Sign for Notice Everyday    Sign Up| Sign In| Link| English|

Our Sponsors


    ICCNS 2026 - 16th International Conference on Communication and Network Security (ICCNS 2026)

    View: 68

    Website https://www.iccns.org | Want to Edit it Edit Freely

    Category Communication and Network Security

    Deadline: November 10, 2026 | Date: December 19, 2026-December 21, 2026

    Venue/Country: Harbin, China

    Updated: 2026-03-13 17:29:47 (GMT+9)

    Call For Papers - CFP

    Full Name: 2026 The 16th International Conference on Communication and Network Security (ICCNS 2026)

    Abbreviation:ICCNS 2026

    Website:www.iccns.org

    Conference dates:December 19-21, 2026

    Venue:Harbin, China

    The 16th International Conference on Communication and Network Security (ICCNS 2026) will be held in Harbin, China, during December 19–21, 2026. It is sponsored by Heilongjiang University, China, and hosted by the School of Electronic Engineering, Heilongjiang University, China. As ICCNS celebrates its 16th year, the conference will continue to witness and promote advances in communication and network security.

    With the growing reliance on digital communications and the rising frequency of cyber attacks, network security has become a critical concern for organizations and individuals alike. ICCNS aims to provide a high-quality platform for researchers from academia, industry, and government institutions to exchange ideas and present innovative research in communication and network security. It is an important event for researchers, practitioners, and professionals in the field.

    Publication

    The accepted paper will be included into ICCNS 2026 Conference Proceedings.

    The previous publication and indexing record: https://www.iccns.org/pub.html

    Call for paper

    Track 1: Communication and Information Engineering

    Ad hoc & sensor networks

    Embedded networks

    High-speed access networks

    Home and SOHO networks

    IPv6 deployment & migration

    Local area networks

    Optical networks

    Peer-to-peer networks

    Personal and wearable networks

    Routing and Scheduling

    Ubiquitous networking

    Wireless networks

    Track 2: Information and network security

    Network Intrusion Detection and Prevention

    Malware and botnets

    Communication Privacy and Anonymity

    Distributed denial of service

    Public Key Infrastructures and key management

    Web security

    Secure Routing and Network Management

    Security & Privacy in Pervasive Computing

    Security for emerging technologies (VoIP, P2P)

    Information leakage and theft

    Data tampering and deletion

    Computer virus and security breach

    Track 3: Data security

    Cryptography and Encryption Techniques

    Data Integrity and Authenticity

    Network Security Protocols

    Machine Learning for Threat Detection

    Application Security

    Incident Response and Management

    Security in IoT Devices

    Data Backup and Recovery Solutions

    Regulatory Compliance

    Homomorphic Encryption for Data Processing

    Zero-Knowledge Proofs and Applications

    Post-Quantum Cryptography and Migration

    Track 4: Privacy Protection

    Data Anonymization Techniques

    User Consent and Data Collection

    Privacy by Design

    Surveillance and Data Privacy

    Privacy Enhancing Technologies (PETs)

    Blockchain for Privacy Protection

    Ethical Considerations in Data Handling

    Cross-Border Data Transfers

    Consumer Privacy Rights

    Impact of AI on Privacy

    Differential Privacy and its Applications

    Federated Learning for Privacy Preservation

    Track 5: AI, Future Networks and Trusted Systems

    AI/ML for Network Security

    AI-Powered Security Analytics

    Security of AI Systems

    Explainable and Trustworthy AI for Security

    6G and Next-Generation Network Security

    Quantum-Safe Networks

    Security in SDN and NFV

    Zero Trust Architecture (ZTA)

    Secure Access Service Edge (SASE)

    Trusted Execution Environments (TEEs)

    Blockchain for Secure Systems

    CPS and ICS Security

    For more topics, please visit https://iccns.org/cfp.html

    Submission

    1. Papers submitted to the conference should be in English.

    - You will publish the manuscript and deliver paper presentation on ICCNS 2026, orally or poster presentation. You must submit Full-length Manuscript for review before the submission deadline.

    - You can deliver a presentation on ICCNS 2026, but the presented manuscript WILL NOT be published. Abstract is necessary to submit.

    2. For submissions intended for publication (full paper):

    Format your manuscript in accordance with the provided templates.

    Word template (single-column): minimum 8 pages

    LaTeX template (double-column): minimum 4 pages

    3. For presentation-only submissions (abstract):

    Full paper is not required; only the abstract formatted according to the template should be submitted.

    →Submission System: https://www.zmeeting.org/submission/iccns2026

    →Email Submission Address: iccns_secretaryatyoung.ac.cn

    Full Paper Template: https://iccns.org/acm_template.docx;

    https://iccns.org/LaTeX-Templates.zip

    Abstract Template: https://iccns.org/abstract_template.docx

    For more details about submission, please visit https://iccns.org/sub.html

    Contact

    Ms. Lesley Lei (Conference Secretary)

    E-mail: iccns_secretaryatyoung.ac.cn

    Tel: +86-18010667294 | +86-28-86527868


    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.