Open Science Research Excellence

ICNST 2022 : International Conference on National Security Technologies

Vienna, Austria
June 21 - 22, 2022

Conference Code: 22AT06ICNST

Conference Proceedings

All submitted conference papers will be blind peer reviewed by three competent reviewers. The peer-reviewed conference proceedings are indexed in the Open Science Index, Google Scholar, Semantic Scholar, Zenedo, OpenAIRE, BASE, WorldCAT, Sherpa/RoMEO, and other index databases. Impact Factor Indicators.

Special Journal Issues

ICNST 2022 has teamed up with the Special Journal Issue on National Security Technologies. A number of selected high-impact full text papers will also be considered for the special journal issues. All submitted papers will have the opportunity to be considered for this Special Journal Issue. The paper selection will be carried out during the peer review process as well as at the conference presentation stage. Submitted papers must not be under consideration by any other journal or publication. The final decision for paper selection will be made based on peer review reports by the Guest Editors and the Editor-in-Chief jointly. Selected full-text papers will be published online free of charge.

Conference Sponsor and Exhibitor Opportunities

The Conference offers the opportunity to become a conference sponsor or exhibitor. To participate as a sponsor or exhibitor, please download and complete the Conference Sponsorship Request Form.

Important Dates

Abstracts/Full-Text Paper Submission Deadline   May 13, 2021
Notification of Acceptance/Rejection   May 31, 2021
Final Paper (Camera Ready) Submission & Early Bird Registration Deadline   May 20, 2022
Conference Dates   June 21 - 22, 2022

Important Notes

Please ensure your submission meets the conference's strict guidelines for accepting scholarly papers. Downloadable versions of the check list for Full-Text Papers and Abstract Papers.

Please refer to the Paper Submission GUIDE before submitting your paper.

Selected Conference Papers

1) The Effects of Cross-Border Use of Drones in Nigerian National Security
H. P. Kerry
2) Improving Cyber Resilience in Mobile Field Hospitals: Towards an Assessment Model
Nasir Baba Ahmed, Nicolas Daclin, Marc Olivaux, Gilles Dusserre
3) Opportunities and Optimization of the Our Eyes Initiative as the Strategy for Counter-Terrorism in ASEAN
Chastiti Mediafira Wulolo, Tri Legionosuko, Suhirwan, Yusuf
4) Glorification Trap in Combating Human Trafficking in Indonesia: An Application of Three-Dimensional Model of Anti-Trafficking Policy
M. Kosandi, V. Susanti, N. I. Subono, E. Kartini
5) System Security Impact on the Dynamic Characteristics of Measurement Sensors in Smart Grids
Yiyang Su, Jörg Neumann, Jan Wetzlich, Florian Thiel
6) Cyber Security Situational Awareness among Students: A Case Study in Malaysia
Yunos Zahri, Ab Hamid R. Susanty, Ahmad Mustaffa
7) Perceptions of Cybersecurity in Government Organizations: Case Study of Bhutan
Pema Choejey, David Murray, Chun Che Fung
8) The Role of Banks Funding and Promoting the Foreign Trade: Case of Turkey
Mikail Altan
9) Labour Migration in Russia in the Context of Russia’s National Security Problem
A. V. Dolzhikova
10) Privacy vs. National Security: Where Do We Draw the Line?
Nooraneda Mutalip Laidey
11) Structural Transformation after 2000 in Turkey Economy Evaluation as Theoretical in the Context of Inflation and Foreign Trade
Sadife Güngör, Sevilay Konya, Zeynep Karaçor
12) Analyzing and Determining the Ideal Response Force for Combatting Terrorist Groups
Erhan Turgut, Salih Ergün, Abdülkadir Öz
13) Flexible Communication Platform for Crisis Management
Jiří Barta, Tomáš Ludík, Jiří Urbánek
14) The Law of Treaties and National Security of Islamic Republic of Iran
S. M. Tavakoli Sani, M. Sabbet Moghadam, Y. Khorram Farhadi, Iraj Rezayi Nejad
15) The Role of State in Combating Religious Extremism and Terrorism
Kadyrzhan Smagulov, Mukhtar Senggirbay, Sholpan Zhandossova, Lyaila Ivatova, Gulnar Nassimova

Similar conferences about Mechanical and Mechatronics Engineering