Topical areas of interest include, but are not limited to:
Software and Application Security
-
Mobile Network Security Technologies
-
Risk Management in Software Projects
-
Secure Composition and Adaptation of Services
-
Secure Software Engineering
-
Secure Wireless Communications
-
Security and Cryptography
-
Security and Usability
-
Security Architecture in Web Application Development
-
Security Aspects of Web Application Deployment
-
Security Automation Tools
-
Security in Continuous Deployment
-
Security on e-commerce and e-governance
-
Static and Dynamic Analysis for Security
-
System Security
-
Teaching Secure Software Development
-
Verification and Assurance Techniques for Security Properties
-
Vulnerability Detection Model
-
Web Application Security Requirements
-
Web Application Security Testing
Computer Science
-
Artificial Intelligence
-
Big Data
-
Computer Networks
-
Computer Security
-
Computing Ethics
-
Computational Intelligence
-
Computer Vision
-
Data Encryption
-
Data Security for Bioinformatics
-
Database Systems
-
Design and Deployment of Secure Services
-
Digital Signal and Image Processing
-
E-commerce and E-governance
-
Human-Computer Interaction
-
Industry on Cyber Security
-
Information Security & Risk Management
-
Information Systems
-
Internet and Web Applications
-
Knowledge Data Engineering
-
Mobile Network Technologies and Applications
-
Spatial Data Mining
Communication Security
-
Circuits and Systems
-
Control Theory and Applications
-
Data Communication Systems
-
Electric Vehicle Technologies
-
Electric Vehicle Charging V2V
-
Electronics and Electrical Engineering
-
Electronics, Information & Control Systems
-
Mobile, Ad Hoc and Sensor Network Management
-
Power Engineering and Power Systems
-
Power System Modeling, Simulation and Analysis
-
Robotics and Automation
-
Sensing and Sensor Networks
-
Signal Processing
-
System Modeling and Simulation
-
Wireless Sensor Networks
-
Wireless Communication and Mobile
Paper Submission
Please submit your paper through the following link in Microsoft CMT: Microsoft CMT Submission
Please prepare your paper using the following template: Template link
The criteria for accepting abstracts/full papers for the conference include: relevancy to the conference themes, clear writing, aims, and objectives of the study clearly presented, novelty elaborated, and methodology of the work briefly mentioned.
The abstracts (1 page) will be included in the ICONCS Conference Proceedings.
All of full papers presented at the conference, will be published on selected journals. Selective outstanding full papers, after further revision, will be considered for publication in JESTECH journal by ELSEVIER which is classified with SCI-Exp (Q1). Remaining presented full papers will be published in JOMCOM Journal of Millimeterwave Communication, Optimization and Modelling
You will be notified about the acceptance or rejection of your abstract/full paper before or on the abstract notification date.
If you face any difficulties in the submission of your abstract, please contact the organizing team at iconcs@karabuk.edu.tr
Each registered author may submit and present two papers at most. Second paper will be 25% off.
Content Guidelines
-
The official language of the symposium is English.
-
The title of the paper must reflect the work.
-
The full names (first and last names), titles, organizations, and email addresses of all authors must be clearly stated. Contact information (i.e., mailing addresses and telephone) must be added.
-
Abstracts (not including the titles) must not exceed 300 words.
-
At least one of the authors named in the abstract must register for the symposium by the registration due date. Only papers submitted by authors who have registered for the symposium shall be included in the program.
-
The registration fee includes only one paper. Participants who would like to send additional papers should pay 75% of the registration fee for each extra paper.
-
The submitting author is responsible for ensuring that the article’s publication has been approved by all other co-authors and takes responsibility for the paper during submission and peer review.
-
Articles submitted should report original and previously unpublished findings. Practising ethical conduct is very critical in the academic world. Hence, no act of plagiarism can be tolerated.
-
All papers will be subjected to peer-reviews based on relevancy, structure, research method, ethical conduct, language standard, innovativeness, references, hypothesis, result presentation, proficiency, and format.
-
The length of the presentations should be around 15 minutes including a Q&A section. You can use any form of presentation you wish. Presenters would be requested to arrive at the designated venue 10 minutes before the session begins and report to the session chair.