGhana Technology University College, Accra Ghana, Ghana Ghana

KeywordsComputing security cyber; iot; Computational Modelling; Applications; forensics; crypp


Topics/Call fo Papers

Call for Papers for May 2019: 2019 ISMCICADT International Symposium on Military Communications, Intelligence, Crime Analysis and Defense Technologies
International Symposium on Military Communications, Intelligence, Crime Analysis and Defense Technologies ISMCICADT 2019 is co-located with ICSIoT. Proceedings of Unclassified full papers of the in IEEE Xplore, IEEE CSDL and other places such as Scopus, titles of papers will be made available in Web of Science linked to ResearcherID and Clarivate Analytics’Publons etc.
It is an opportunity for academics, military personnel, police, other security agencies, practitioners and consultants from around the world who are involved in the study, management, development and implementation of systems and concepts to combat information warfare or to improve information systems security to come together and exchange ideas. There are several strong strands of research developing in the cyber warfare and cyber security area including the understanding of threats and risks to information systems, the development of a strong security culture, as well as incident detection and post incident investigation. New threats brought about by social networking and cloud computing are gaining interest from the research community and the conference is tackling these issues.
The Areas of the symposium are
 Electronic warfare
 Cyber warfare and information Command, Control and Communications
 Modelling and simulation
 Security, surveillance and reconnaissance
 IT management
 Ad hoc, mesh, sensor networks
 Cognitive network applications
 Cooperative diversity and physical layer network coding
 Cross-genre networks; Disruption-tolerant networks
 Hybrid optical/RF networks
 Mobility management
 Next-generation wireless networks
 Optical networks
 Personal area and body area networks
 Protocols: MAC, link-layer, network, transport
 Scalability of RF networks, Network control
 Smart Technology
 Smart grid
 Smart home
 Smart country
 Smart defence technology
 Smart military base
 Smart sensors.
 Military vehicle design
 Vehicle performance and survivability
 Platform structural design and analysis
 Dynamics and controls
 Acoustics
 Materials and processing
 Heat transfers
 Weapon system design
 Vehicle verification and validation
 Flight tests
 Aircraft design
 Platform aerodynamics
 Guidance and navigation
 System identification
 Simulations
 Hardware-in-the-loop simulations
 Sensor Explosions
 Electromagnetics
 Radio
 Control systems
 Power electronics and power drives
 Embedded systems
 Internet of Things
 Micro Electro Mechanical Systems
 Mechatronics; Communication Systems
 Wireless technologies
 Physical sensors
 Sensor networks
 Sensor applications
 Sensor fusion
 Wired and wireless sensors systems
 Radar technologies
 Surveillance technologies
 Radar networking
 Cognitive radars
 Passive radar
 Ground based, shipborne, airborne, and space based radars
 Synthetic aperture radars.
 Applications of defence technology for noncombatant operations
 Anti-terrorism
 Technology in counter-drug operations
 Risk analysis
 Safe city
 Military Cybernetics and Robotic Systems
 Military Engineering, Geospatial and Meteorological Support
 Weapon Systems
 Special and Combat Vehicles Systems
 civil-military disaster management technologies and systems
 Situational Awareness for Computer Networks Defense
 Computer Network Defense
 Cyber Situation Awareness
 Intelligence technologies
 Correlation & Automation
 Collaborative Situation Awareness for Decision Making
 Collaborative Defense Approach
 Fraud detection
 Situation Assessment & Decision Making
 Defense Strategy for the Enhancement of Situational Awareness
 Risk Management, Governance and Compliance
 Trust, Privacy and Anonymity Issues
 Financial technologies
 Digital Forensic Information Analysis
 Enterprise Information Security Policies, Standards and Procedures
 Risks posed by Wireless Networks, including through the use of Mobile Computing, BYOD, Wearable in CND environment
 Economic predictive and Analytic Technologies
 Cyber Situational Awareness Tools & Techniques
 Fuzzy Logic
 Rough Set
 Artificial Neural Networks
 Artificial Intelligence
 Genetic Algorithm
 Evidence Theory (DST)
 Bayesian Networks & Set Theory
 Big Data Analytics
 Game Theory
 Graph Theory
 Network Situational Awareness
 Cyber Attack Scenarios
 Situation-Aware and Context-Aware Network Applications
 CERTs and CSIRTs
 Security Event and Information Management
 Application Security, Audits and Penetration Testing
 National and Critical Infrastructure Security Issues
 Information Security
 Cyber Security
 Database Security
 Application Security
 Law Enforcement and Surveillance
 Border Protection and Controls
 Cyber Warfare and Counter Terrorism
 Situation Awareness in Military Operations
 Military Doctrinal in Situation Awareness
 C4ISR (Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance)
 Computer Network Operations
 Computer Network Defense
 Mission Awareness, Command and Control
 Analysis of Large-Scale Internet Traffic
 Attack Graphs
 Advanced Security Incident Analysis
 Sensor Correlation and Cross-Correlation
 Implementing Situational Awareness Systems
 Information Security Metrics and Measurements
 Web Traffic Characterisation
 Intrusion Detection Systems
 Traffic Characterisation Techniques
 Web Analytics
 Security Incident Response
 Cyber Situational Awareness Frameworks
 Proactive Defense Strategies
 Instance-Based Learning
 Adaptive Neural Logic
 Human-Assisted Decision Control
 Human in the Loop
 Automated Self-Responder
 Fusion Centres
 Tools for Metric Optimisation
 Visualisation and Digital Analytics
 Data Mining
 Filtration, Selection, and Risk-Based Prioritisation
 Metrics for Evaluation and Assessment
 Situational Awareness Applications
 Situational Awareness in C4ISR
 Situational Awareness in Cyber Command and Control Centres
 Situational Awareness in Intrusion Defense
 Situational Awareness in Cyber Physical Systems (CPS)
 Situational Awareness for Internet of Things (IoTs), Enterprise Internet of Things (EIoTs)
 Open Source Applications
 Designing Cyber Situational Awareness Solutions and Services
 Functional Requirements for Situation-aware services
 Non-Functional Requirements for Situation-aware Services and solutions
 Interface Design
 Interoperability
 Dynamism
 Complexity
 Performance
 Automation
 Realtime Processing
 Usefulness of Multisensor Data Fusion
 Information Data Fusion
 Sensor Fusion for Security Incident Analysis
 Security Incident Analysis
 Data Association & Correlation
 Security Information Visualisation
 Data Analytics
 Security Monitoring
 Situational Awareness Training
 Research and development in Situational Awareness
 Simulation and Testbeds in Cyber Situation Awareness
 Experimentation & Instrumentation
 Modelling
 Knowledge-base
 Theoretical Underpinnings in Situation Awareness
 Computational Intelligence as applied to defense and security problems
 weapon system technology
 cyber defense technology
 system engineering for weapon system
 system assurance for weapon system
 test and evaluation techniques for weapon system
 defense industrial security
 defense scientific and technical information security
 law, policy and strategy related with defense technology and security
 System randomization
 Artificial diversity
 Cyber maneuver and agility
 Software diversity
 Dynamic network configuration
 Moving target in the cloud
 System diversification techniques
 Dynamic compilation techniques
 Adaptive defenses
 Intelligent countermeasure selection
 MTD strategies and planning
 Deep learning for MTD
 MTD quantification methods and models
 MTD evaluation and assessment frameworks
 Large-scale MTD (using multiple techniques)
 Moving target in software coding, application API virtualization
 Autonomous technologies for MTD
 Theoretic study on modeling trade-offs of using MTD approaches
 Human, social, and usability aspects of MTD
 Measurement studies
 Cyber warfare attacks and defense
 Social cyber-attacks and defense
 Memory exploitation
 Applied cryptography
 Network protocol vulnerability analysis
 Blockchain attacks
 Reverse engineering, and reverse engineering Automation
 Operational experience and case studies
 Malware infection vectors (drivebys, worms, mobile exploits, etc.)
 Phishing
 Applied decryption techniques
 Eavesdropping
 Attacks and Defense of emerging technologies
 Carding and identity theft
 Hardware vulnerabilities
 Insider threat detection and prevention
 Application of data science to cyber attacks and defense
 Attacks against distributed cloud storage
 Target and Background Signatures
 Electro-Optical and Infrared Systems: Technology and Applications
 Electro-Optical Remote Sensing
 Technologies for Optical Countermeasures
 High Power Lasers: Technology and Systems, Platforms, Effects
 Advanced Free-Space Optical Communication Techniques and Applications
 Emerging Technologies
 Millimetre Wave and Terahertz Sensors and Technology
 Optical Materials and Biomaterials in Security and Defence Systems Technology
 Counterterrorism, Crime Fighting, Forensics, and Surveillance
 Quantum Technologies and Quantum Information Science
 Unmanned Sensors and Systems and Countermeasures
 Advanced Manufacturing Technologies for Micro- and Nanosystems in Security and Defence
 NEW - Artificial Intelligence and Machine Learning in Defence Applications
 Social media and related regime conflicts
 Social media and the Occupy movement
 Social media and student protests / austerity protests
 Social media and riots / social unrest in urban areas
 Social media and political protests and activism
 Social media and marginal political groups
 Social media, right-wing extremism, and fascism
 Social media and religious violence
 Social media and organized crime
 Social media and policing
 Social media and police violence
 Social media and the state-industrial surveillance complex
 Social media and Anonymous
 Social media and WikiLeaks
 Extraction and geocoding (address resolution) of event locations from unstructured text
 Extraction and normalization of event times from unstructured text
 Extraction of person/group names and sentiment from unstructured text
 Extraction of other useful information from unstructured text
 Processing of “noisy” sources of unstructured text (e.g., Twitter and weblogs)
 Fusion of the above (or other) textual information with criminal incident data
 Etc.
There will be closed door round table Technical Program Session for security personnel only.
Proceedings of Unclassified Paper full papers of the International Symposium on Military Communications, Intelligence, Crime Analysis and Defense Technologies ISMCICADT 2019 will be added to 2019 ICSIoT conference full papers and will be submitted to IEEE Xplore, IEEE CSDL and other places such as Scopus, titles of papers will be made available in Web of Science linked to ResearcherID and Clarivate Analytics’ Publons etc.
Registration for Full Paper $300 (Short paper 3-4 pages and Full paper 5-6 pages IEEE Paper template This covers presentation and conference participation.
Registration for Abstract Only $100. (Title, Name of Authors, Affiliation, Abstract and Key words) This covers presentation and conference participation.
All selected papers further qualified for future advancement/improvement of work-done for Special Issues in reputable Journals and Book Chapters to be indexed in reputable places such as SCOPUS. Authors will be contacted in the future for submissions to these call for papers. All selected abstracts qualify for such invitations.
Submission link:
Website :
Deadline for full papers submission :
20th May 2019
Final notification of acceptance :
25th May 2019
Deadline for registration :
27th May 2019
Deadline for Camera-ready :
28th May 2019
Conference date : 29th to 31th May 2019
Venue : Ghana Technology University College, Accra Ghana.

Last modified: 2019-04-28 17:30:00