SCOPE of CCISC 2026
Contributed papers are solicited describing original works in Computer Communication, Information System and Cybersecurity. Topics and technical areas of interest include but are not limited to the following:
Computer Communication and Networking
Research and Applications of 5G/6G Mobile Communication Network Technologies
IoT Communication Protocols and Networking Technologies
Satellite Internet Technologies and Applications
Industrial Internet Network Architecture and Performance Optimization
V2X Technologies and Intelligent Transportation Systems
Software - Defined Networking (SDN) and Network Function Virtualization (NFV)
Network Traffic Analysis and Congestion Control Algorithms
Wireless Network Resource Management and Optimization
Underwater Acoustic Communication Networks for Ocean Monitoring
High - Altitude Platform Station (HAPS) Communication Systems
Tactile Internet Technologies for Real - Time Haptic Interaction
Cognitive Radio Networks for Dynamic Spectrum Allocation
Information System and Data Management
Cloud Computing and Distributed System Architecture Design
Big Data Storage, Processing, and Analysis Technologies
Database System Management and Performance Optimization
Information System Integration and Middleware Technologies
Web Technologies and Service Computing
E - commerce and E - government Systems
Decision - Support Systems and Business Intelligence
Information System Project Management and Implementation
Information System Applications in Healthcare, Education, and Finance Sectors
Internet of Things - Enabled Smart City Information Systems
Blockchain - Based Distributed Ledger Information Systems
Augmented Reality and Virtual Reality in Information Visualization
Cybersecurity and Privacy Preservation
Network Attack Detection and Defense Technologies
Cryptography and Applied Security
Data Security and Privacy Protection Technologies
Cloud Security and Virtualization Security
Industrial Control System Security
Security Protocol Design and Analysis
Malware Analysis and Prevention
Risk Assessment and Security Management
Security Auditing and Forensic Technologies
Research on Network Security Laws, Regulations, and Compliance
Zero - Trust Security Model Implementations
Quantum - Resistant Cryptography for Future Security