To download the PDF version of the CFP, click here
The aim of ACOSIS 2019 is to provide a forum, for academic and industrial researchers over the world, on advanced communication systems and information security. Authors are invited to submit papers that contain original material which is not currently under review in any other conference or journal and has not been previously published.
Accepted and presented papers will be published in the ACOSIS 2019 Conference Proceedings and included in ACM. Distinguished papers, after further revision, might be published in special issues in international journals.
The conference will be held in Marrakesh, which is more than just a city; it is a pearl polished by its history and its tradition of hospitality.
Potential research topics in ACOSIS'19 includes, but are not limited to:
- Channel characterization, Synchronization, Estimation and Modeling
- Source and Channel Coding
- Cognitive Radio System Architectures
- Cross-layer Design and Optimization
- Distributed Coding, Network Coding
- Diversity, Equalization, Beamforming and MIMO
- Energy efficient PHY layer design, Energy Harvesting
- Modulation and Multi-Carrier Modulation
- Multiple Access Techniques
- Resource Allocation and Interference Management
- Spread Spectrum Communications
- Advanced Communications and Connectivity
- Free Space Optics and Visible Light Communications
- RFID Networks and Protocols
- Signal and Image Processing
Cooperative and Multihop Relay Communications
Ad Hoc, Mesh and Wireless Sensor Networks
Internet of Things
IP Multimedia Subsystems (IMS)
Embedded System Design
Embedded Machine Learning, Deep Learning and Artificial Intelligence
Networked Embedded Systems
Real-Time Embedded Systems
Authentication, Authorization and Access Control
Information Hiding and Watermarking
Key Exchange, Storage and Protection
Malware, Attack Detection and Prevention Techniques
Models, Methods, and Tools for Testing the Security of Mobile Networks
PHY Layer Security
Risk Analysis, Modeling and Management
Secure Cryptographic Protocols for Advanced Communication Systems
Security and Privacy in the IoT
Security in the Grid, Pervasive Computing
Cloud Security and Privacy
Security, Privacy, and Trust in Social Networks
Security, Privacy, and Trust in Wireless Communications
Embedded Cybersecurity and Cryptography
Mobile and Embedded Security
Wireless Body Area Networks for e-Services Applications
Peer-to-Peer Service in Mobile Networks
Green Wireless Communications and Networks
Smart Grid Networks
Mobile/Wireless Systems for Transportation Logistics
Smart City Network Management and Services
Mobile/Wireless Data Analytics and Modeling
Support for Social Networks and Mobile Web
Sensor Networks for Rural and Agricultural Environments
Monitoring and Network Management Architectures
Submission should be written in English with a maximum paper length of 10 printed pages, standard IEEE 2-columns format.
Standard IEEE Transactions templates for Microsoft Word or LaTeX formats can be found by clicking here.
The authors whose papers are accepted for a Poster session are invited to download the Poster Layout here.
Paper submission should be processed via EDAS platform, via the link: .
All submitted papers will be reviewed by experts in the fields based on the criteria of originality, significance, quality and clarity.
Accepted and presented papers will be submitted for inclusion in ACM. They will also be submitted to SCOPUS, ISI, DBLP and other leading indexing services.
Papers of particular merit may be recommended for a special issue in an international journal. Best Papers awards and prizes will be given too.