Open Science Research Excellence

ICCSI 2019 : International Conference on Cyber Security and Intelligence

Barcelona, Spain
December 16 - 17, 2019

Conference Code: 19ES12ICCSI

Conference Proceedings

All submitted conference papers will be blind peer reviewed by three competent reviewers. The peer-reviewed conference proceedings are indexed in the Open Science Index, Google Scholar, Semantic Scholar, Zenedo, OpenAIRE, BASE, WorldCAT, Sherpa/RoMEO, and other index databases. Impact Factor Indicators.

Special Journal Issues

ICCSI 2019 has teamed up with the Special Journal Issue on Cyber Security and Intelligence. A number of selected high-impact full text papers will also be considered for the special journal issues. All submitted papers will have the opportunity to be considered for this Special Journal Issue. The paper selection will be carried out during the peer review process as well as at the conference presentation stage. Submitted papers must not be under consideration by any other journal or publication. The final decision for paper selection will be made based on peer review reports by the Guest Editors and the Editor-in-Chief jointly. Selected full-text papers will be published online free of charge.

Conference Sponsor and Exhibitor Opportunities

The Conference offers the opportunity to become a conference sponsor or exhibitor. To participate as a sponsor or exhibitor, please download and complete the Conference Sponsorship Request Form.

Important Dates

Abstracts/Full-Text Paper Submission Deadline   December 12, 2019
Notification of Acceptance/Rejection   December 31, 2019
Final Paper (Camera Ready) Submission & Early Bird Registration Deadline   November 16, 2019
Conference Dates   December 16 - 17, 2019

Important Notes

Please ensure your submission meets the conference's strict guidelines for accepting scholarly papers. Downloadable versions of the check list for Full-Text Papers and Abstract Papers.

Please refer to the Paper Submission GUIDE before submitting your paper.

Selected Conference Papers

1) Exploring the Need to Study the Efficacy of VR Training Compared to Traditional Cybersecurity Training
Shaila Rana, Wasim Alhamdani
2) The Effects of Cross-Border Use of Drones in Nigerian National Security
H. P. Kerry
3) An Optimized Method for 3D Magnetic Navigation of Nanoparticles inside Human Arteries
Evangelos G. Karvelas, Christos Liosis, Andreas Theodorakakos, Theodoros E. Karakasidis
4) An Effective Decision-Making Strategy Based on Multi-Objective Optimization for Commercial Vehicles in Highway Scenarios
Weiming Hu, Xu Li, Xiaonan Li, Zhong Xu, Li Yuan, Xuan Dong
5) Philosophy, Geometry, and Purpose in Islamic and Gothic Architecture as Two Religious-Based Styles
P. Nafisi Poor, P. Javid
6) Interoperability Maturity Models for Consideration When Using School Management Systems in South Africa: A Scoping Review
Keneilwe Maremi, Marlien Herselman, Adele Botha
7) Trusting Smart Speakers: Analysing the Different Levels of Trust between Technologies
Alec Wells, Aminu Bello Usman, Justin McKeown
8) A Review in Recent Development of Network Threats and Security Measures
Roza Dastres, Mohsen Soori
9) Stakeholder Analysis of Agricultural Drone Policy: A Case Study of the Agricultural Drone Ecosystem of Thailand
Thanomsin Chakreeves, Atichat Preittigun, Ajchara Phu-ang
10) Studying Iranian Religious Minority Architecture: Differences and Commonalities in Religious and National Architecture after Safavid
Saeideh Soltanmohammadlou, Pilar M Guerrieri, Amir Kianfar, Sara Sadeghian, Yasaman Nafezi, Emily Irvin
11) An Application for Risk of Crime Prediction Using Machine Learning
Luis Fonseca, Filipe Cabral Pinto, Susana Sargento
12) Contraception in Guatemala, Panajachel and the Surrounding Areas: Barriers Affecting Women’s Contraceptive Usage
Natasha Bhate
13) Leadership Styles in the Hotel Sector and Its Effect on Employees’ Creativity and Organizational Commitment
Hatem Radwan Ibrahim Radwan
14) Countering Radicalization to Violent Extremism: A Comparative Study of Canada, the UK and South East Asia
Daniel Alati
15) CybeRisk Management in Banks: An Italian Case Study
E. Cenderelli, E. Bruno, G. Iacoviello, A. Lazzini

Similar conferences about Computer and Information Engineering