Conference Tracks
CALL FOR PAPER
Original papers based on theoretical or experimental works related to the mentioned sub-themes are solicited for presentation at this conference. The paper should begin with the title, a short abstract, and a list of keywords.
✓ Simultaneous submissions (papers already submitted to other conferences/journals) are not allowed.
✓ Please do not submit plagiarized papers.
✓ Topics of interest include but are not limited to the following.
✓ Selected extended papers will be published in SCOPUS-indexed Journals.
✓ The conference invites Original Contributions on all topics related to Track 1 to Track 11
Session Tracks
- 5G and Beyond
- Wireless and Mobile Networks
- Internet of Things (IoT) Connectivity
- Smart Cities and Urban Communications
- Cybersecurity Strategies
- Intrusion Detection and Prevention Systems
- Cryptography and Data Encryption
- Privacy-Preserving Technologies
- Balancing National Security and Human Rights
- Humanitarian Challenges in Conflict Zones
- Refugees and Displaced Persons: Upholding Rights in Crisis
- Media Influence and Public Perception: Shaping the Narrative in Conflict
- Civilian Casualties and Accountability in Modern Warfare Proxy Wars nd Regional Dynamics
- Software-Defined Networking (SDN)
- Network Function Virtualization (NFV)
- Edge and Fog Computing
- Optical and Photonic Networks
- Malware Analysis and Mitigation
- Distributed Denial of Service (DDoS) Attacks
- Advanced Persistent Threats (APTs)
- Cyber Forensics and Investigation
- Blockchain and Distributed Ledger Technology
- Artificial Intelligence and Machine Learning in Security
- Quantum Computing and Post-Quantum Cryptography
- Security Challenges in Autonomous Systems
- Secure Communication Protocols
- Wireless Sensor Networks Security
- Ad Hoc and Mesh Networks
- Secure Routing and Data Transmission
- Quality of Service (QoS) in Networks
- Network Traffic Analysis and Engineering
- Performance Monitoring and Management
- Energy-Efficient Networking
- Secure Web Applications and Services
- Mobile Application Security
- Secure E-Commerce and Online Banking
- Social Media and Network Security
- Next-Generation Network Architectures
- Vehicular Networks and V2X Communication
- Satellite and Space Communications
- Green Communication Technologies
- User Authentication and Authorization
- Usable Security and Privacy
- Social Engineering and Phishing Attacks
- Security Awareness and Training