Event details

Event date 16-01-2019
Event location London, TBC

Hosted by: QA Higher Education and Northumbria University London

Date: 16-18 January 2019

Venue: Northumbria University London, 110 Middlesex Street, London, England, E1 7HT

12 ICGS3-19 is an IEEE technical sponsored event with Conference Proceedings to be published by IEEE Xplore.


About the Conference

Following the successful 11th ICGS3, we have much pleasure in announcing the 12th International conference on Global Security, Safety & Sustainability.

In an era of unprecedented volatile, political and economic environments across the world, computer based systems face ever-increasing challenges, disputes and responsibilities. Whilst the Internet has created a global platform for the exchange of ideas, goods and services – it has also, however, created boundless opportunities for cyber-crime.

Therefore, the role of information systems in facilitating secure economic transactions and maintaining steady and reliable sources of information that support politically stable and sustainable socio-economic systems is becoming increasingly critical.

As the number of large organizations and individuals using the Internet and its satellite mobile technologies increases, they are increasingly vulnerable to cyber-crime. It is therefore paramount that the security industry raises its game to combat these threats. This is an issue of global importance as law enforcement agencies the world over are struggling to cope.

This Annual International Conference is an established platform in which security, safety and sustainability issues can be examined from several global perspectives through dialogue between academics, students, government representatives, chief executives, security professionals, and research scientists from the United Kingdom and from around the globe.

The three-day conference will focus on the challenges of complexity, the rapid pace of change and risk/opportunity issues associated with the 21st century lifestyle, systems and infrastructures.

Important dates
Important dates
Submission deadline 03 September 2018
Peer review to be completed 25 September 2018
Camera ready/Authors Notification 20 October 2018
Author registration 20 October 2018
The ICGS3 Conference takes place 16 – 18 January 2019

The list of topics includes (but are not limited to):

Systems Security, Safety and Sustainability Cyber Infrastructure Protection

  • Internet of Things
  • SCADA and Ransomware
  • Transport Security
  • Cyber Warfare
  • Modelling Approaches, Security and Systems Assurance Frameworks
  • Safety & Security in System of Systems
  • Trusted Systems and Devices
  • Geo-information and Geo-spatial Intelligence Security Systems (GIS)
  • Networks Security
  • Digital Twins
  • Blockchain
  • Biometric Recognition Systems and Biometry Information Exchange Security
  • Networks Privacy Security
  • Safety and Security Evaluation, Assessment and Certification
  • Large Scale Systems Protection and Management of Major Events
  • Smart Cities

The Future of Digital Forensics 

  • Cloud Forensics
  • Computer Forensics and Anti-Forensics
  • Mobile and Handheld Device Forensics
  • Chain of Custody, Recovery, Storage and Preservation
  • Tools and Applications
  • Incident Response and Investigation
  • Standards and Procedures
  • Steganography
  • E-discovery and Data Analysis
  • Network Traffic Analysis
  • Case Studies and Best Practices
  • Legal Issues Related to Cloud Computing
  • Legal and Ethical Aspects of Digital Forensics
  • Computer Forensic Tools Used in Investigating a Crime Scene, Data Analysis and Root Cause
  • Forensics and Assistance of Hacked Environment, Tools (Types) Used in Investigating a Crime Scene, Data Analysis and Root Cause
  • Technical Methods in Collecting Volatile and Non-Volatile Information
  • Legislation and Evidence for Prosecution

Information Systems Security Management

  • Information Systems
  • Information Security Management Systems
  • Risk Management
  • Cyber Risk Management
  • Cyber Resilience
  • Safety, Reliability and Risk Analysis
  • Strategic Approaches to Security
  • Fraud Management
  • IT Audit, Governance and Security
  • Compliance and Certification
  • Risk Assessment, Methodologies and Tools
  • Social Media Control, Risk and Governance
  • Security and Privacy Architecture and Design For Software and Systems
  • Methods and Models for Security and Privacy
  • Support Tools For Modelling Security and Privacy
  • Methods and Tools For Modelling Trust
  • Human Aspects in Security and Privacy

Cyber Criminology 

  • Cyber-Criminology, Criminal Data Mining, Threat Analysis and Prediction
  • Crime and Social Media
  • Victimisation
  • Cyber Criminology, Theories and Models,
  • Psychology of the Cyber Criminals
  • Cybercrime Policing
  • Cybercrime Justice Models
  • The role of Big data
  • Dark Web/ Darknet
  • Jurisdiction
  • Hacking and Cracking
  • Cyber Bullying, Stoking Etc.
  • Cybercrime Punishment
  • E-Identification (e.g. Evolving EU Legal Framework, Identity Related Rights)
  • Augmented Reality

Cyber Intelligence and Operation

  • Cyber-Crime Detection and Prevention
  • Crime Information Intelligence Network
  • Cyber Threat Intelligence
  • Cyber War
  • Open Source Intelligence
  • Law Enforcement Agencies
  • Social Media
  • Attack Pattern Recognition
  • Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) Support Systems
  • Cloud Computing Security
  • Enterprise Architecture Security
  • Security in Mobile Operating Environments
  • Enterprise Architecture Security
  • Mass Interception Communication Solutions
  • Content Digitisation Security and Mass Data Storage Banks protection
  • Counterintelligence Management

Remote System Intelligence and Counter Measures

  • Access Controls
  • Detection and Remediation of Security Breaches
  • Business Continuity Planning
  • Disaster Recovery Planning
  • Black, White and Grey Hat Hacking
  • Honeypots
  • Rootkits
  • Vulnerability Assessments – Lessons Learned on Current Operating system Vulnerabilities and Loopholes
  • War Driving
  • Wi-Fi Vulnerabilities
  • The Past, Present and Future of Computer Hacking
  • Technical Measures for Self-Protection
  • Investigative, Mitigation Methods and Techniques to Apprehend an Offender

Full research papers limited to 12-15 pages should report on novel and completed work of important value to the community. The work should not be published or in submission anywhere else.

12th International Conference on Global Security, Safety and Sustainability (ICGS3), 2019

All accepted papers would be included in the proceedings of the event as an IEEE Xplore publication.

There is an expectation and trust that all submissions are of high quality with substantial novel research achievements. All papers have to be written in English language. All submissions will be peer reviewed for publication.

All articles for 12th ICGS3-19 must be submitted using the online submissions system at: cmt3.research.microsoft.com/ICGS32019.

You need to register to use the online submission system.

On submission, please remove all identifying information from your submission, including author names, affiliations, and any acknowledgments.

Very important note:

As you begin your work on the creation of your conference paper we would like to highlight two important aspects of this process.

  1. As a reminder, all authors of accepted papers must transfer copyright, which would be provided after the papers are peer reviewed.
  2. In addition, IEEE policy requires that all accepted papers must be checked for plagiarism. This can be accomplished by providing the Similarity Index result through Turn-It-In or any other tools as part of your paper submission.

Authors should follow instructions to provide their manuscripts in Word and LaTeX templates which can be found at PDF instructions MS Word and LaTeX templates.

General Chair:

Professor Hamid Jahankhani, UK


Call for poster presentations

Poster presentations provide an ideal opportunity for the exchange of ideas and expertise within and between the various computing technology related domains represented at the conference. Poster submissions should describe topical research related but not limited to the 8 mentioned domains of 12th ICGS3-19.

In essence a poster is an illustrated abstract, a short story of the status of your research.

Poster presenters will be given the possibility to present their posters to the conference audience in a rapid-fire flash session before the scheduled poster session. Posters with the most stimulating content will be recognized in an award ceremony on the final day of the conference.

Submission and Review Process

For with each poster submission an abstract limited to 500words must be submitted. This abstract must describe the research presented in the poster. The abstract must be clear on

  • The research outline
  • The status of the research (progress made etc.)
  • Discoveries, accomplishments and obstacles
  • What you add to the current knowledge pool
  • Conclusion, findings and future work to be done

Relating to your poster, you must also provide the following information:

  • Topic: A title for the poster of no more than 20 words.
  • Domain: A primary and (optionally) secondary domain(s)
  • Author details: Full names and contact details of author(s).

Poster submissions should be made through the ICGS3 online submission portal, and will be reviewed by domain experts from the ICGS3 review Committee. All poster abstracts will follow a double blind peer review process, and once your abstract is accepted, you will be required to prepare a poster, and present the poster at the ICGS3 conference.

The abstract will be published in the program and should be written to attract those who work directly in the field and in related areas.

Poster material should be well labelled and legible from a distance of 0.5m. The title should be the same as the title submitted with the abstract and appear in boldface at the top.

Poster boards will accommodate A0 and A1 -sized posters in long portrait orientation. The minimum poster size recommended is 60cm by 91cm so attendees can see the poster at a minimum of 0.5m away.

Further Information

Presenters of a poster will be expected to be present at the ICGS3 conference and will be expected to present their posters in order to explain their research. This will also allow presenters to hand out any leaflets, or other information material they have available for viewers of your poster. Each presenter can therefore only present one poster. Any academic or organization that submits more than one poster application should indicate a priority to their submissions or confirm there will be enough presenters available for presenting each poster.

It is important that applicants describe in their abstract how they intend to present the project in the poster format – what kind of visual materials they will use, for example, photographs, data samples, graphs, et cetera, and how these illustrate the project or a particular aspect of the work. The poster has to be an experience in itself for the one who looks at it – and should show awareness of the format of a poster-session and its purpose to engage the viewer in conversation.

For more details, please refer to the Submission section of the conference.

Poster Session Committee

General Chair:

Professor Hamid Jahankhani, UK


Poster General Chair:

Professor Bobby Tait, South Africa


Poster Session Steering Committee

  • Dr Amin Hosseinian-Far, University of Northampton, UK
  • Dr Ian Mitchell, Middlesex University, UK
  • Dr Reza Montasari, Birmingham City University, UK
  • Dr Mathews Z. Nkhoma, RMIT International University Vietnam, Ho Chi Minh City, Vietnam
  • Stefan Kendzierskyj, Northumbria University, UK

Programme Information

Keynote Speakers

  • Lord Alex Carlile, CBE, FRSA, QC (Baron Carlile of Berriew)
  • Aaron Parker – Maritime Systems Architect at Lockheed Martin, Portsmouth, UK
  • Prof. A G Hessami, Director, Vega Systems, London, UK
  • Professor Richard Hill, Huddersfield University, UK
  • Ms Amie Taal, Stratagem Tech Solutions Ltd, UK
  • Prof. Babak Akhgar, Director, Centre of Excellence in Terrorism, Resilience, Intelligence and Organised Crime Research (CENTRIC), UK
  • Berta Papp-Silva, CEO and Co-Founder, The CyberFish Cyberpsychology Solutions, UK


All authors must register by 20 October 2018 for their papers to be included in the Conference.

Category Fee
Author Registration (one paper only) and general participation £280
PhD Student Registration (all PhD student registrations must be accompanied by a letter from their University confirming current PhD student status) £180
Student & Supervisor Joint Registration (one paper only) £380
Each additional paper per registered author £20
Late Registration (non-authors), Full Registration (after 15 November 2018) £380
Additional Gala Dinner ticket £50
Postgraduate Poster Submission (only one submission per student is accepted) £130
Student Participation with no submissions (attendance of the conference sessions and access to refreshments during the breaks and lunch but not the conference’s gala dinner) £90

Authors and General Participation rates include: attendance to all sessions, proceedings, coffee breaks, 2 luncheons and conference banquet.

PhD Student rates apply to full time students who provide a declaration from the University, stating full time status. This information should be emailed to the organisers with the registration form, otherwise it will not be considered.

For registration, please email Professor Hamid Jahankhani at hamid.jahankhani@northumbria.ac.uk with the completed registration form.


General Chair:

Professor Hamid Jahankhani, UK


  • Professor Bobby Tait, University of South Africa, South Africa
  • Amie Taal, Stratagem Tech Solutions Ltd, UK
  • Professor Ali Hessami, Director Vega Systems, UK
  • Professor Sérgio Tenreiro de Magalhães, Catholic Univ. of Portugal, Braga, Portugal
  • Dr Arshad Jamal, QAHE and Northumbria University London, UK
  • Dr Mathews Z. Nkhoma, RMIT International University Vietnam, Ho Chi Minh City, Vietnam
  • Professor Babak Akhgar, Director of CENTRIC, Sheffield Hallam University, UK
  • Dr Amin Hosseinian-Far, University of Northampton, UK
  • Professor Gianluigi Me, Luiss University, Italy
  • Professor Vitor Sa, University of Minho, Braga, Portugal
  • Professor Antonio Mauro, Head of Security and Compliance Assurance, Octo Telematics S.p.A., Italy
  • Professor Mohammad Dastbaz, Deputy Vice-Chancellor, University of Suffolk, UK
  • Dr John McCarthy, Director, Oxford Systems, UK
  • Dr Christos Douligeris, University of Piraeus, Greece
  • Professor Orhan Gemikonakl, Middlesex University, UK
  • Dr Omar S. Arabiat, Balqa Applied University, Jordan
  • Mr Konstantinos Kardaras, Technical Consultant, Greece
  • Dr Chafika Benzaid, Computer Security Division, CERIST, University of Sciences and Technology Houari Boumediene, Algeria
  • Professor Bobby Tait, University of South Africa, South Africa
  • Dr Fouad Khelifi, Northumbria University, UK
  • Dr Graham Sexton, Northumbria University, UK
  • Dr Kenneth Revett, University of Maryland College Park, Massachusetts, USA
  • Dr Ken Dick, Nebraska University Centre for Information Assurance, USA
  • Dr Elias Pimenidis, University of West of England, UK
  • Professor Henrique M.D. Santos, University of Minho, Portugal
  • Professor Alexander Sideridis, Agricultural University of Athens, Greece
  • Mr Ray Brown, QAHE and Northumbria University, UK
  • Professor Murdoch Watney, University of Johannesburg, South Africa
  • Dr Mamoun Alazab, Macquarie University, Australia
  • Dr Gregory Epiphaniou, Commercial Director, Wolverhampton Cyber Research Institute (WCRI), University of Wolverhampton, UK
  • Dr Haider Alkhateeb, Wolverhampton Cyber Research Institute (WCRI), University of Wolverhampton, UK
  • Dr Carlisle George, Middlesex University, UK
  • Professor Gianluigi Me, University of Rome LUISS “Guido Carli”, Italy
  • Professor Antonio Mauro, Head of Security and Compliance Assurance, Octo Telematics S.p.A., Italy
  • Dr John McCarthy, Director, Oxford Systems, UK
  • Dr Ameer Al -Nemrat, University of East London, UK
  • Mrs Sukhvinder Hara, Middlesex University, UK
  • Dr Ian Mitchell, Middlesex University, UK
  • Professor Ahmed Bouridane, Northumbria University, UK
  • Dr Amin Hosseinian-Far, University of Northampton, UK
  • Dr Reza Montasari, Birmingham City University, UK
  • Mr Ayman Ayman El Hajjar, QAHE and Northumbria University, UK
  • Dr George Weir, University of Strathclyde, UK
  • Dr Sufian Yousef, Anglia Ruskin University, UK
  • Professor Richard Hill, Huddersfield University, UK
  • Dr Alireza Daneshkhah, Coventry University, UK
  • Dr Maryam Farsi, Cranfield University, UK
  • Mr Usman Butt, QAHE and Northumbria University, UK
  • Asim Majeed, QAHE and Roehampton University, UK
testimonial image
testimonial image

“Northumbria University has a good ranking among the universities in the UK, in particular the business school.”

Kenny Chok
MSc Business with Marketing Management



Find out more about our part-time MSc Cyber Security programme. This programme has start dates in January, April, July and October each year and is taught via 15 weekend classroom sessions spread throughout 2 years.



At Northumbria University, we embrace tomorrow. We pursue new thinking, forge new partnerships, create and exchange new knowledge, and find new solutions. Confident and creative in everything we do, we offer leadership and direction in this fast-changing world.

Quick contact

Please enter a valid telephone number
This field is required
This field is required
This field is required
This field is required
By providing your email address and/or phone number, you are confirming that you give us permission to respond to your enquiry via these means. We will process your information in accordance with our data policy, more details of which can be found on our privacy statement. In future we would like to contact you with relevant information on our courses, facilities and events. Please confirm you are happy to receive this information and indicate below how you would like us to communicate with you. Please note, this will overwrite any previous communication preferences you may have already specified to us.
This field is required