About the Conference

Following the successful 12th ICGS3, we have much pleasure in announcing the 13th International conference on Global Security, Safety & Sustainability.

In an era of unprecedented volatile, political and economic environments across the world, computer based systems face ever-increasing challenges, disputes and responsibilities. Whilst the Internet has created a global platform for the exchange of ideas, goods and services – it has also, however, created boundless opportunities for cyber-crime.

Therefore, the role of information systems in facilitating secure economic transactions and maintaining steady and reliable sources of information that support politically stable and sustainable socio-economic systems is becoming increasingly critical.

As the number of large organisations and individuals using the Internet and its satellite mobile technologies increases, they are increasingly vulnerable to cyber-crime. It is therefore paramount that the security industry raises its game to combat these threats. This is an issue of global importance as law enforcement agencies the world over are struggling to cope.

This Annual International Conference is an established platform in which security, safety and sustainability issues can be examined from several global perspectives through dialogue between academics, students, government representatives, chief executives, security professionals, and research scientists from the United Kingdom and from around the globe.

The three-day conference will focus on the challenges of complexity, the rapid pace of change and risk/opportunity issues associated with the 21st century lifestyle, systems and infrastructures.

Important Dates
Submission deadline 7 April 2020
Peer review to be completed 27 April 2020
Camera ready/Authors Notification 21 May 2020
Author registration 5 June 2020
The ICGS3 Conference takes place 8 – 10 September 2020

 

Topics Covered

Cyber Defence

  • Systems Security, Safety and Sustainability
  • Cyber Infrastructure Protection
  • The advancement of Artificial Intelligence in cyber defence
  • Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) Support Systems
  • Augmented Humanity and cyborgs
  • Internet of everything things
  • Security of Medical Data for Smart Healthcare
  • SCADA and Ransomware
  • Cyber Warfare
  • Larger Scale Systems Protection and Resilience
  • Biohacking and bio-computing Threat/ Attack Vectors
  • Tactics, Techniques and Procedures
  • Predictive Control and Analysis of Cyber Attacks
  • Attack Vectors & APTS (Advanced Persistent Threats)
  • Red-teaming, Blue-teaming and Purple-teaming Strategies
  • Digital Twins
  • Intelligence Led penetration testing
  • Blockchain and smart contracts
  • Biometric Recognition Systems and Biometry Information Exchange Security
  • Big data – from criminals angle and law enforcers angle
  • 5G and Smart cities
  • Black, White and Grey Hat Hacking
  • Vulnerability Assessments – Lessons Learned on Current Operating system Vulnerabilities and Loopholes
  • War Driving
  • The Past, Present and Future of Computer Hacking

Cyber Intelligence and Operation

  • Digital leadership and Governance
  • Cyber-Crime Detection and Prevention
  • Crime Information Intelligence Network
  • Cyber Threat Intelligence
  • Cyber War
  • Open Source Intelligence
  • Law Enforcement Agencies
  • Social Media
  • Attack Pattern Recognition
  • Enterprise Architecture Security
  • Counterintelligence Management
  • Digital footprint
  • Deepfake
  • Impact of technology on crime investigation (policing)

Cyber Criminology

  • Domestic Abuse in smart societies
  • Cyber Criminology, Theories and Models
  • Psychology of the Cyber Criminals
  • Criminal Data Mining, Threat Analysis and Prediction
  • Crime and Social Media
  • Victimisation
  • Radicalisation, social media, Terrorist Threats
  • Cybercrime Justice Models
  • The role of Big data
  • Dark Web/ Darknet
  • Cyber Bullying, Stoking
  • Cybercrime Punishment
  • Virtual courtrooms and judges
  • The rule of law in digital era
  • Identity forgery, digital twins and digital data leakage

Ethics in Smart and AI driven societies

  • Smart Societies and Data Exploitation
  • Human-Centric Society
  • Age of Artificial Intelligence (AI)
  • Moral and Ethical implications of Digital Societies
  • Privacy of Medical Data for Smart Healthcare
  • Data Ownership, GDPR, Digital foot print, privacy and transparency
  • Internet of Things (IOT) Interactions
  • Growth of Smart Wearables & Wearable Body Area Networks (WBAN)
  • Situational Awareness
  • Insider Threat – The Human Element

Information Systems Security Management

  • Risk Management
  • Cyber Risk Management
  • Modelling Approaches, Security and Systems Assurance Frameworks
  • Cyber Resilience
  • Safety, Reliability and Risk Analysis
  • Safety and Security Evaluation, Assessment and Certification
  • Strategic Approaches to Security
  • Fraud Management
  • IT Audit, Governance and Security
  • Compliance and Certification
  • Risk Assessment, Methodologies and Tools
  • Social Media Control, Risk and Governance
  • Security and Privacy Architecture and Design For Software and Systems
  • Methods and Models for Security and Privacy
  • Support Tools For Modelling Security and Privacy
  • Methods and Tools For Modelling Trust
  • Human Aspects in Security and Privacy
  • Security in Connected world

The Future of Digital Forensics

  • Biohacking and bio-computing attacks
  • Deepfake investigations
  • Online open source investigations (OSINT)
  • Device Forensics investigation including, mobile, IoT, IoMT, etc
  • Cyber Threat Intelligence
  • Cybersecurity Kill Chain
  • Data Encryption Algorithms
  • Biometrics and Cybersecurity
  • Wearables and Implantable
  • Socio-Technical Security: User Behaviour, Profiling and Modelling and Privacy by Design
  • Decoding Encrypted Data Using Cryptography
  • Hiding and Storing IoT Data in the Cloud
  • IoT Forensics Toolbox
  • Securing and Collecting IoT Devices at the Crime Scene
  • Forensic Acquisition and Analysis of Drone Data
  • Forensic Acquisition and Analysis of Wearables Data
  • Forensic Acquisition and Analysis of Home Assistant Data
  • Presenting Digital Evidence as an IoT Forensic Expert
  • Case Studies and Best Practices
  • Legal and Ethical aspects of Digital Forensics

Submissions

Full research papers limited to 10-12 pages (about 6000 words) should report on novel and completed work of important value to the community. The work should not be published or in submission anywhere else.

13th International Conference on Global Security, Safety and Sustainability (ICGS3), 2020

All accepted papers would be included in the proceedings to be published by Springer ‘Advanced Sciences and Technologies for Security Applications’ series.

There is an expectation and trust that all submissions are of high quality with substantial novel research achievements. All papers have to be written in English language. All submissions will be peer reviewed for publication.

All articles for 13th ICGS3-20 must be submitted using the online submissions system here.

You need to register to use the online submission system.

On submission, please remove all identifying information from your submission, including author names, affiliations, and any acknowledgments.

Very important note:

As you begin your work on the creation of your conference paper we would like to highlight two important aspects of this process.

  1. As a reminder, all authors of accepted papers must transfer copyright, which would be provided after the papers are peer reviewed.
  2. In addition, all accepted papers must be checked for plagiarism. This can be accomplished by providing the Similarity Index result through Turn-It-In or any other tools as part of your paper submission.

Authors should follow instructions to provide at https://www.springer.com/gp/authors-editors/conference-proceedings/conference-proceedings-guidelines

General Chair:

Professor Hamid Jahankhani, UK
hamid.jahankhani@northumbria.ac.uk

Programme Information

Keynote Speakers

  • TBC

Registration

Category Fee
Author Registration (one paper only) and general participation £300
PhD Student Registration (all PhD student registrations must be accompanied by a letter from their University confirming current PhD student status) £200
Student & Supervisor Joint Registration (one paper only) £380
Each additional paper per registered author £20
Late Registration (non-authors), Full Registration (after 15 November 2018) £420
Student Participation with no submissions (attendance of the conference sessions and access to refreshments during the breaks and lunch) £90

Authors and General Participation rates include: attendance to all sessions, proceedings, coffee breaks, 2 luncheons.

PhD Student rates apply to full time students who provide a declaration from the University, stating full time status. This information should be emailed to the organisers with the registration form, otherwise it will not be considered.

Committee

General Chair:

Professor Hamid Jahankhani, UK
hamid.jahankhani@northumbria.ac.uk

Steering Committee:

  • Professor Babak Akhgar, Director of CENTRIC, Sheffield Hallam University, UK
  • Professor Giovanni Bottazzi, Luiss University, Italy
  • Dr Brij Bhooshan Gupta, National Institute of Technology Kurukshetra, India
  • Mrs Sukhvinder Hara, Middlesex University, UK
  • Professor Ali Hessami, Director Vega Systems, UK
  • Dr Amin Hosseinian-Far, University of Northampton, UK
  • Dr Nilakshi Jain, Shah and Anchor Kutchhi Engineering College, Mumbai, India
  • Dr Arshad Jamal, QAHE and Northumbria University London, UK
  • Professor Gianluigi Me, Luiss University, Italy
  • Dr John McCarthy, Director, Oxford Systems, UK
  • Dr Ian Mitchell, Middlesex University, UK
  • Dr Reza Montasari, University of Huddersfield, UK
  • Dr Sina Pournouri, Sheffield Hallam University, UK
  • Professor Bobby Tait, University of South Africa, South Africa
  • Professor Willy Susilo, Director – Institute of Cybersecurity and Cryptology, University of Wollongong, Australia
  • Dr Guomin Yang, University of Wollongong, Australia
  • Professor Shaun Lawson, Northumbria university, UK
  • Dr Neil Eliot, Northumbria university, UK
  • Dr. Kudrat-E-Khuda Babu, Department of Law, Daffodil International University, Bangladesh
  • Professor Sergio Tenreiro de Magalhaes, Chair of Cyber Security, Champlain College Online, USA

Programme Committee

  • Dr Christos Douligeris, University of Piraeus, Greece
  • Dr Omar S. Arabiat, Balqa Applied University, Jordan
  • Mr Konstantinos Kardaras, Technical Consultant, Greece
  • Dr Chafika Benzaid, Computer Security Division, CERIST, University of Sciences and Technology Houari Boumediene, Algeria
  • Professor Bobby Tait, University of South Africa, South Africa
  • Dr Fouad Khelifi, Northumbria University, UK
  • Dr Kenneth Revett, University of Maryland College Park, Massachusetts, USA
  • Dr Ken Dick, Nebraska University Centre for Information Assurance, USA
  • Dr Elias Pimenidis, University of West of England, UK
  • Professor Henrique M.D. Santos, University of Minho, Portugal
  • Professor Alexander Sideridis, Agricultural University of Athens, Greece
  • Mr Ray Brown, QAHE and Northumbria University, UK
  • Professor Murdoch Watney, University of Johannesburg, South Africa
  • Dr Mamoun Alazab, Macquarie University, Australia
  • Dr Gregory Epiphaniou, Commercial Director, Wolverhampton Cyber Research Institute (WCRI), University of Wolverhampton, UK
  • Dr Haider Alkhateeb, Wolverhampton Cyber Research Institute (WCRI), University of Wolverhampton, UK
  • Dr Carlisle George, Middlesex University, UK
  • Professor Gianluigi Me, University of Rome LUISS “Guido Carli”, Italy
  • Professor Antonio Mauro, Head of Security and Compliance Assurance, Octo Telematics S.p.A., Italy
  • Dr John McCarthy, Director, Oxford Systems, UK
  • Dr Ameer Al -Nemrat, University of East London, UK
  • Mrs Sukhvinder Hara, Middlesex University, UK
  • Dr Ian Mitchell, Middlesex University, UK
  • Professor Ahmed Bouridane, Northumbria University, UK
  • Dr Amin Hosseinian-Far, University of Northampton, UK
  • Dr Reza Montasari, Birmingham City University, UK
  • Mr Ayman El Hajjar, QAHE and Northumbria University, UK
  • Dr George Weir, University of Strathclyde, UK
  • Dr Sufian Yousef, Anglia Ruskin University, UK
  • Dr Alireza Daneshkhah, Coventry University, UK
  • Dr Maryam Farsi, Cranfield University, UK
  • Mr Usman Butt, QAHE and Northumbria University, UK
  • Asim Majeed, QAHE and University of Roehampton, UK
  • Dr Rose Fong, QAHE an Northumbria University London, UK
  • Dr Athar Nouman, QAHE an Northumbria University London, UK
  • Mr Umair B. Chaudhry, Queen Mary College, University of London, UK
  • Mr Nishan Chelvachandran, Cyberreu, Finland
  • Mr Stefan Kendzierskyj, Cyfortis, UK
  • Professor Sergio Tenreiro de Magalhaes, Chair of Cyber Security, Champlain College Online, USA

Quick contact

Please enter a valid telephone number
This field is required
This field is required
This field is required
This field is required
By providing your email address and/or phone number, you are confirming that you give us permission to respond to your enquiry via these means. We will process your information in accordance with our data policy, more details of which can be found on our privacy statement. In future we would like to contact you with relevant information on our courses, facilities and events. Please confirm you are happy to receive this information and indicate below how you would like us to communicate with you. Please note, this will overwrite any previous communication preferences you may have already specified to us.
This field is required