Research Track on Mobile Computing, Wireless Networks, & Security (CSCI-RTMC)

All accepted papers of all Research Tracks will be published by Conference Publishing Services, CPS as part of the proceedings of The 2023 International Conference on Computational Science and Computational Intelligence (CSCI'23).
Past conference proceedings can be accessed via IEEE Xplore Digital Library at:

Volume I (2014)
Volume II (2014)
Volume (2015)
Volume (2016)
Volume (2017)
Volume (2018)
Volume (2019)
Volume (2020)
Volume (2021)
Volume (2022)
All CSCI Proceedings

Since its inception, all CSCI proceedings have always been approved and included into IEEE Xplore indexation/digital-library citation databases. The proceedings of CSCI have also been included in other major citation index systems (including, Ei Compendex, www.engineeringvillage.com; Scopus, scopus.com, IEEE Xplore, and others). Content of CSCI 2023 will be submitted to the indexing companies for possible indexing.
Scope & Topics
Mobile Computing:
Human-Computer Interaction; Usability Studies; Mobile Communications; Mobile Computing; Mobile Hardware; Mobile Software; Hardware-Software Co-Design; Mobile Network Infrastructures; Protocols; Novel Mobile Devices; Smart Cards; Wearable Devices; Mobile Internet; Mobile e-Commerce and Multimedia; Carputers and Technologies; Application-specific Mobile Systems; Software Infrastructures for Pervasive System; Service Discovery Mechanisms and Protocols; Energy Aware Systems; Positioning and Tracking Technologies; Ubiquitous Computing; Middleware Services and Agent Technologies; Mobile Computing Applications and Emerging Technologies.

Wireless Networks:
Power Management and Control, Low-Power Protocols; Satellite-based Systems; Broadcast Networks; High Altitude Platforms; GPS, Location-based Service and Mobile Devices; Mobile Agents; Wireless and Mobile Applications; Routing, Multicasting, ...; Resource Management, Wireless QoS; Wireless Network Architectures; Wireless Security; Personal Area Networks and Body Wireless Networks; Wireless Sensor and Actuator Networks; Node Placement and Topology Control Issues; Multi-user Detection; Mobile Wireless QoS, Radio Resource Management; Heterogeneous Wireless Networks, Radio Access Networks; Software-defined Radio, Reconfigurable Radio Networks; Wireless IP Networks, Interworking; Wireless Multimedia, QoS Adaptation; Disruption Tolerant Networks and Applications; Distributed Algorithms for Wireless Networks; Autonomous Mobile Sensor Networks; Sensor Networks; Ad Hoc Networks; Vehicular Networks; Underwater Networks; and Underground Networks; and Applications in Healthcare, Medical Imaging, Environment Monitoring, Industrial and Structural Monitoring, Smart Grids and Energy Control Systems, Smart Buildings and Smart Cities, Home Monitoring and Assisted Living Applications, Wireless Surveillance, Smart Fabrics and Wearables, Defense and Security, Vehicular Networks, and novel applications.

Security:
Network Security; Security Algorithms; Mobile Network Security; Security in Contents Distribution Networks; Virtual Private Network (VPN) Security; Tracing Techniques in Internet; Active Networks; Security in Grid and Cloud; Web Monitoring and Traps; Control Systems & SCADA Security; Transport-Level Security; IP Security; Electronic Mail security; Cryptographic and Related Methods; Security Protocols; Message Authentication Methods; Anonymity Technologies; Digital Signature Methods; Security Management; Surveillance Technologies; Security Policies; Channel Management; Digital Contents Copyright Protection; System Security Management; Information Security Management; Government Security Policy; Web Penetration Testing; Vulnerabilities Management; Information Assurance; Mission Assurance; Risk Assessment and Risk Management; Cyber Security Compliance; Security Auditing; Disaster Recovery; Access Control; Secure Use of Software; Biometrics and Forensics; Face Recognition Systems; Cyber Forensics; Forensic Analysis; Feature Extraction and Matching Algorithms; Embedded Systems Security; Security Architectures; Fault Attacks; Hardware Tamper Resistance; Smart Card Processors; Secure Storage Devices; Security in E-Commerce and M-Commerce; Watermarking; Cloud Computing Security; Database Security; Data Mining Security; Cyber Security Automation; Firewall Systems; Hacking Techniques and Related Issues; Intrusion Detection System (IDS); Honeypot; Virus Issues (Detection, Prevention ...); Attack Graphs; Malware Analysis; and Emerging Security Technologies.
©2024 American Council on Science and Education
ALL RIGHTS RESERVED
8931629