ICCS 2023 Conference Programme

/br

All Accepted & Presented papers will be published in SCOPUS indexed Springer LNNS.

Cardiff Metropolitan University-United Kingdom (UK)

University of South Wales, United Kingdom (UK)

University of the west of England, United Kingdom (UK)

Swansea University, United Kingdom (UK)

Cardiff University, United Kingdom (UK)

University of Wales Trinity Saint David, United Kingdom (UK)

About Conference

The ICCS 2023 is an unparalleled opportunity to discuss cyberthreat analysis, operations, research, and law enforcement to coordinate various efforts to create a more secure world. The ICCS 2023 serves as a platform for researchers and practitioners from academia, industry, and government to present, discuss, and exchange ideas that address real-world problems with security and privacy in communication networks. The conference program will include special sessions, presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures and keynote speeches.

Through sharing and networking, ICCS 2023 will provide an opportunity for researchers, practitioners and educators to exchange research evidence, practical experiences and innovative ideas on issues related to the Conference theme.

Please consider submitting to this conference. We are interested in the entire range of concepts from theory to practice, including case studies, works-in-progress, and conceptual explorations.

Read More

Keynote Speakers

Professor Ts. Dr. Madihah Mohd Saudi
Professor Ts. Dr. Madihah Mohd Saudi
Professor in the Information Security & Assurance (ISA) Programme, Faculty of Science and Technology (FST) at Universiti Sains Islam Malaysia (USIM), Malaysia

Professor Ts. Dr. Madihah Mohd Saudi is a pioneering force in cybersecurity and education. As a Professor in the Information Security & Assurance (ISA) Programme, Faculty of Science and Technology (FST) at Universiti Sains Islam Malaysia (USIM), Malaysia, she drives innovation in both realms. Her tenure as USIM's former Chief Information Officer underscores her visionary integration of technology and education. With a remarkable career spanning over 20 years, Prof. Madihah has authored numerous books, strategic plans, and impactful journal papers. She holds esteemed positions worldwide, including Honorary Visiting Research Fellow at the University of Bristol's CyberSecurity Group and Visiting Professor roles at prominent institutions in Indonesia and Uzbekistan. A member of influential organizations like IEEE Computer Society, she excels in cybersecurity and machine learning. Her educational journey, from a BSc(Hons) in Computer Science to a PhD in Computer Security, combined with certifications like GSEC and CEH, reflects her commitment to expertise. Prof. Madihah's influence resonates across borders, shaping a brighter future in cybersecurity and education. Her legacy of knowledge, mentorship, and global collaboration continues to guide aspiring minds and professionals alike. Her research interests are malware, mobile security and data privacy.

Title: Cyber Risk and Resilience for Critical National Information Infrastructure (CNII) Sectors: Are We Ready?

Abstract: Technology advancement and cybersecurity exploitation in Critical National Information Infrastructure (CNII) sectors such as national defense and security, banking, energy, water and healthcare industries have increased over the past years. We are having a hard time safeguarding CNII sectors and implementing technology adoption due to the rise of different types of cybersecurity exploitations such as malware, insider threats, ransomware, denial-of-service (DoS), identity theft, and phishing. Hence, the speaker presents the identified cybersecurity exploitation corresponding risk factors that triggered the attacks against CNII sectors and suggestions for cyber resilience. Case studies on energy, water, and banking exploitation by the malware will be presented during this session. The experiment was conducted in a controlled lab environment with open-source tools and by using hybrid analysis.

Dr. Muhammad Ikram
Dr. Muhammad Ikram
Senior Lecturer within the School of Computing at Macquarie University

Dr. Muhammad Ikram holds the position of Senior Lecturer within the School of Computing at Macquarie University. He earned his Ph.D. degree from the University of New South Wales in 2018, and his academic journey has encompassed various prestigious roles and affiliations. He served as a joint Post-Doctoral Research Fellow, splitting his tenure between the University of Michigan in the United States and the Cyber Security Hub at Macquarie University. Dr. Ikram's current research endeavors revolve around substantial areas, notably large-scale measurements, analytics, and the critical examination of security and privacy matters within web and mobile platforms. In recent years, his focus has centered on the development of techniques harnessing machine-learning algorithms to combat security and privacy challenges, as well as enhancing fraud detection mechanisms tailored for online services. His research accomplishments are well-documented through a multitude of publications in renowned conferences such as USENIX Security Symposium, NDSS, PETS, and IMC, as well as in respected journals, including BMJ and ACM TOPS. Notably, his research contributions have garnered attention from various news and media outlets, reaching a global audience of millions.

Title: Analyzing vulnerabilities and security issues in mobile applications

Abstract: Mobile applications that actively monitor network connections pose substantial security and privacy risks to users. During this presentation, our primary focus will be on methodologies for assessing and scrutinizing potential weaknesses and security concerns inherent in mobile applications. We will provide an overview of the security issues we've identified, along with the vulnerabilities that can expose mobile devices to an array of potential threats, encompassing data exposure, remote command execution, and denial-of-service attacks. It is worth noting that we have responsibly disclosed these identified vulnerabilities and received acknowledgments from relevant vendors.

Dr Bernardi Pranggono
Dr Bernardi Pranggono
Associate Professor in Cyber Security and Computer Networks atAnglia Ruskin University, Cambridge, UK

Dr Bernardi Pranggono is an Associate Professor in Cyber Security and Computer Networks at Anglia Ruskin University, Cambridge, UK. He has a B.Eng. degree in Electronics and Telecommunication Engineering from Waseda University, Japan, an M.DigComms degree in Digital Communications from Monash University, Australia, and a Ph.D. degree in Electronics and Electrical Engineering from the University of Leeds, UK. He has previously held academic and research positions at Sheffield Hallam University, Glasgow Caledonian University, Queen's University Belfast, and the University of Leeds. He has held industrial positions at Oracle, PricewaterhouseCoopers, Accenture, and Telstra. His current research interests include cybersecurity, the Internet of Things, and green ICT. Dr Pranggono has co-authored over 45 papers in leading international conferences and journals and contributed to four book chapters. He is an associate editor in Frontiers of Computer Science and Frontiers in Communications and Networks. Dr Pranggono is a Fellow of the Higher Education Academy (HEA) and a Senior Member of the Institute of Electrical and Electronics Engineers (IEEE). He is the current Chair of SIG-Industrial IoT Networks, IEEE Internet of Things, Ad Hoc and Sensor Networks (IoT-AHSN) Technical Committee.

Title: Securing the Internet of Things: Challenges, Strategies, and Future Directions

Abstract: The Internet of Things (IoT) has rapidly evolved, connecting a wide range of devices, from smart homes and industrial machines to healthcare systems and autonomous vehicles. This interconnectedness has ushered in unprecedented opportunities and conveniences, but it has also introduced significant cybersecurity and privacy challenges. In this talk, we will explore the dynamic landscape of IoT security and privacy, examining the key challenges, effective strategies, and future directions for ensuring the safety and privacy of IoT ecosystems.

Focused Networking
Provides a free and open atmosphere where attendees talk and engage in creative ways.
Expert Speakers
Our speakers represent the cream of research and development practitioners worldwide.
Brilliant Ideas
High-impact, collaborative and new approaches to some of the world’s toughest problems.
Exceptional Program
Includes demonstrations, keynote speeches, plenary panel, breakout sessions as well as the industry program.
Global Participation
Anticipating attendees from various countries all over the world.
Inspirational Learning
Bringing together a researchers from several fields to collaborate together and create lasting change.


Deadlines

Call For Papers

July 25, 2023

Submission of Full papers (Final Extension)

October 31, 2023

Acceptance

November 20, 2023

Early Bird Registration

November 25, 2023

Conference

December 11-12, 2023

Camera-Ready

December 31, 2023

Publication (Tentative)

September 2025

Indexing

Post-conference, proceedings will be made available to the following indexing services for possible inclusion:

Scopus
dblp - computer science bibliography
Clarivate Analytics
google scholar

Countdown

Enthusiastic minds will be all together on the same floor to exchange ideas, share the trends and converge towards a usable knowledge application in the fascinating world of IoT.

Yes, with you we are also counting moments, see you during the Conference.

Conference Tracks
Cyber Security
  • Foundations
  • Big Data Techniques in Cyber Security
  • Forensic Analysis of Cyber Crimes
  • Secure Design, Tooling, and Engineering
  • Security and Trust of Citizens
  • Database security
  • Cloud security
  • Advance Persistent Threat
  • Network Monitoring and Control
  • Advance Security techniques
Privacy in Communication Networks
  • Digital Signature Techniques
  • Network Protocols
  • Next-generation Communication Networks
  • Modeling & Simulation of communication networks and Systems
  • Routing and Flow Control in LANs, WANs and PANs
  • Secure Routing, Naming/Addressing, Network Management
  • Security & Privacy in Pervasive and Ubiquitous Computing, e.g., RFIDs
  • Security & Privacy in Peer-to-Peer and Overlay Networks
  • Security & Privacy for Emerging Technologies: VoIP, Social Networks
  • Security & Isolation in Cloud, Data Center and Software-Defined Network
Conference also welcomes organizing various special sessions/workshops.