THE 2016 INTERNATIONAL SYMPOSIUM ON MOBILE COMPUTING, WIRELESS NETWORKS, AND SECURITY
All accepted papers of all symposiums will be published by Conference Publishing Services, CPS:
as part of the proceedings of The 2016 International Conference on Computational Science and Computational Intelligence (CSCI'16). Past year's CSCI proceedings are indexed into IEEE Xplore Digital Library and can be accessed via:
- Volume I (2014): http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=6822065
- Volume II (2014): http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=6822285
- Volume (2015): http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7420813
and via ACM Digital Library at: http://dl.acm.org/
Topics of interest include, but are not limited to the following
Human-Computer Interaction; Usability Studies; Mobile Communications; Mobile Computing; Mobile Hardware; Mobile Software; Hardware-Software Co-Design; Mobile Network Infrastructures; Protocols; Novel Mobile Devices; Smart Cards; Wearable Devices; Mobile Internet; Mobile e-Commerce and Multimedia; Carputers and Technologies; Application-specific Mobile Systems; Software Infrastructures for Pervasive System; Service Discovery Mechanisms and Protocols; Energy Aware Systems; Positioning and Tracking Technologies; Ubiquitous Computing; Middleware Services and Agent Technologies; Mobile Computing Applications and Emerging Technologies.
Power Management and Control, Low-Power Protocols; Satellite-based Systems; Broadcast Networks; High Altitude Platforms; GPS, Location-based Service and Mobile Devices; Mobile Agents; Wireless and Mobile Applications; Routing, Multicasting, ...; Resource Management, Wireless QoS; Wireless Network Architectures; Wireless Security; Personal Area Networks and Body Wireless Networks; Wireless Sensor and Actuator Networks; Node Placement and Topology Control Issues; Multi-user Detection; Mobile Wireless QoS, Radio Resource Management; Heterogeneous Wireless Networks, Radio Access Networks; Software-defined Radio, Reconfigurable Radio Networks; Wireless IP Networks, Interworking; Wireless Multimedia, QoS Adaptation; Disruption Tolerant Networks and Applications; Distributed Algorithms for Wireless Networks; Autonomous Mobile Sensor Networks; Sensor Networks; Ad Hoc Networks; Vehicular Networks; Underwater Networks; and Underground Networks; and Applications in Healthcare, Medical Imaging, Environment Monitoring, Industrial and Structural Monitoring, Smart Grids and Energy Control Systems, Smart Buildings and Smart Cities, Home Monitoring and Assisted Living Applications, Wireless Surveillance, Smart Fabrics and Wearables, Defense and Security, Vehicular Networks, and novel applications.
Network Security; Security Algorithms; Mobile Network Security; Security in Contents Distribution Networks; Virtual Private Network (VPN) Security; Tracing Techniques in Internet; Active Networks; Security in Grid and Cloud; Web Monitoring and Traps; Control Systems & SCADA Security; Transport-Level Security; IP Security; Electronic Mail security; Cryptographic and Related Methods; Security Protocols; Message Authentication Methods; Anonymity Technologies; Digital Signature Methods; Security Management; Surveillance Technologies; Security Policies; Channel Management; Digital Contents Copyright Protection; System Security Management; Information Security Management; Government Security Policy; Web Penetration Testing; Vulnerabilities Management; Information Assurance; Mission Assurance; Risk Assessment and Risk Management; Cyber Security Compliance; Security Auditing; Disaster Recovery; Access Control; Secure Use of Software; Biometrics and Forensics; Face Recognition Systems; Cyber Forensics; Forensic Analysis; Feature Extraction and Matching Algorithms; Embedded Systems Security; Security Architectures; Fault Attacks; Hardware Tamper Resistance; Smart Card Processors; Secure Storage Devices; Security in E-Commerce and M-Commerce; Watermarking; Cloud Computing Security; Database Security; Data Mining Security; Cyber Security Automation; Firewall Systems; Hacking Techniques and Related Issues; Intrusion Detection System (IDS); Honeypot; Virus Issues (Detection, Prevention ...); Attack Graphs; Malware Analysis; and Emerging Security Technologies.