Due to the COVID-19 epidemic, the organizing committee has decided to hold ICI2C'21 in-person/Virtual mode.
WELCOME TO ICI2C’21
The International Conference on Information, Communication & Cybersecurity ICI2C’21 organized by The National School of Applied Sciences of Sultan Moulay Slimane University, Morocco, in collaboration with Charles Darwin University, Australia; during November 10-11, 2021. The ICI2C 2021 Conference provides an opportunity to account state-of-the-art works, future trends impacting information, communications and cyber-security, with a focus on elucidating the challenges, opportunities, and inter-dependencies that are just around the corner.
All ICI2C 2021 accepted papers are expected to be published by Springer Lecture Notes in Networks and Systems (approved). The series “Lecture Notes in Networks and Systems” publishes the latest developments in Networks and Systems—quickly, informally and with high quality. LNNS is now indexed by SCOPUS, INSPEC, WTI Frankfurt eG, zbMATH, SCImago.
All books published in the series are submitted for consideration in Web of Science.
This is the final conference program. The detailed program is available thourgh this link: Download Full Program
Official Opening Session
Behavioural intelligence of artificial creatures
- Prof. Yves Duthen
Deep Leaning Techniques for Threat Intelligence
- Prof. Mamoun Alazab
Recognizing FDIA as a Critical Issue in the Field of Cybersecurity
- Prof. Al-Sakib Khan Pathan
The field of cybersecurity often focuses on only technical aspects of cyber activities, connections, protecting codes from specific violations, and regulating operational methods of various cyber applications. While this is important to give enough emphasis on the technical aspects, the importance of the presence of error-free data in the cyber platform cannot be overlooked. The False Data Injection Attack or FDIA concept basically came from the smart grid domain which refers to the manipulation of sensor readings. However, due to the enormous growth of the Internet, a similar issue has come to the view as data could be often provided in manipulated form to be used for cyberspace or cyber applications as well. FDIA specifically considers the deliberate attempts of modifying data from various readings of source sensors and devices or in the databases which could have long lasting impact even if the datasets are used later for any practical application. In this case, we are not talking about cyber-attack based data manipulation issue but rather about deliberate modification of data that would apparently look like valid before their practical use. In this talk, we would explore this issue, talk about various aspects to tackle FDIA in the cyberspace, and share the basic idea behind some countermeasures. The focus of the talk is about protection of data in the cyberspace before application-specific use (i.e., preventing FDI), not how to defend against sophisticated cyber-attacks that are launched via complicated technical means. Some recent and relevant works in this area would be discussed.
Session I: Information Management
Session II: Sentiment analysis & Semantic Web
Session III.1: Communication and Networking
Session VI.1: Machine Intelligence
Artificial Intelligence in Cloud Computing and Internet-of-Things
- Prof. Vincenzo Piuri
Recent years have seen a growing interest among users in the migration of their applications to Cloud computing and Internet-of-Things environments. However, due to high complexity, Cloud-based and Internet-of-Things infrastructures need advanced components for supporting applications and advanced management techniques for increasing the efficiency. Adaptivity and autonomous learning abilities become extremely useful to support configuration and dynamic adaptation of these infrastructures to the changing needs of the users as well as to create adaptable applications. This self-adaptation ability is increasingly essential especially for non expert managers as well as for application designers and developers with limited competences in tools for achieving this ability. Artificial intelligence is a set of techniques which greatly can improve both the creation of applications and the management of these infrastructures. This talk will discuss the use of artificial intelligence in supporting the creation of applications in cloud and IoT infrastructures as well as their use in the various aspects of infrastructure management.
Resource Allocation and Scheduling Real-Time Applications in Cloud and Fog Architecture: Trends and Challenges
- Prof. Helen Karatza
Cloud computing plays an ever-increasing role recently in various sectors including academia and business. It has been widely recognized that resource allocation and application scheduling are important aspects of cloud computing. Due to the rapid growth of Internet of Things (IoT) applications, fog computing has emerged as a computing paradigm used to solve constrains in cloud computing related to network congestion and transmission latency, thus providing additional functionality in IoT. Most of the IoT applications are time-sensitive, so the constraint of meeting deadlines is mandatory. On the other hand, the processing capacity of the fog resources is usually limited. Consequently, appropriate management of real-time applications is required for effective use of cloud and fog resources. In this keynote we will discuss novel techniques to address challenges in resource allocation and scheduling in cloud and fog computing infrastructures. Additionally, we will identify and provide future research directions in the cloud and fog computing research areas.
IoT and Fog Computing: Challenges and applications
- Prof. Imed Romdhani
To be Defined
- Prof. Philippe Roose