Call for Papers | Download flyer
Topics of interest for submission include, but are not limited to:
•Security & Privacy in Wired, Wireless, Mobile, Hybrid, Sensor, Ad Hoc networks
•Network Intrusion Detection and Prevention, Firewalls, Packet Filters
•Malware and botnets
•Communication Privacy and Anonymity
•Distributed denial of service
•Public Key Infrastructures, key management, credentials
•Secure Routing, Naming/Addressing, Network Management
•Security & Privacy in Pervasive and Ubiquitous Computing
•Security & Privacy for emerging technologies: VoIP, peer-to-peer and overlay network systems
By submitting a paper to ICCNS, the authors agree to the review process and understand that papers undergo a peer-review process. Manuscripts will be reviewed by appropriately qualified experts in the field selected by the Conference Committee, who will give detailed comments and — if the submission gets accepted — the authors submit a revised ("camera-ready") version that takes into account this feedback.
All papers are reviewed using a single-blind review process: authors declare their names and affiliations in the manuscript for the reviewers to see, but reviewers do not know each other's identities, nor do the authors receive information about who has reviewed their manuscript.
The Committees of ICCNS 2020 invest great efforts in reviewing the papers submitted to the conference and organising the sessions to enable the participants to gain maximum benefit.
ICCNS is utterly intolerant of plagiarism. Submitted papers are expected to contain original work executed by the authors with adequate, proper and scholarly citations to the work of others. It is the job of the authors to clearly identify both their own contribution(s) and also published results / techniques on which they depend or build. Reviewers are charged to ensure these standards are met.
If the author is found to commit an act of plagiarism, the following acts of sanction will be taken:
1. Reject the article submitted or delete the article from the final publications.
2. Report the authors violation to his/her supervisor(s) and affiliated institution(s)
3. Report the authors violation to the appropriate overseeing office of academic ethics and research funding agency.
4. Reserve the right to publish the authors name(s), the title of the article, the name(s) of the affiliated institution and the details of misconduct, etc. of the plagiarist”.
By submitting a manuscript to ICCNS, authors acknowledge that it has not been previously published or accepted for publication in substantially similar form in any peer-reviewed venue with publicly accessible papers, including journals, conferences, workshops, or other peer-reviewed, archival forums. Furthermore, no paper substantially similar in content has been or will be submitted to another peer-reviewed conference or workshop with publicly accessible papers during the review period.
The authors also attest that they did not submit a substantially similar Submission Instruction 2019. As a rule of thumb, the ICCNS submission should contain no more than 20 percent of material from previous publications. Violation of any of these conditions will lead to rejection.