Call For Papers

SCOPE of CCISC 2026

Contributed papers are solicited describing original works in Computer Communication, Information System and Cybersecurity. Topics and technical areas of interest include but are not limited to the following:

 

Computer Communication and Networking​

Research and Applications of 5G/6G Mobile Communication Network Technologies​
IoT Communication Protocols and Networking Technologies​
Satellite Internet Technologies and Applications​
Industrial Internet Network Architecture and Performance Optimization​
V2X Technologies and Intelligent Transportation Systems​
Software - Defined Networking (SDN) and Network Function Virtualization (NFV)​
Network Traffic Analysis and Congestion Control Algorithms​
Wireless Network Resource Management and Optimization​
Underwater Acoustic Communication Networks for Ocean Monitoring​
High - Altitude Platform Station (HAPS) Communication Systems​
Tactile Internet Technologies for Real - Time Haptic Interaction​
Cognitive Radio Networks for Dynamic Spectrum Allocation​

 

Information System and Data Management​

Cloud Computing and Distributed System Architecture Design​
Big Data Storage, Processing, and Analysis Technologies​
Database System Management and Performance Optimization​
Information System Integration and Middleware Technologies​
Web Technologies and Service Computing​
E - commerce and E - government Systems​
Decision - Support Systems and Business Intelligence​
Information System Project Management and Implementation​
Information System Applications in Healthcare, Education, and Finance Sectors​
Internet of Things - Enabled Smart City Information Systems​
Blockchain - Based Distributed Ledger Information Systems​
Augmented Reality and Virtual Reality in Information Visualization​

 

Cybersecurity and Privacy Preservation​

Network Attack Detection and Defense Technologies​
Cryptography and Applied Security​
Data Security and Privacy Protection Technologies​
Cloud Security and Virtualization Security​
Industrial Control System Security​
Security Protocol Design and Analysis​
Malware Analysis and Prevention​
Risk Assessment and Security Management​
Security Auditing and Forensic Technologies​
Research on Network Security Laws, Regulations, and Compliance​
Zero - Trust Security Model Implementations​
Quantum - Resistant Cryptography for Future Security​