ICCS 2024 Programme FINAL

/br

All Accepted & Presented papers will be published in SCOPUS indexed Springer LNNS.

Cardiff Metropolitan University-United Kingdom (UK)

University of South Wales, United Kingdom (UK)

University of the west of England, United Kingdom (UK)

Swansea University, United Kingdom (UK)

Cardiff University, United Kingdom (UK)

University of Wales Trinity Saint David, United Kingdom

Sinhgad Technical Education Society, India

About Conference

The ICCS 2024 is an unparalleled opportunity to discuss cyberthreat analysis, operations, research, and law enforcement to coordinate various efforts to create a more secure world. The ICCS 2024 serves as a platform for researchers and practitioners from academia, industry, and government to present, discuss, and exchange ideas that address real-world problems with security and privacy in communication networks. The conference program will include special sessions, presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures and keynote speeches.

Through sharing and networking, ICCS 2024 will provide an opportunity for researchers, practitioners and educators to exchange research evidence, practical experiences and innovative ideas on issues related to the Conference theme.

Please consider submitting to this conference. We are interested in the entire range of concepts from theory to practice, including case studies, works-in-progress, and conceptual explorations.

Read More

Keynote Speakers

Dr. Muhammad Naveed Aman
Dr. Muhammad Naveed Aman
University of Nebraska-Lincoln, US

Dr. Naveed Aman is an Assistant Professor of Cybersecurity at the School of Computing, University of Nebraska-Lincoln (UNL). He earned his Ph.D. in Electrical Engineering and an M.Eng. in Industrial Engineering from Rensselaer Polytechnic Institute, Troy, NY, in 2012. He also holds a B.Sc. in Computer Systems Engineering from KPK University of Engineering and Technology, Peshawar, and an M.Sc. in Computer Engineering from the Center for Advanced Studies in Engineering, Islamabad. Previously, Dr. Aman served in the School of Computing at the National University of Singapore. His research spans several cutting-edge areas, including Internet of Things (IoT) and cyberphysical systems security, trustworthy machine learning, and quantum-era cybersecurity. Among his notable contributions are pioneering device attestation algorithms and developing physical layer security techniques that leverage transceiver and wireless channel characteristics. He has also significantly advanced the understanding of privacy attacks on machine learning models.

Title: Securing Critical Infrastructure Sectors Against Cyberthreats

Abstract: Imagine waking up one day, grabbing your coffee, and realizing the power is out, the traffic lights are flashing random colors like a Christmas tree on steroids, and your local water treatment plant is suddenly streaming cat videos. Welcome to the nightmare scenario of what could happen if critical infrastructures aren’t properly secured against cyberthreats! In this light-hearted yet eye-opening talk, we’ll dive into the high-stakes world of keeping the backbone of society—energy grids, transport systems, healthcare, and more—safe from cyberattacks. While the topic is serious, we’ll keep things entertaining as we look at how hackers might try to turn a city’s smart grid into their personal light show or why outdated software in power plants could be the ultimate villain in an action movie we never wanted to watch. We’ll explore some real-world cyber incidents that have targeted critical infrastructures, revealing how vulnerabilities can quietly creep into these systems. More importantly, we’ll discuss practical strategies and best practices for strengthening defenses and keeping these essential services secure. Whether you’re a security professional, a policymaker, or someone with a vested interest in the resilience of modern infrastructure, this session will offer valuable insights—delivered with a dash of humor—into how we can collectively guard against cyberthreats before they escalate into full-blown crises. Let's ensure our critical systems remain robust and resilient in the face of evolving challenges.

Dr. Muhammad Ikram
Dr. Robert Atkinson
Reader, Department of Electronic and Electrical Engineering, University of Strathclyde

Dr Robert Atkinson is a Reader in the Department of Electronic and Electrical Engineering, University of Strathclyde, where he leads the Industrial AI Lab. He is a Senior Member of the IEEE and a Member of the IET. His research interests include the application of machine learning to real-world industrial problems including cyber-security, machine/animal/human health and AgriTech. He has a particular interest in applying AI to situations where there is limited ground truth data (labels) available to train AI models. He is a visiting Reader at NHS Lanarkshire and is a co-founder of the cyber-security start-up, Lupovis Ltd.

Title: Intrusion Detection Systems for Cyber-Security – Challenges and Potential Solutions

Abstract: The talk will outline the state-of-the-art in the application of machine learning to detecting communications networks intrusions. Although AI shows great promise in detecting well-known attacks, it struggles when previously unseen attacks emerge, so-called zero-day attacks. The talk will explore the use of contrastive learning as a solution that does not suffer from a high false positive rate that afflict outlier detection strategies. Another problem is related to the heterogeneity of communications networks: IDS systems trained to detect malicious traffic in one network do not translate well to another (target) network. The talk will discuss the potential for domain adaptation strategies to address this issue.

Professor Ts. Dr. Madihah Mohd Saudi
Professor Ts. Dr. Madihah Mohd Saudi
Professor in the Information Security & Assurance (ISA) Programme, Faculty of Science and Technology (FST) at Universiti Sains Islam Malaysia (USIM), Malaysia

Professor Ts. Dr. Madihah Mohd Saudi is a pioneering force in cybersecurity and education. As a Professor in the Information Security & Assurance (ISA) Programme, Faculty of Science and Technology (FST) at Universiti Sains Islam Malaysia (USIM), Malaysia, she drives innovation in both realms. Her tenure as USIM's former Chief Information Officer underscores her visionary integration of technology and education. With a remarkable career spanning over 20 years, Prof. Madihah has authored numerous books, strategic plans, and impactful journal papers. She holds esteemed positions worldwide, including Honorary Visiting Research Fellow at the University of Bristol's CyberSecurity Group, Uniten Kingdom and Visiting Professor roles at prominent institutions in Indonesia and Uzbekistan. A member of influential organizations like IEEE Computer Society, she excels in cybersecurity and machine learning. Her educational journey, from a BSc (Hons) in Computer Science to a PhD in Computer Security, combined with certifications like GSEC and CEH, reflects her commitment to expertise. Prof. Madihah's influence resonates across borders, shaping a brighter future in cybersecurity and education. Her legacy of knowledge, mentorship, and global collaboration continues to guide aspiring minds and professionals alike. Her research interests are on malware detection and response, mobile security and machine learning.

Title: Ransomware Evolvement Against Internet of Medical Things (IoMT): Advances and Challenges

Abstract: TThe intelligent ransomware attacks evolvement with camouflage and anti-forensics capability to bypass detection mechanisms, have triggered cybercrime attacks such as data breaches, data privacy intrusion and data theft against different sectors across the world. Unfortunately, the existing solutions are limited to certain platforms and lack intelligent analysis capability with complex analysis. Apparently, we need more efficient and comprehensive solution to detect ransomware attacks especially against cyber physical systems such as national defense and security, telecommunication, energy systems, water distribution systems and healthcare. Hence, during this session, the speaker will present on the current ransomware evolvement and challenges, and a solution to detect ransomware against the Internet of Medical Things (IoMT) ecosystem based on the integration of phylogenetic, a bio-inspired algorithm.

Focused Networking
Provides a free and open atmosphere where attendees talk and engage in creative ways.
Expert Speakers
Our speakers represent the cream of research and development practitioners worldwide.
Brilliant Ideas
High-impact, collaborative and new approaches to some of the world’s toughest problems.
Exceptional Program
Includes demonstrations, keynote speeches, plenary panel, breakout sessions as well as the industry program.
Global Participation
Anticipating attendees from various countries all over the world.
Inspirational Learning
Bringing together a researchers from several fields to collaborate together and create lasting change.


Deadlines

Call For Papers

July 15, 2024

Submission of Full papers (Final Extension)

October 20, 2024

Acceptance

November 20, 2024

Early Bird Registration

November 25, 2024

Conference

December 09-10, 2024

Camera-Ready

December 31, 2024

Publication (Tentative)

December, 2025

Indexing

Post-conference, proceedings will be made available to the following indexing services for possible inclusion:

Scopus
dblp - computer science bibliography
Clarivate Analytics
google scholar

Countdown

Enthusiastic minds will be all together on the same floor to exchange ideas, share the trends and converge towards a usable knowledge application in the fascinating world of IoT.

Yes, with you we are also counting moments, see you during the Conference.

Conference Tracks
Cyber Security
  • Foundations
  • Big Data Techniques in Cyber Security
  • Forensic Analysis of Cyber Crimes
  • Secure Design, Tooling, and Engineering
  • Security and Trust of Citizens
  • Database security
  • Cloud security
  • Advance Persistent Threat
  • Network Monitoring and Control
  • Advance Security techniques
Privacy in Communication Networks
  • Digital Signature Techniques
  • Network Protocols
  • Next-generation Communication Networks
  • Modeling & Simulation of communication networks and Systems
  • Routing and Flow Control in LANs, WANs and PANs
  • Secure Routing, Naming/Addressing, Network Management
  • Security & Privacy in Pervasive and Ubiquitous Computing, e.g., RFIDs
  • Security & Privacy in Peer-to-Peer and Overlay Networks
  • Security & Privacy for Emerging Technologies: VoIP, Social Networks
  • Security & Isolation in Cloud, Data Center and Software-Defined Network
Conference also welcomes organizing various special sessions/workshops.