Authors are invited to submit their full papers by December 10, 2022, Manuscripts submitted for the conference must be original, and must not be previously published or currently under review anywhere. Submitted manuscripts should respect the standard guidelines of the Springer proceeding chapter format. Manuscripts must be prepared using Latex, or Word. The submitted paper must be formatted according to Springer Format: MS Word TemplateLatex Template

The paper should contain between 8-12 pages. Contributions MUST be in English. All submitted manuscripts will be peer-reviewed by at least 3 program committee members. Prospective authors should send their manuscripts electronically through the easychair submission system as mentioned below:

Online Presentations:

The official conference language is English. All submissions and presentations will be in English. Authors who are interested to present their papers in CCSET2022 but could not attend the conference can present their works via a Virtual Presentation.

Best Paper awards:

The overall Best Paper and Best Student Paper Awards will be given and recognized during the conference.

Similarity, plagiarism, and self-plagiarism:

Since CCSET2022 will be submitted to Springer which policy requires all Springer content to be screened for possible plagiarism. All submitted papers to CCSET2022 will be checked and scanned using Turnitin, before being sent to reviewers. Note that to be submitted to Springer, the overall similarity rate of a paper should not exceed 25 percent, and the similarity rate to a single source should not exceed 10 percent. The score and report are provided to assist you in revising your manuscript, if necessary. The conference will not be able to provide you a score or a report for the revised manuscript.

Topics:

Track 1: Cybersecurity and Cybercrime

  • Cryptographic mechanisms for secure critical infrastructures
  • Attacks and defenses
  • Digital Forensics
  • Blockchain for cybersecurity
  • Cloud Security
  • Cyber-physical systems security
  • Hardware security
  • Risks, security, and reliability of critical infrastructure systems
  • Critical Infrastructures Cybersecurity and Resilience
  • Web application security
  • Social cybersecurity
  • Cybersecurity operations

Track 2: Smart Emerging Technologies

  • 5G/6G Edge/fog computing enabled Internet of Things
  • Digital twin technology
  • Next generation Internet
  • Cloud Computing and applications
  • Data science for UAV-assisted IoT systems
  • Innovation in Machine Intelligence for Critical Infrastructures
  • Smart Cities
  • Artificial Intelligence for smart emerging technologies
  • Signal and Information Processing for Critical Infrastructures