ISNCC 2017 - International Symposium on Networks, Computers and Communications (ISNCC 2017)
Date2017-05-17 - 2017-05-19
Deadline2016-12-18
VenueMarrakech & Ouarzazate, Morocco
Keywords
Websitehttps://www.isncc-conf.org
Topics/Call fo Papers
The symposium has Four tracks. Topics of interest include, but not limited to:
Wireless and Mobile Communications & Networking
Wireless Ad hoc, Mesh and Sensor Networks
Vehicular Networks
Delay Tolerant Networks
Body Area Networks
Cloud Networking
Cellular Systems, 3G/4G and beyond
Peer to Peer Networking
Reconfigurable Wireless Networks
Resource and Mobility Management
Cross-Layer Design and Optimization
Performance Analysis and QoS Provisioning
Network Planning, Capacity Analysis, and
Monitoring and Network Management Algorithms
Network Reliability, Privacy & Security
Software Defined Networking
Adaptive Antennas and Beamforming
Multi-Antenna and MIMO Systems
Transmitter and Receiver Techniques
Cognitive Radio and Dynamic Spectrum Access
Convergence of Wireless Systems
Cognitive Radio and Dynamic Spectrum Access
Modulation, Coding, and Diversity Techniques
Channel Estimation, Modeling and Equalization
QoS and Scheduling
Wireless Communications Testbed Development
Signal Processing Interfaces in Cognitive Radio
Blind Signal Processing for Communications
Spectrum Shaping and Filters
VLSI and RF Circuits for Wireless Communications
Cloud, Grid and Social Computing & Networking
Cloud and Cluster Computing
Hybrid Information Technology
Intelligent and Pervasive Applications
Bioinformatics and Bio-Inspired Computing
Knowledge System and Intelligent Agent
Human-centric Computing and Social Networks
Engineering Applications of IT
Emerging Wireless/Mobile Applications
Application Services Oriented Networks
Context and Location-Aware 4G Services
Service discovery and integration
Adaptive Services management
Policies and strategies for deployment
Supervision and control
SIP Based convergent services
Content Distribution
Internet computing
NGOSS and tools
Supervision and Control
Interoperability, Mobile Data Management
Internet of Things & Big Data Analytics
Smart city theory, modeling and simulation
Intelligent infrastructure
Sensors and actuators
Smart economy development
e-health and emergency management
e-health applications and services
Smart environment and policy development
Citizen engagement and smart governance
Connected Vehicle (CV) technologies
Smart mobility and transportation
Automated driving
ITS for public transport
Computer vision for ITS applications
Urban Traffic simulation, modelling and Control
Internet of Things (IoT) and smart cities
IoT Enabling Technologies
IoT Application and Services
Intelligent vehicle-to-infrastructure integration
Smart grids
Digital city and smart growth
Smart home and smart buildings
Smart city Implementation
Advanced technology for Pedestrian and bicyclist safety
Smart city for Special Needs
Environmental monitoring tech. Knowledge acquisition from Big Data on the Web
Reasoning over uncertain Web data
Efficient models and solutions for querying and processing Big Data on the Web
Algorithms and systems for Web-scale mining
Web-based crowdsourcing and data analytics
Big Data and Web of Things
Clustering, classification, and summarization of Web data
Web-based social sensing and data analytics
Analytic Web services for Big Data
Open Linked Data and the Semantic Web
Web data integration
Machine learning on deep Web data
Data stream mining and spatio-temporal data analytics on Web of Things
Business analytics & Big Data practice on the Web
Security, Anonymity and Privacy
Mobile and wireless security
Mobile, Ad Hoc and Sensor Network Security
Internet/Intranet Security
Access control, Anonymity, Audit and audit reduction & Authentication and authorization
Applied cryptography, Cryptanalysis, Digital Signatures
Biometric security
Boundary control devices
Data and system integrity, Database security
Defensive information warfare
Denial of service protection, Intrusion Detection, Anti-malware
Distributed systems security
Electronic commerce
E-mail security, Spam, Phishing, E-mail fraud, Virus, worms, Trojan Protection
Information hiding and watermarking & Information survivability
Insider threat protection, Integrity
Intellectual property protection
Key management and key recovery
Language-based security
Monitoring and surveillance
Multimedia security ,Operating system security, Peer-to-peer security
Performance Evaluations of Protocols & Security Application
Privacy and data protection
Product evaluation criteria and compliance
Risk evaluation and security certification
Risk/vulnerability assessment
Security & Network Management
Security and Assurance in Operational, Technological, commercial Area
Security Engineering and Its Application
Security Models & protocols
Security threats like DDoS, MiM, Session Hijacking, Replay attack etc & countermeasures
Trusted computing
Ubiquitous Computing Security
Virtualization security, VoIP security, Web security
Wireless and Mobile Communications & Networking
Wireless Ad hoc, Mesh and Sensor Networks
Vehicular Networks
Delay Tolerant Networks
Body Area Networks
Cloud Networking
Cellular Systems, 3G/4G and beyond
Peer to Peer Networking
Reconfigurable Wireless Networks
Resource and Mobility Management
Cross-Layer Design and Optimization
Performance Analysis and QoS Provisioning
Network Planning, Capacity Analysis, and
Monitoring and Network Management Algorithms
Network Reliability, Privacy & Security
Software Defined Networking
Adaptive Antennas and Beamforming
Multi-Antenna and MIMO Systems
Transmitter and Receiver Techniques
Cognitive Radio and Dynamic Spectrum Access
Convergence of Wireless Systems
Cognitive Radio and Dynamic Spectrum Access
Modulation, Coding, and Diversity Techniques
Channel Estimation, Modeling and Equalization
QoS and Scheduling
Wireless Communications Testbed Development
Signal Processing Interfaces in Cognitive Radio
Blind Signal Processing for Communications
Spectrum Shaping and Filters
VLSI and RF Circuits for Wireless Communications
Cloud, Grid and Social Computing & Networking
Cloud and Cluster Computing
Hybrid Information Technology
Intelligent and Pervasive Applications
Bioinformatics and Bio-Inspired Computing
Knowledge System and Intelligent Agent
Human-centric Computing and Social Networks
Engineering Applications of IT
Emerging Wireless/Mobile Applications
Application Services Oriented Networks
Context and Location-Aware 4G Services
Service discovery and integration
Adaptive Services management
Policies and strategies for deployment
Supervision and control
SIP Based convergent services
Content Distribution
Internet computing
NGOSS and tools
Supervision and Control
Interoperability, Mobile Data Management
Internet of Things & Big Data Analytics
Smart city theory, modeling and simulation
Intelligent infrastructure
Sensors and actuators
Smart economy development
e-health and emergency management
e-health applications and services
Smart environment and policy development
Citizen engagement and smart governance
Connected Vehicle (CV) technologies
Smart mobility and transportation
Automated driving
ITS for public transport
Computer vision for ITS applications
Urban Traffic simulation, modelling and Control
Internet of Things (IoT) and smart cities
IoT Enabling Technologies
IoT Application and Services
Intelligent vehicle-to-infrastructure integration
Smart grids
Digital city and smart growth
Smart home and smart buildings
Smart city Implementation
Advanced technology for Pedestrian and bicyclist safety
Smart city for Special Needs
Environmental monitoring tech. Knowledge acquisition from Big Data on the Web
Reasoning over uncertain Web data
Efficient models and solutions for querying and processing Big Data on the Web
Algorithms and systems for Web-scale mining
Web-based crowdsourcing and data analytics
Big Data and Web of Things
Clustering, classification, and summarization of Web data
Web-based social sensing and data analytics
Analytic Web services for Big Data
Open Linked Data and the Semantic Web
Web data integration
Machine learning on deep Web data
Data stream mining and spatio-temporal data analytics on Web of Things
Business analytics & Big Data practice on the Web
Security, Anonymity and Privacy
Mobile and wireless security
Mobile, Ad Hoc and Sensor Network Security
Internet/Intranet Security
Access control, Anonymity, Audit and audit reduction & Authentication and authorization
Applied cryptography, Cryptanalysis, Digital Signatures
Biometric security
Boundary control devices
Data and system integrity, Database security
Defensive information warfare
Denial of service protection, Intrusion Detection, Anti-malware
Distributed systems security
Electronic commerce
E-mail security, Spam, Phishing, E-mail fraud, Virus, worms, Trojan Protection
Information hiding and watermarking & Information survivability
Insider threat protection, Integrity
Intellectual property protection
Key management and key recovery
Language-based security
Monitoring and surveillance
Multimedia security ,Operating system security, Peer-to-peer security
Performance Evaluations of Protocols & Security Application
Privacy and data protection
Product evaluation criteria and compliance
Risk evaluation and security certification
Risk/vulnerability assessment
Security & Network Management
Security and Assurance in Operational, Technological, commercial Area
Security Engineering and Its Application
Security Models & protocols
Security threats like DDoS, MiM, Session Hijacking, Replay attack etc & countermeasures
Trusted computing
Ubiquitous Computing Security
Virtualization security, VoIP security, Web security
Other CFPs
- 女性が拓く未来のテクノロジー ?Women in Engineering 2016?
- International Congress on Microbial Interaction 2017
- IJSE Special Issue on Data Analytics
- 2017 6th International Conference on Frontiers of Information Technology (ICFIT 2017)--EI Compendex, Scopus, and ISI CPCS
- 2017 International Conference on Digital Signal Processing (ICDSP 2017)--EI Compendex, Scopus, and ISI CPCS
Last modified: 2016-09-22 23:01:45