DATE
Submission Closed
10th August, 2021
Notification of Acceptance Deadline
27th September, 2021
Registration Starts
11th October, 2021
Camera Ready Paper Deadline
25th October, 2021
Registration Closes
15th December, 2021
Shri. L. Gopalakrishnan
Chief Patron
PSG College of Technology
Dr. K. Prakasan
Patron
PSG College of Technology
Dr. R. Nadarajan
Organizing Chair
PSG College of Technology
University of Oklahoma, USA
University of Tsukuba,
Japan
IIT Roorkee, India
Visiting Professor
Department of AMCS
PSG College of Technology, India
Professor
Department of AMCS
PSG College of Technology, India
Professor
Department of AMCS
PSG College of Technology, India
Professor
Department of AMCS
PSG College of Technology, India
Professor
Department of AMCS
PSG College of Technology, India
Alcatel-Lucent Bell Labs, New Jersey
USA
Professor
University of Trier, Germany
Visiting Fellow
University of Ilorin, Nigeria
Professor
Ulster University, Northern Ireland
Professor
University of Central Florida, USA
Professor
Open University of the Netherlands, The Netherlands
Professor
Swiss Federal Institute of Technology, Switzerland
Visiting Fellow
University of Basque County, Spain
Visiting Fellow
Alcatel-Lucent Bell Labs, New Jersey, USA
Professor
University of New South Wales, UNSW, Sydney, Australia
Professor
University of Lübeck, Germany
Professor
University of Tsukuba, Japan
Professor
University of Southern Mississippi, USA
Professor
Institute for Math & Computer Sci (CWI), The Netherlands
Professor
Vrije University, Amsterdam, Netherlands
Professor
Applied Optimization Inc, Ohio, USA
Chief Data Scientist
Acalvio Technologies
Bangalore
Professor
University of Oklahoma, USA
We enthusiastically encourage prospective authors to submit an electronic version of their original research papers that contain contributions of theoretical, experimental or application nature using EasyChair.The conference is organized in three tracks Computational Models, Computational Intelligence and CyberSecurity with the theme "Recent Trends in Computational Models, Intelligence and Security Systems" and will feature distinguished invited speakers in each track.
Computational Models
Computational Modelling formulates and models real-world problems, then uses computing to develop solutions Computational models have an influential role in developing and understanding complex systems with the support of mathematics, physics and computer simulation. Computational models help various stakeholders of the system to visualize, predict, optimize, regulate and control complex systems using high-end computing technology. Computational models evolve over time, as abstractions are introduced to eliminate unnecessary details and clarify the important design. Computational modelling and simulation methods can be developed for a vast range of science and engineering disciplines and far beyond.
Computational Intelligence
Computational Intelligence is a set of nature inspired computational methodologies and techniques to address complex real world problems. It encompasses neural networks, fuzzy logic and evolutionary computation as its main key elements. It is an evolving field and many computing paradigms including ambient intelligence, cultural learning and deep learning constitute the main core of computational intelligence. The aim of computational intelligence is to develop a new arena for analyzing and creating effective processing elements with adequate knowledge on sensing, interpreting, learning, thinking and remembering to aid intuitive information processing systems.
CyberSecurity
Cyber Security is becoming an increasingly central facet of national security strategy and a lot of people are working collectively in the field of Cyber Security. Both the private and public sectors are relying on cybersecurity. Securing network and information systems are essential to keeping the online economy in shape and to ensure progress. The rise of new technologies and changing norms of remote working are increasingly opening a Pandora's Box of critical infrastructure vulnerabilities. Being aware of potential cybersecurity threats, building a threat-resistant and agile infrastructure and adoption of best practices to mitigate operational hiccups and security risks are the most pertinent needs of every application sector. Security for Cyber Physical Systems, Networking protocols, Botnets and Malware, Intrusion detection, Data privacy, Authentication and Cryptanalysis are the core research areas in the field of cyber security.
Developing models of computation with intelligence and security form a basis of the theory of computational methods. Hence, the three areas namely computational intelligence, computational models and cyber security become inter-related under the umbrella of computational methods.
Papers are solicited from industry, government and academia (including students) covering relevant research, technologies, methodologies, tools and case studies. The aim of this conference series is to bring to the front the novel ideas in the theory and progress of cybersecurity, computational advancement for modelling and intelligence inorder to achieve a major breakthrough, practical improvements and new research directions. The topics listed below are meant to indicate the breadth of the area and are definitely not to be considered exhaustive
The submitted paper must be substantially original work, which has neither been published before nor is under review for any other conference or journal. The ICC3 strictly prohibits any plagiarism. The ICC3 retains the right to eliminate any paper in violation of these requirements and to exclude the author(s) of such papers from future ICC3 conferences. On the basis of double blind review process, selected papers recommended by the Review Committee, would be compiled in a proceeding. It is planned to publish the peer reviewed and selected papers of conference as proceedings with Springer in their prestigious Communications in Computer and Information Science series.
The accepted papers will be published in "Communications in Computer and Information Science CCIS" (conditionally approved) of Springer which is indexed in DBLP, Google Scholar, Scopus (Elsevier) etc.
Papers submitted in English will be reviewed. Only Adobe Portable Document Format (PDF) will be accepted for submission and review. Other formats will automatically be rejected by the EasyChair.
Authors are kindly requested to make sure that all equations, tables and figures are embedded in the PDF file.
Please submit your paper only through EasyChair by clicking here
For more details, please refer https://www.springer.com/gp/computer-science/lncs/conference-proceedings-guidelines
Blinded Title Page:
For all new submissions and revisions, the first page of the manuscript should be a blinded title page (author(s) names and affiliations should be removed).
Separate (Un-Blinded) Title Page
The separate un-blinded title page should include
Main Text
Headings and Subheadings in the text indicate the organisation of content. As a general principle, please do not use more than three levels of displayed headings. Since manuscripts are evaluated through an anonymous peer review process, authors must remove identifying references or material.
Acknowledgments (where applicable)
Acknowledgments of people, grants, funds, etc. should be placed in a separate section before the reference list. The names of funding organisations should be written in full, and for the purposes of the blind peer-review process, acknowledgements should not violate the anonymity of the author (i.e., avoid acknowledgments in the format of “Thank you to my institution [x] and colleagues [name], [name]…)
References
References follow the text in a separate section headed “REFERENCES” using APA citation style. All references cited in the text must be listed in the reference section, and vice versa. Publication information for each must be complete and correct. It is the author's responsibility to make sure that all information provided in the reference section is complete and correct.
# | Purpose of Registration |
Amount |
Deadline |
---|---|---|---|
1. | Conference Only (with paper presentation) |
INR 3500 |
25.10.2021 |
2. | Conference (with paper presentation)+workshop |
INR 4500 |
25.10.2021 |
3. | Conference Only (without paper presentation) |
INR 2000 |
15.12.2021 |
4. | Conference (without paper presentation) + workshop |
INR 3000 |
15.12.2021 |
5. | Workshop Only |
INR 1500 |
15.12.2021 |
# | Payment Details |
|
---|---|---|
1. | Bank Account number |
1481267367 |
2. | Beneficiary Name |
PSG Center for Nonformal and Continuing Education |
3. | Address |
Peelamedu, Coimbatore - 641004 |
5. | Bank Name |
Central Bank of India |
5. | IFSC Code |
CBIN0280913 |
6. | SWIFT Code |
CBININBBOSB |
1. Receipt of the conference / workshop link.
2. Permission to attend all the plenary talks of the conference / workshop.
3. Attendance / presentation certificate
Cyber-Physical System
13.12.2021
&
14.12.2021
VIRTUAL
Distinguished Visiting Professor
Tsinghua University
Board of Governors, Digital University Kerala
ACM Fellow, IEEE Fellow,
Retired IBM Fellow
Director
Data science
Workday
Dept of ECE
IIIT, Sri City
Lead Engineer
Cyber Security and Cyber Defense of Critical Infrastructures
Indian Institute of technology, Kanpur
HSE University
Moscow, Russia
Dept of CSE
IIIT, Kalyani