Call For Papers

The multi-thematic program of this symposium edition of ISNCC will fo
cus on the major future Issues in Networking,Computing and Communications.
Please download the [PDF Version] of the Call For Papers.
The symposium has Four tracks. Topics of interest include, but not limited to

Wireless and Mobile Communications & Networking


Wireless Ad hoc, Mesh and Sensor Networks

Vehicular Networks

Delay Tolerant Networks

Body Area Networks

Cloud Networking

Cellular Systems, 3G/4G and beyond

Peer to Peer Networking

Reconfigurable Wireless Networks

Resource  and Mobility Management

Cross-Layer Design and Optimization

Performance Analysis and QoS Provisioning

Network Planning, Capacity Analysis, and

Monitoring and Network Management Algorithms

Network Reliability, Privacy & Security

Software Defined Networking 

Adaptive Antennas and Beamforming

Multi-Antenna and MIMO Systems

Transmitter and Receiver Techniques

Cognitive Radio and Dynamic Spectrum Access

Convergence of Wireless Systems

Cognitive Radio and Dynamic Spectrum Access

Modulation, Coding, and Diversity Techniques

Channel Estimation, Modeling and Equalization

QoS and Scheduling

Wireless Communications Testbed Development

Signal Processing Interfaces in Cognitive Radio

Blind Signal Processing for Communications

Spectrum Shaping and Filters

VLSI and RF Circuits for Wireless Communications


Cloud, Grid and Social Computing & Networking


Cloud and Cluster Computing

Hybrid Information Technology

Intelligent and Pervasive Applications

Bioinformatics and Bio-Inspired Computing

Knowledge System and Intelligent Agent

Human-centric Computing and Social Networks

Engineering Applications of IT

Emerging Wireless/Mobile Applications

Application Services Oriented Networks

Context and Location-Aware 4G Services

Service discovery and integration

Adaptive Services management

Policies and strategies for deployment

Supervision and control

SIP Based convergent services

Content Distribution

Internet computing

NGOSS and tools

Supervision and Control

Interoperability, Mobile Data Management


 
Internet of Things & Big Data Analytics

Smart city theory, modeling and simulation
Intelligent infrastructure
Sensors and actuators
Smart economy development
e-health and emergency management
e-health applications and services
Smart environment and policy development
Citizen engagement and smart governance
Connected Vehicle (CV) technologies
Smart mobility and transportation
Automated driving
ITS for public transport
Computer vision for ITS applications
Urban Traffic simulation, modelling and Control
Internet of Things (IoT) and smart cities
IoT Enabling Technologies
IoT Application and Services
Intelligent vehicle-to-infrastructure integration
Smart grids
Digital city and smart growth
Smart home and smart buildings
Smart city Implementation
Advanced technology for Pedestrian and bicyclist safety
Smart city for Special Needs
Environmental monitoring tech. Knowledge acquisition from Big Data on the Web
Reasoning over uncertain Web data
Efficient models and solutions for querying and processing Big Data on the Web
Algorithms and systems for Web-scale mining
Web-based crowdsourcing and data analytics
Big Data and Web of Things
Clustering, classification, and summarization of Web data
Web-based social sensing and data analytics
Analytic Web services for Big Data
Open Linked Data and the Semantic Web
Web data integration
Machine learning on deep Web data
Data stream mining and spatio-temporal data analytics on Web of Things
Business analytics & Big Data practice on the Web
Web Services Discovery

 Security, Anonymity and Privacy

Mobile and wireless security

Mobile, Ad Hoc and Sensor Network Security

Internet/Intranet Security

Access control, Anonymity, Audit and audit reduction & Authentication and authorization

Applied cryptography, Cryptanalysis, Digital Signatures

Biometric security

Boundary control devices

Data and system integrity, Database security

Defensive information warfare

Denial of service protection, Intrusion Detection, Anti-malware

Distributed systems security

Electronic commerce

E-mail security, Spam, Phishing, E-mail fraud, Virus, worms, Trojan Protection

Information hiding and watermarking & Information survivability

Insider threat protection, Integrity

Intellectual property protection

Key management and key recovery

Language-based security

Monitoring and surveillance

Multimedia security ,Operating system security, Peer-to-peer security

Performance Evaluations of Protocols & Security Application

Privacy and data protection

Product evaluation criteria and compliance

Risk evaluation and security certification

Risk/vulnerability assessment

Security & Network Management

Security and Assurance in Operational, Technological, commercial Area

Security Engineering and Its Application

Security Models & protocols

Security threats like DDoS, MiM, Session Hijacking, Replay attack etc & countermeasures

Trusted computing

Ubiquitous Computing Security

Virtualization security, VoIP security, Web security