Event details

Event date 14 and 15 January 2021
Event time TBC
Event location Virtual Conference

The proceedings of the 13th ICGS3 will be published as published by Springer ‘Advanced Sciences and Technologies for Security Applications’ series.

13th ICGS3-21 will take place virtually and all the hardcopies of the proceedings will be sent to delegates after the event.

 

About the Conference

13th International Conference on Security, Safety and Sustainability, ICGS3-21 is dedicated to the cyber security challenges to control pandemic

Following the successful 12th ICGS3, we have much pleasure in announcing the 13th International conference on Global Security, Safety & Sustainability.

2020 will be remembered as a year of COVID-19 pandemic year with profound impact on our lives and challenging times for governments around the world with technology as a backbone of tools to assist us to work remotely while in self isolations and in total lockdown. Every individual and organisation are faced with the challenges of the adoption of technological change and understand that nothing will be the same for some time after and even when normality resumes. AI, blockchain, machine learning, IoT, IoMT, IIoT all are tested and applied at a very rapid turnaround as we go through the pandemic day after day. However, all this transformation can bring many associated risks regarding data, such as privacy, transparency, exploitation and ownership.

Since the COVID-19 pandemic in January 2020, governments, and organisations; small or large have seen an increase in cyber-attacks. Hackers, through reconnaissance and some network intrusions, targeting nation states medical research facilities, healthcare organizations conducting research into the virus, financial sectors and so on. Early in April 2020, UK, and US security agencies sound COVID-19 threat alert “…Cybersecurity Infrastructure and Security Agency issued a joint warning that hacking groups associated with nation-state governments are exploiting the COVID-19 pandemic as part of their cyber operations…”.

The advancement of Artificial Intelligence (AI), coupled with the prolificacy of the Internet of Things (IoT) devices are creating smart societies that are interconnected. The expansion of Big Data and volumetric meta data generated and collated by these mechanisms not only give greater depth of understanding but as change is coming at an unprecedented pace covid19 is drives the cultural changes and the public sector innovations to a new height of responsibilities.

Further development and analysis of defence tactics and countermeasures are needed fast to understand security vulnerabilities which will be exploited by the cybercriminals by identifying newer technologies that can aid in protecting and securing data with a range of supporting processes to provide a higher level of cyber resilience.

The ethical implications of connecting the physical and digital worlds, and presenting the reality of a truly interconnected society, presents the realisation of the concept of smart societies in reality.

This Annual International Conference is an established platform in which security, safety and sustainability issues can be examined from several global perspectives through dialogue between academics, students, government representatives, chief executives, security professionals, and research scientists from the United Kingdom and from around the globe.

The TWO-day Virtual conference will focus on the challenges of complexity, the rapid pace of change and risk/opportunity issues associated with the 21st century lifestyle, systems and infrastructures.

Important dates
Important dates
Submission deadline 03 September 2020
Peer review to be completed 17 September 2020
Camera ready/Authors Notification 30 September 2020
Author registration 10 October 2020
The Virtual ICGS3 Conference takes place 14 – 15 January 2021

The list of topics includes (but are not limited to):

Cyber Defence 

  • Systems Security, Safety and Sustainability
  • Cyber Infrastructure Protection
  • The advancement of Artificial Intelligence in cyber defence
  • Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) Support Systems
  • Augmented Humanity and cyborgs
  • Internet of everything things
  • Security of Medical Data for Smart Healthcare
  • SCADA and Ransomware
  • Cyber Warfare
  • Larger Scale Systems Protection and Resilience
  • Biohacking and bio-computing Threat/ Attack Vectors
  • Tactics, Techniques and Procedures
  • Predictive Control and Analysis of Cyber Attacks
  • Attack Vectors & APTS (Advanced Persistent Threats)
  • Red-teaming, Blue-teaming and Purple-teaming Strategies
  • Digital Twins
  • Intelligence Led penetration testing
  • Blockchain and smart contracts
  • Biometric Recognition Systems and Biometry Information Exchange Security
  • Big data – from criminals angle and law enforcers angle
  • 5G and Smart cities
  • Black, White and Grey Hat Hacking
  • Vulnerability Assessments – Lessons Learned on Current Operating system Vulnerabilities and Loopholes
  • War Driving
  • The Past, Present and Future of Computer Hacking

Cyber Intelligence and Operation

  • Digital leadership and Governance
  • Cyber-Crime Detection and Prevention
  • Crime Information Intelligence Network
  • Cyber Threat Intelligence
  • Cyber War
  • Open Source Intelligence
  • Law Enforcement Agencies
  • Social Media
  • Attack Pattern Recognition
  • Enterprise Architecture Security
  • Counterintelligence Management
  • Digital footprint
  • Deepfake
  • Impact of technology on crime investigation (policing)

Cyber Criminology

  • Domestic Abuse in smart societies
  • Cyber Criminology, Theories and Models
  • Psychology of the Cyber Criminals
  • Criminal Data Mining, Threat Analysis and Prediction
  • Crime and Social Media
  • Victimisation
  • Radicalisation, social media, Terrorist Threats
  • Cybercrime Justice Models
  • The role of Big data
  • Dark Web/ Darknet
  • Cyber Bullying, Stoking
  • Cybercrime Punishment
  • Virtual courtrooms and judges
  • The rule of law in digital era
  • Identity forgery, digital twins and digital data leakage

Ethics in Smart and AI driven societies

  • Smart Societies and Data Exploitation
  • Human-Centric Society
  • Age of Artificial Intelligence (AI)
  • Moral and Ethical implications of Digital Societies
  • Privacy of Medical Data for Smart Healthcare
  • Data Ownership, GDPR, Digital foot print, privacy and transparency
  • Internet of Things (IOT) Interactions
  • Growth of Smart Wearables & Wearable Body Area Networks (WBAN)
  • Situational Awareness
  • Insider Threat – The Human Element

Information Systems Security Management

  • Risk Management
  • Cyber Risk Management
  • Modelling Approaches, Security and Systems Assurance Frameworks
  • Cyber Resilience
  • Safety, Reliability and Risk Analysis
  • Safety and Security Evaluation, Assessment and Certification
  • Strategic Approaches to Security
  • Fraud Management
  • IT Audit, Governance and Security
  • Compliance and Certification
  • Risk Assessment, Methodologies and Tools
  • Social Media Control, Risk and Governance
  • Security and Privacy Architecture and Design For Software and Systems
  • Methods and Models for Security and Privacy
  • Support Tools for Modelling Security and Privacy
  • Methods and Tools for Modelling Trust
  • Human Aspects in Security and Privacy
  • Security in Connected world

The Future of Digital Forensics

  • Biohacking and bio-computing attacks
  • Deepfake investigations
  • Online open source investigations (OSINT)
  • Device Forensics investigation including, mobile, IoT, IoMT, etc
  • Cyber Threat Intelligence
  • Cybersecurity Kill Chain
  • Data Encryption Algorithms
  • Biometrics and Cybersecurity
  • Wearables and Implantable
  • Socio-Technical Security: User Behaviour, Profiling and Modelling and Privacy by Design
  • Decoding Encrypted Data Using Cryptography
  • Hiding and Storing IoT Data in the Cloud
  • IoT Forensics Toolbox
  • Securing and Collecting IoT Devices at the Crime Scene
  • Forensic Acquisition and Analysis of Drone Data
  • Forensic Acquisition and Analysis of Wearables Data
  • Forensic Acquisition and Analysis of Home Assistant Data
  • Presenting Digital Evidence as an IoT Forensic Expert
  • Case Studies and Best Practices
  • Legal and Ethical aspects of Digital Forensics

Full research papers limited to 10-12 pages (about 6000 words) should report on novel and completed work of important value to the community. The work should not be published or in submission anywhere else.

13th International Conference on Global Security, Safety and Sustainability (ICGS3), 2020

All accepted papers would be included in the proceedings to be published by Springer ‘Advanced Sciences and Technologies for Security Applications’ series.

There is an expectation and trust that all submissions are of high quality with substantial novel research achievements. All papers have to be written in English language. All submissions will be peer reviewed for publication.

All articles for 13th ICGS3-20 must be submitted using the online submissions system here.

You need to register to use the online submission system.

On submission, please remove all identifying information from your submission, including author names, affiliations, and any acknowledgments.

Very important note:

As you begin your work on the creation of your conference paper we would like to highlight two important aspects of this process.

  1. As a reminder, all authors of accepted papers must transfer copyright, which would be provided after the papers are peer reviewed.
  2. In addition, all accepted papers must be checked for plagiarism. This can be accomplished by providing the Similarity Index result through Turn-It-In or any other tools as part of your paper submission.

Authors should follow instructions provided here

General Chair:

Professor Hamid Jahankhani, UK
hamid.jahankhani@northumbria.ac.uk

Programme Information

Keynote Speakers

  • TBC

Registration

Fees considers the VIRTUAL nature of the event

Category Fee
Author Registration (one paper only) and general participation £135
PhD Student Registration (all PhD student registrations must be accompanied by a letter from their University confirming current PhD student status) £85
Student & Supervisor Joint Registration (one paper only) £210
Each additional paper per registered author £15
Late Registration (non-authors), Full Registration (after 15 November 2020) £180
Student Participation with no submissions (attendance of the conference sessions and hard copy of the proceedings ) £55

Authors and General Participation rates include: a hardcopy of the Proceedings published by Springer

PhD Student rates apply to full time students who provide a declaration from the University, stating full time status. This information should be emailed to the organisers with the registration form, otherwise it will not be considered.

Committee

General Chair:

Professor Hamid Jahankhani, UK

hamid.jahankhani@northumbria.ac.uk

  • Professor Babak Akhgar, Director of CENTRIC, Sheffield Hallam University, UK
  • Professor Giovanni Bottazzi, Luiss University, Italy
  • Dr Brij Bhooshan Gupta, National Institute of Technology Kurukshetra, India
  • Mrs Sukhvinder Hara, Middlesex University, UK
  • Professor Ali Hessami, Director Vega Systems, UK
  • Dr Amin Hosseinian-Far, University of Northampton, UK
  • Dr Nilakshi Jain, Shah and Anchor Kutchhi Engineering College, Mumbai, India
  • Dr Arshad Jamal, QAHE and Northumbria University London, UK
  • Professor Gianluigi Me, Luiss University, Italy
  • Dr John McCarthy, Director, Oxford Systems, UK
  • Dr Ian Mitchell, Middlesex University, UK
  • Dr Reza Montasari, University of Huddersfield, UK
  • Dr Sina Pournouri, Sheffield Hallam University, UK
  • Professor Bobby Tait, University of South Africa, South Africa
  • Professor Willy Susilo, Director – Institute of Cybersecurity and Cryptology, University of Wollongong, Australia
  • Dr Guomin Yang, University of Wollongong, Australia
  • Professor Shaun Lawson, Northumbria university, UK
  • Dr Neil Eliot, Northumbria university, UK
  • Kudrat-E-Khuda Babu, Department of Law, Daffodil International University, Bangladesh
  • Professor Sergio Tenreiro de Magalhaes, Chair of Cyber Security, Champlain College Online, USA
  • Dr Fiona Carroll,  Cardiff Metropolitan University, UK
  • Dr Christos Douligeris, University of Piraeus, Greece
  • Dr Omar S. Arabiat, Balqa Applied University, Jordan
  • Mr Konstantinos Kardaras, Technical Consultant, Greece
  • Dr Chafika Benzaid, Computer Security Division, CERIST, University of Sciences and Technology Houari Boumediene, Algeria
  • Professor Bobby Tait, University of South Africa, South Africa
  • Dr Fouad Khelifi, Northumbria University, UK
  • Dr Kenneth Revett, University of Maryland College Park, Massachusetts, USA
  • Dr Ken Dick, Nebraska University Centre for Information Assurance, USA
  • Dr Elias Pimenidis, University of West of England, UK
  • Professor Henrique M.D. Santos, University of Minho, Portugal
  • Professor Alexander Sideridis, Agricultural University of Athens, Greece
  • Mr Ray Brown, QAHE and Northumbria University, UK
  • Professor Murdoch Watney, University of Johannesburg, South Africa
  • Dr Mamoun Alazab, Macquarie University, Australia
  • Dr Gregory Epiphaniou, Commercial Director, Wolverhampton Cyber Research Institute (WCRI), University of Wolverhampton, UK
  • Dr Haider Alkhateeb, Wolverhampton Cyber Research Institute (WCRI), University of Wolverhampton, UK
  • Dr Carlisle George, Middlesex University, UK
  • Professor Gianluigi Me, University of Rome LUISS “Guido Carli”, Italy
  • Professor Antonio Mauro, Head of Security and Compliance Assurance, Octo Telematics S.p.A., Italy
  • Dr John McCarthy, Director, Oxford Systems, UK
  • Dr Ameer Al -Nemrat, University of East London, UK
  • Mrs Sukhvinder Hara, Middlesex University, UK
  • Dr Ian Mitchell, Middlesex University, UK
  • Professor Ahmed Bouridane, Northumbria University, UK
  • Dr Amin Hosseinian-Far, University of Northampton, UK
  • Dr Reza Montasari, Birmingham City University, UK
  • Mr Ayman El Hajjar, QAHE and Northumbria University, UK
  • Dr George Weir, University of Strathclyde, UK
  • Dr Sufian Yousef, Anglia Ruskin University, UK
  • Dr Alireza Daneshkhah, Coventry University, UK
  • Dr Maryam Farsi, Cranfield University, UK
  • Mr Usman Butt, QAHE and Northumbria University, UK
  • Asim Majeed, QAHE and University of Roehampton, UK
  • Dr Rose Fong, QAHE an Northumbria University London, UK
  • Dr Athar Nouman, QAHE an Northumbria University London, UK
  • Mr Umair B. Chaudhry, Queen Mary College, University of London, UK
  • Mr Nishan Chelvachandran, Cyberreu, Finland
  • Mr Stefan Kendzierskyj, Cyfortis, UK
  • Professor Sergio Tenreiro de Magalhaes, Chair of Cyber Security

Quick contact

Please enter a valid telephone number
This field is required
This field is required
This field is required
This field is required
By providing your email address and/or phone number, you are confirming that you give us permission to respond to your enquiry via these means. We will process your information in accordance with our data policy, more details of which can be found on our privacy statement. In future we would like to contact you with relevant information on our courses, facilities and events. Please confirm you are happy to receive this information and indicate below how you would like us to communicate with you. Please note, this will overwrite any previous communication preferences you may have already specified to us.
This field is required