Download IEEE CONFERENCE ON COMMUNICATION TECHNOLOGIES

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Carrier IQ wikipedia , lookup

Unix security wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Information security wikipedia , lookup

Distributed firewall wikipedia , lookup

Next-Generation Secure Computing Base wikipedia , lookup

Cyberwarfare wikipedia , lookup

Security-focused operating system wikipedia , lookup

Wireless security wikipedia , lookup

Cyber-security regulation wikipedia , lookup

Computer and network surveillance wikipedia , lookup

Cyberattack wikipedia , lookup

Mobile security wikipedia , lookup

Cybercrime countermeasures wikipedia , lookup

Computer security wikipedia , lookup

Transcript
IEEE CONFERENCE ON COMMUNICATION
TECHNOLOGIES (ComTech-2017)
19-21 April 2017
MCS (NUST), Pakistan
http://icct2017.mcs.edu.pk/
CALL FOR PAPERS
Military College of Signals (MCS), a Campus of National University of Sciences and
Technology (NUST), Pakistan, is dedicated to advancing knowledge and educating
students in science and technology. As part of its continuing pursuit for excellence in the
domains of Telecommunications, Information Security and Software Engineering, MCS is
planning to hold an International Conference on Communications Technologies
(ComTech-2017), at its campus, in collaboration with IEEE and related industrial partners
in April 2017.
Conference Chair
Dr.Abdul Rauf
Conference Co-Chair:
Dr.Asif Masood
DEADLINES
The aim of ComTech-2017 is to provide a forum for researchers, developers and
practitioners from both academia and industry to meet, share and publish state-of-the-art
research results in recent advances in the fields of Telecommunications, Software
Engineering and Information/Cyber Security. The conference will include a peer review
program of technical sessions and high level key note speeches.
ICCT solicits original and unpublished contributions in, but not limited to, the following
topical areas:
Submission Deadline:
1st Dec, 2016
th
15 December 2016
Acceptance Notification
1st March, 2017
Camera Ready Paper:
15th March, 2017
Registration Deadline:
1stApril, 2017
Conference Date:
19th - 21st April, 2017
Submission Guidelines
Prospectus authors are
encouraged to submit
high quality original
and
unpublished
research papers for
ICCT 2017. Full papers
must not exceed 6
pages.
Authors are requested to
mention
following
acronyms in the title of
their submission for
respective tracks:
 CT: Communication
Track
 SET: Software Track
 IST: Information
Security Track
Papers
should
be
submitted via easy chair
conference submission
system
https://easychair.org/c
onferences/?conf=com
tech2017
Powered by TCPDF (www.tcpdf.org)
CT*: Telecommunication Track
 Wireless Access and Opportunistic
Networks
 Cellular and Broadband Wireless Networks
 Cooperative Communications, Distributed
MIMO and Relaying
 SDR and Cognitive Radio
 Network Architectures for Smart Grids
 Antennas, Propagation and RF Design
 Sensor Networks and Embedded Systems
 RFID Systems & Applications
 Cloud and Data Center Networks
 Optical Wireless and NGN Networks
 Satellite Networks and Positioning
Technologies
 Metro and Access Networks
 Network Management, Reliability, QoS
 Transmission Technologies and
Communication Theory
 Mesh, Machine-to-Machine Networks
 Green Communications
 Digital Signal/ Image Processing
 Control Systems and Machines
IST*: Information Security Track





Authentication and Access Control
Botnets
Cryptography and Cryptanalysis
Information Hiding
Cyber Laws in Pakistan and Social
Implications
Cybercrime Investigation and Incident
Response
Cyber Espionage, Warfare, Terrorism
Digital Forensics
Ethical Hacking, Vulnerability Assessment
and Defense
Malware Detection, Analysis and
Prevention
Data and Applications Security
Systems/ Distributed Systems Security
Network Security
Cloud Security
Critical Infrastructure Security
Social Networks and Web Security
Security and Privacy in Big data, Internet
of Things












SET*: Software Track










Engineering Web Applications
Mobile Applications
Artificial Intelligence
Object-Oriented Systems
Distributed Computing
High Performance Computing
Software tools and databases
Agile Software Engineering
Rational Unified Processing
Requirements Engineering








Systems Engineering
Data Mining and Data Warehousing
Reengineering and Reverse
Engineering
Service-Centric Software Engineering
Image Processing
Ubiquitous Computing
Modeling Techniques and Methods in
Software Engineering
Software Project Management
For queries contact us at
Email: [email protected]
Address: MCS, NUST, Humayun, Road Rawalpindi, Pakistan.