test
test
test

The International Conference
on Information, Communication & Cybersecurity
ICI2C’21

10-11 November 2021 | Khouribga, Morocco

Submit your paper
test
test

The International Conference
on Information, Communication & Cybersecurity
ICI2C’21

10-11 November 2021 | Khouribga, Morocco

Submit your paper
test
test
test

The International Conference
on Information, Communication & Cybersecurity
ICI2C’21

10-11 November 2021 | Khouribga, Morocco

Submit your paper
test
test
test

The International Conference
on Information, Communication & Cybersecurity
ICI2C’21

10-11 November 2021 | Khouribga, Morocco

Submit your paper

Due to the COVID-19 epidemic, the organizing committee has decided to hold ICI2C'21 in-person/Virtual mode.

WELCOME TO ICI2C’21

The International Conference on Information, Communication & Cybersecurity ICI2C’21 organized by The National School of Applied Sciences of Sultan Moulay Slimane University, Morocco, in collaboration with Charles Darwin University, Australia; during November 10-11, 2021. The ICI2C 2021 Conference provides an opportunity to account state-of-the-art works, future trends impacting information, communications and cyber-security, with a focus on elucidating the challenges, opportunities, and inter-dependencies that are just around the corner.

All ICI2C 2021 accepted papers are expected to be published by Springer Lecture Notes in Networks and Systems (approved). The series “Lecture Notes in Networks and Systems” publishes the latest developments in Networks and Systems—quickly, informally and with high quality. LNNS is now indexed by SCOPUS, INSPEC, WTI Frankfurt eG, zbMATH, SCImago.

All books published in the series are submitted for consideration in Web of Science.

Proceedings & Publication

Submit your proposal now

Conference Speakers

Prof. Vincenzo Piuri

University of Milan, Italy

Prof. Imed Romdhani

Edinburgh Napier University, UK

Prof. Nabil Benamar

Moulay ismail university, Morocco

Prof. Mamoun Alazab

Charles Darwin University, Australia

Prof. Yves Duthen

toulouse 1 capitole university, France

Prof. Al-Sakib Khan Pathan

Independent University, Bangladesh

Prof. Philippe Roose

University of Pau, France

Prof. Helen Karatza

Professor Emeritus, Aristotle University of Thessaloniki, Greece

Conference Program

This is the final conference program. The detailed  program is available thourgh this link: Download Full Program
10th Nov 2021 : Day - 01
08:00 - 09:00

Registration

09:00 - 10:00

Official Opening Session

10:00 - 10:45

Behavioural intelligence of artificial creatures

  • Prof. Yves Duthen  

11:15 - 12:00

Deep Leaning Techniques for Threat Intelligence

  • Prof. Mamoun Alazab  

12:00 - 12:45

Recognizing FDIA as a Critical Issue in the Field of Cybersecurity

  • Prof. Al-Sakib Khan Pathan  

The field of cybersecurity often focuses on only technical aspects of cyber activities, connections, protecting codes from specific violations, and regulating operational methods of various cyber applications. While this is important to give enough emphasis on the technical aspects, the importance of the presence of error-free data in the cyber platform cannot be overlooked. The False Data Injection Attack or FDIA concept basically came from the smart grid domain which refers to the manipulation of sensor readings. However, due to the enormous growth of the Internet, a similar issue has come to the view as data could be often provided in manipulated form to be used for cyberspace or cyber applications as well. FDIA specifically considers the deliberate attempts of modifying data from various readings of source sensors and devices or in the databases which could have long lasting impact even if the datasets are used later for any practical application. In this case, we are not talking about cyber-attack based data manipulation issue but rather about deliberate modification of data that would apparently look like valid before their practical use. In this talk, we would explore this issue, talk about various aspects to tackle FDIA in the cyberspace, and share the basic idea behind some countermeasures. The focus of the talk is about protection of data in the cyberspace before application-specific use (i.e., preventing FDI), not how to defend against sophisticated cyber-attacks that are launched via complicated technical means. Some recent and relevant works in this area would be discussed.

13:00 - 14:30

Lunch

14:30 - 17:00

Session I: Information Management

14:30 - 17:00

Session II: Sentiment analysis & Semantic Web

14:30 - 17:00

Session III.1: Communication and Networking

14:30 - 17:00

Session VI.1: Machine Intelligence

11th Nov 2021 : Day - 02
09:00 - 09:45

Artificial Intelligence in Cloud Computing and Internet-of-Things

  • Prof. Vincenzo Piuri  

Recent years have seen a growing interest among users in the migration of their applications to Cloud computing and Internet-of-Things environments. However, due to high complexity, Cloud-based and Internet-of-Things infrastructures need advanced components for supporting applications and advanced management techniques for increasing the efficiency. Adaptivity and autonomous learning abilities become extremely useful to support configuration and dynamic adaptation of these infrastructures to the changing needs of the users as well as to create adaptable applications. This self-adaptation ability is increasingly essential especially for non expert managers as well as for application designers and developers with limited competences in tools for achieving this ability. Artificial intelligence is a set of techniques which greatly can improve both the creation of applications and the management of these infrastructures. This talk will discuss the use of artificial intelligence in supporting the creation of applications in cloud and IoT infrastructures as well as their use in the various aspects of infrastructure management.

09:45 - 10:30

Resource Allocation and Scheduling Real-Time Applications in Cloud and Fog Architecture: Trends and Challenges

  • Prof. Helen Karatza  

Cloud computing plays an ever-increasing role recently in various sectors including academia and business. It has been widely recognized that resource allocation and application scheduling are important aspects of cloud computing. Due to the rapid growth of Internet of Things (IoT) applications, fog computing has emerged as a computing paradigm used to solve constrains in cloud computing related to network congestion and transmission latency, thus providing additional functionality in IoT. Most of the IoT applications are time-sensitive, so the constraint of meeting deadlines is mandatory. On the other hand, the processing capacity of the fog resources is usually limited. Consequently, appropriate management of real-time applications is required for effective use of cloud and fog resources. In this keynote we will discuss novel techniques to address challenges in resource allocation and scheduling in cloud and fog computing infrastructures. Additionally, we will identify and provide future research directions in the cloud and fog computing research areas.

11:15 - 12:00

IoT and Fog Computing: Challenges and applications

  • Prof. Imed Romdhani  

12:00 - 12:45

To be Defined

  • Prof. Philippe Roose  

13:00 - 14:30

Lunch

14:30 - 17:00

Session IV: Cybersecurity and Privacy

14:30 - 17:00

Session V: Information Retrieval

14:30 - 17:00

Session III.2: Communication and Networking

14:30 - 17:00

Session VII: Artificial Intelligence for COVID-19

14:30 - 17:00

Session VI.2: Machine Intelligence

17:00 - 17:30

Closing Ceremony

Organizers & Official Sponsors

Check Who Makes This Event Possible!

Organizers

Official Sponsors

Abstract & Indexing

X