Symposium on Mobile Computing, Wireless Networks, & Security (CSCI-ISMC)

by admin last modified Jan 04, 2020 02:46 PM
All accepted papers of all symposiums will be published by Conference Publishing Services, CPS: as part of the proceedings of The 2019 International Conference on Computational Science and Computational Intelligence (CSCI'19).


Past conference proceedings can be accessed via IEEE Xplore Digital Library at:


Since its inception, CSCI proceedings have always been approved and included into IEEE Xplore indexation/digital-library citation index databases.

Scope & Topics

   Mobile Computing:
   Human-Computer Interaction; Usability Studies; Mobile Communications;
   Mobile Computing; Mobile Hardware; Mobile Software; Hardware-Software
   Co-Design; Mobile Network Infrastructures; Protocols; Novel Mobile
   Devices; Smart Cards; Wearable Devices; Mobile Internet; Mobile e-Commerce
   and Multimedia; Carputers and Technologies; Application-specific Mobile
   Systems; Software Infrastructures for Pervasive System; Service Discovery
   Mechanisms and Protocols; Energy Aware Systems; Positioning and Tracking
   Technologies; Ubiquitous Computing; Middleware Services and Agent
   Technologies; Mobile Computing Applications and Emerging Technologies.
   Wireless Networks:
   Power Management and Control, Low-Power Protocols; Satellite-based Systems;
   Broadcast Networks; High Altitude Platforms; GPS, Location-based Service
   and Mobile Devices; Mobile Agents; Wireless and Mobile Applications;
   Routing, Multicasting, ...; Resource Management, Wireless QoS; Wireless
   Network Architectures; Wireless Security; Personal Area Networks and Body
   Wireless Networks; Wireless Sensor and Actuator Networks; Node Placement
   and Topology Control Issues; Multi-user Detection; Mobile Wireless QoS,
   Radio Resource Management; Heterogeneous Wireless Networks, Radio Access
   Networks; Software-defined Radio, Reconfigurable Radio Networks; Wireless
   IP Networks, Interworking; Wireless Multimedia, QoS Adaptation; Disruption
   Tolerant Networks and Applications; Distributed Algorithms for Wireless
   Networks; Autonomous Mobile Sensor Networks; Sensor Networks; Ad Hoc
   Networks; Vehicular Networks; Underwater Networks; and Underground
   Networks; and Applications in Healthcare, Medical Imaging, Environment
   Monitoring, Industrial and Structural Monitoring, Smart Grids and Energy
   Control Systems, Smart Buildings and Smart Cities, Home Monitoring and
   Assisted Living Applications, Wireless Surveillance, Smart Fabrics and
   Wearables, Defense and Security, Vehicular Networks, and novel applications.
   Network Security; Security Algorithms; Mobile Network Security; Security
   in Contents Distribution Networks; Virtual Private Network (VPN) Security;
   Tracing Techniques in Internet; Active Networks; Security in Grid and
   Cloud; Web Monitoring and Traps; Control Systems & SCADA Security;
   Transport-Level Security; IP Security; Electronic Mail security;
   Cryptographic and Related Methods; Security Protocols; Message
   Authentication Methods; Anonymity Technologies; Digital Signature Methods;
   Security Management; Surveillance Technologies; Security Policies; Channel
   Management; Digital Contents Copyright Protection; System Security
   Management; Information Security Management; Government Security Policy;
   Web Penetration Testing; Vulnerabilities Management; Information Assurance;
   Mission Assurance; Risk Assessment and Risk Management; Cyber Security
   Compliance; Security Auditing; Disaster Recovery; Access Control; Secure
   Use of Software; Biometrics and Forensics; Face Recognition Systems; Cyber
   Forensics; Forensic Analysis; Feature Extraction and Matching Algorithms;
   Embedded Systems Security; Security Architectures; Fault Attacks; Hardware
   Tamper Resistance; Smart Card Processors; Secure Storage Devices; Security
   in E-Commerce and M-Commerce; Watermarking; Cloud Computing Security;
   Database Security; Data Mining Security; Cyber Security Automation;
   Firewall Systems; Hacking Techniques and Related Issues; Intrusion
   Detection System (IDS); Honeypot; Virus Issues (Detection, Prevention ...);
   Attack Graphs; Malware Analysis; and Emerging Security Technologies.
Filed under: ,