5th International Conference on
Computational Intelligence, Cyber Security and Computational Models (ICC3 - 2021)

16th-18th December 2021
Department of Applied Mathematics and Computational Sciences


Theme:  Recent Trends in Computational Models, Intelligence and Security Systems


Submission Closed

10th August, 2021

Notification of Acceptance Deadline

27th September, 2021

Registration Starts

11th October, 2021

Camera Ready Paper Deadline

25th October, 2021

Registration Closes

15th December, 2021


Shri. L. Gopalakrishnan

Chief Patron

PSG College of Technology

Dr. K. Prakasan


PSG College of Technology

Dr. R. Nadarajan

Organizing Chair

PSG College of Technology

Dr. R Indhumathi

Program Chair

PSG College of Technology

Prof. Andrew H Sung

Program Co-Chair

The University of Southern Mississippi, USA

Prof. Manuel Grana

Track Co-Chair

Group Faculty of Informatics UPV/EHU, Spain

Dr. G. Poonthalir

Computational Intelligence Track Chair

PSG College of Technology

Dr. V. Suresh kumar

Cyber Security
Track Chair

PSG College of Technology

Dr. R. Latha

Computational Models
Track Chair

PSG College of Technology


Prof. S. Lakshmivarahan

University of Oklahoma, USA

Prof. Mika Sato-Ilic

University of Tsukuba,

Dr. Sateesh K Peddoju

IIT Roorkee, India

Dr. R. Anitha

Visiting Professor
 Department of AMCS

PSG College of Technology, India

Dr. G. Sai Sundara Krishnan

Department of AMCS

PSG College of Technology, India

Dr. N. Geetha

Department of AMCS

PSG College of Technology, India

Dr. R.S. Lekshmi

Department of AMCS

PSG College of Technology, India

Dr. M. Senthilkumar

Department of AMCS

PSG College of Technology, India

Prof. Manu Malek

Alcatel-Lucent Bell Labs, New Jersey



  • Prof. Andrew H. Sung
    The University of Southern Mississippi, USA
  • Dr. Natarajan Meghanathan
    Jackson State University, Mississippi, USA
  • Dr. Sridhar Venkatesan
    Peraton Labs, New Jersay, USA
  • Prof. Ng Kok Why
    Multimedia University, Malaysia
  • Dr. Srinivas Chakravarthy
    Kettering University, Flint, Michigan, USA
  • Dr. Kurunathan Ratnavelu
    University of Malaya, Kuala Lumpur, Malaysia
  • Dr. Sadagopan Narasimhan
    IIITDM, Kanchipuram, India
  • Dr. M Sashi
    NIT Warangal, India
  • Dr. H. S. Ramane
    Karnatak University, Dharwad, India
  • Mr.Manish Shukla
    TCS Innovation Labs, Pune, India
  • Dr. P. Balasubramaniam
    Gandhigram Rural University, India
  • Dr. A. Kandasamy
    NIT Suratkal, India
  • Dr. Uma Maheswari
    PSGCT, India
  • Dr. Masilamani
    IIITDM, India
  • Dr. N P Gopalan
    NIT Trichy, India
  • Dr. Chandra E
    Bharathiyar University, India
  • Dr. C. Mala
    NIT Trichy, India
  • Dr. R. Ramanujam
    IMSc, Chennai, India
  • Dr. M. Sethumadhavan
    Amritha Vishwa Vidyapeetham University, Coimbatore, India
  • Dr. G. Sethuraman
    Anna University, Chennai, India
  • Dr. Larisa Ivascu
    Universitatea Politehnica Timisoara, UPT Romania
  • Dr. Goi Bok Min
    Universiti Tunku Abdul Rahman, Malaysia
  • Dr. Logeswaran N. Rajasvaran
    Asia Pacific University, Malaysia
  • Prof. Sucheng Haw
    Multimedia University, Malaysia
  • Prof. Alexander Gelbukh
    Instituto Politécnico Nacional (IPN), Mexico
  • Dr. Dariusz Jacek Jakóbczak
    Koszalin University of Technology, Poland
  • Dr. Adrian Fiech
    Memorial University, St. John's, NL, Canada
  • Prof. Rufus O. Oladele
    University of Ilorin, Ilorin, Nigeria
  • Prof. Kevin Curran
    Ulster University, Ireland
  • Prof. Rein Nobel
    Vrije University, Amsterdam
  • Prof. K. S. Sridharan
    Sri Sathya Sai Institute of Higher Learning, India
  • Prof. Chandrasekharan 
    NITK, India
  • Dr. R. B. V. Subramanyam
    NIT Warangal, India
  • Dr. B. H. Shekar
    Mangalore University, Karnataka, India
  • Dr. Meenakshi D'Souza,
    IIIT Bangalore, India
  • Dr. Elizabeth Sherly
    IIITM Trivandrum, India
  • Dr. J. BaskarBabujee
    Anna University, Chennai, India
  • Dr. Gnanavel S
    Central University of Kerala, India
  • Prof. U Dinesh Kumar
    IIM Bangalore, India
  • Dr .C. Mala
    NIT Trichy, India
  • Dr. G. Sai Sundarakrishnan
    PSGCT, India
  • Dr. Shivashankar B. Nair
    IIT Guwahati, India
  • Dr. Latha Parameswaran
    Amritha Vishwa Vidyapeetham University, Coimbatore, India
  • Dr. Rishi Ranjan Singh
    IIIT Allahabad, India
  • Dr. Ashok kumar M
    IIT Palakad, India
  • Prof. Sabayasachi Dutta
    University of of Calgary, Canada 
  • Prof. Manu Malek
    Alcatel-Lucent Bell Labs, New Jersey, USA
  • Dr. Surya Prasath
    University of Cincinnatti, USA
  • Dr. Xiaochun Cheng
    Middlesex University, London, UK
  • Dr. Anand Nayyar
    Duy Tan University, Da Nang, Vietnam
  • Prof. Mika Sato-Ilic
    University of Tsukuba, Japan
  • Prof. Gyoo-Soo Chae
    Baekseok University, Korea
  • Dr. Anton Satria Prabuwono
    King Abdulaziz University, Saudi Arabia
  • Dr. Ruhul Amin
    IIIT NayaRaipur, India
  • Dr. S K Hafizul Islam
    IIIT Kalyani, India
  • Dr. M P Singh
    NIT Patna, India
  • Dr. B. K. Tripathy
    VIT Vellore, India
  • Dr. S. Lavanya
    IIT BHU, Varanasi, India
  • Dr. Aswani Kumar Cherukuri
    VIT Vellore, India
  • Dr. M. Senthilkumar
    PSGCT, India
  • Dr. R. B. V. Subramanyam
    NIT Warangal, India
  • Dr. Ashok Kumar Das
    IIIT Hyderabad, India
  • Dr. K. Murugesan
    NIT Trichy, India
  • Dr. PVSSR Chandramouli
    Central University of  Tamil Nadu, India
  • Dr. Debashish Jena
    NITK, India
  • Dr. Somasundaram K
    Amritha Vishwa Vidyapeetham University, Coimbatore, India
  • Dr C Pandurangan
    IIT Madras, India
  • Dr. Ram Bilas Pachori
    IIT Indore, India
  • Dr. Phalguni Gupta
    IIT Kanpur, India
  • Dr. G. Sudha Sadasivam
    PSGCT, India
  • Prof. Gerald Penn
    University of Toronto, Ontario, Canada


Prof. Henning Fernau


University of Trier, Germany

Prof. Rufus Oladele

Visiting Fellow

University of Ilorin, Nigeria

Prof. Kevin Curran


Ulster University, Northern Ireland

Dr. Ivan Garibay


University of Central Florida, USA

Prof. Hans van Ditmarsch


Open University of the Netherlands, The Netherlands

Prof. Wulfram Gerstner


Swiss Federal Institute of Technology, Switzerland

Prof. Manuel Grana

Visiting Fellow

University of Basque County, Spain

Prof. Manu Malek

Visiting Fellow

Alcatel-Lucent Bell Labs, New Jersey, USA

Prof. Salil Kanhere


University of New South Wales, UNSW, Sydney, Australia

Prof. Sven Groppe


University of Lübeck, Germany

Prof. Mika Salto-Ilic


University of Tsukuba, Japan

Prof. Andrew H Sung


University of Southern Mississippi, USA

Prof. Peter Grünwald


Institute for Math & Computer Sci (CWI), The Netherlands

Prof. Rein Nobel


Vrije University, Amsterdam, Netherlands

Prof. Sivaguru Sritharan


Applied Optimization Inc, Ohio, USA

Dr Satnam Singh

Chief Data Scientist

Acalvio Technologies

Prof. S. Lakshmivarahan


University of Oklahoma, USA



We enthusiastically encourage prospective authors to submit an electronic version of their original research papers that contain contributions of theoretical, experimental or application nature using EasyChair.The conference is organized in three tracks Computational Models, Computational Intelligence and CyberSecurity with the theme "Recent Trends in Computational Models, Intelligence and Security Systems" and will feature distinguished invited speakers in each track.

Computational Models
Computational Modelling formulates and models real-world problems, then uses computing to develop solutions Computational models have an influential role in developing and understanding complex systems with the support of mathematics, physics and computer simulation. Computational models help various stakeholders of the system to visualize, predict, optimize, regulate and control complex systems using high-end computing technology. Computational models evolve over time, as abstractions are introduced to eliminate unnecessary details and clarify the important design. Computational modelling and simulation methods can be developed for a vast range of science and engineering disciplines and far beyond.

Computational Intelligence
Computational Intelligence is a set of nature inspired computational methodologies and techniques to address complex real world problems. It encompasses neural networks, fuzzy logic and evolutionary computation as its main key elements. It is an evolving field and many computing paradigms including ambient intelligence, cultural learning and deep learning constitute the main core of computational intelligence. The aim of computational intelligence is to develop a new arena for analyzing and creating effective processing elements with adequate knowledge on sensing, interpreting, learning, thinking and remembering to aid intuitive information processing systems.

Cyber Security is becoming an increasingly central facet of national security strategy and a lot of people are working collectively in the field of Cyber Security. Both the private and public sectors are relying on cybersecurity. Securing network and information systems are essential to keeping the online economy in shape and to ensure progress. The rise of new technologies and changing norms of remote working are increasingly opening a Pandora's Box of critical infrastructure vulnerabilities. Being aware of potential cybersecurity threats, building a threat-resistant and agile infrastructure and adoption of best practices to mitigate operational hiccups and security risks are the most pertinent needs of every application sector. Security for Cyber Physical Systems, Networking protocols, Botnets and Malware, Intrusion detection, Data privacy, Authentication and Cryptanalysis are the core research areas in the field of cyber security.

Developing models of computation with intelligence and security form a basis of the theory of computational methods. Hence, the three areas namely computational intelligence, computational models and cyber security become inter-related under the umbrella of computational methods.

Papers are solicited from industry, government and academia (including students) covering relevant research, technologies, methodologies, tools and case studies. The aim of this conference series is to bring to the front the novel ideas in the theory and progress of cybersecurity, computational advancement for modelling and intelligence inorder to achieve a major breakthrough, practical improvements and new research directions. The topics listed below are meant to indicate the breadth of the area and are definitely not to be considered exhaustive


  • Bioinfomatics
  • Computer Vision
  • Data Mining
  • Decision Support Systems
  • Evolutionary Computation
  • Formal Language
  • Fuzzy systems
  • Human-Computer Interaction
  • Information Retreival
  • Machine Learning
  • Natural Language Processing
  • Nature and Bio inspired Computing
  • Neural Networks
  • Pattern Recognition


  • Applied Cryptography
  • Authentication and Data Privacy
  • Cryptanalysis 
  • Cloud/Web/Wireless Security
  • Data and Application Security
  • Digital Rights Management
  • Digital Forensics
  • Formal Methods in Security
  • Intrusion Detection/Prevention
  • Information Security in IoT
  • Malware and Botnets
  • Mobile System Security
  • Security for Smart Grid Communication
  • Security of Cyber-Physical Systems
  • Trustworthy Data Collection in IoT 


  • Agent Based Models
  • Cloud Computing
  • Combinatorial Optimization
  • Computational Geometry
  •   Complex Network Models
  • Digital Topology
  • Database Models
  • Deep Learning Models
  • Graph Models
  • Membrane Computing
  • Predictive Models
  • Stochastic Models
  • Theory of Computation
  • Quantum Computing

The submitted paper must be substantially original work, which has neither been published before nor is under review for any other conference or journal. The ICC3 strictly prohibits any plagiarism. The ICC3 retains the right to eliminate any paper in violation of these requirements and to exclude the author(s) of such papers from future ICC3 conferences. On the basis of double blind review process, selected papers recommended by the Review Committee, would be compiled in a proceeding. It is planned to publish the peer reviewed and selected papers of conference as proceedings with Springer in their prestigious Communications in Computer and Information Science series.


The accepted papers will be published in "Communications in Computer and Information Science CCIS" (conditionally approved) of Springer which is indexed in DBLP, Google Scholar, Scopus (Elsevier) etc.

Papers submitted in English will be reviewed. Only Adobe Portable Document Format (PDF) will be accepted for submission and review. Other formats will automatically be rejected by the EasyChair.

Authors are kindly requested to make sure that all equations, tables and figures are embedded in the PDF file.

Please submit your paper only through EasyChair by clicking here


Paper should be organized in the following order

For more details, please refer https://www.springer.com/gp/computer-science/lncs/conference-proceedings-guidelines

Blinded Title Page:
For all new submissions and revisions, the first page of the manuscript should be a blinded title page (author(s) names and affiliations should be removed).

Separate (Un-Blinded) Title Page
The separate un-blinded title page should include

Main Text
Headings and Subheadings in the text indicate the organisation of content. As a general principle, please do not use more than three levels of displayed headings. Since manuscripts are evaluated through an anonymous peer review process, authors must remove identifying references or material.

Acknowledgments (where applicable)
Acknowledgments of people, grants, funds, etc. should be placed in a separate section before the reference list. The names of funding organisations should be written in full, and for the purposes of the blind peer-review process, acknowledgements should not violate the anonymity of the author (i.e., avoid acknowledgments in the format of “Thank you to my institution [x] and colleagues [name], [name]…)

References follow the text in a separate section headed “REFERENCES” using APA citation style. All references cited in the text must be listed in the reference section, and vice versa. Publication information for each must be complete and correct. It is the author's responsibility to make sure that all information provided in the reference section is complete and correct.


# Purpose of Registration
1. Conference Only (with paper presentation)
INR 3500
2. Conference (with paper presentation)+workshop
INR 4500
3. Conference Only (without
paper presentation)
INR 2000
4. Conference (without
paper presentation) + workshop
INR 3000
5. Workshop Only
INR 1500
# Payment Details
1. Bank Account number
2. Beneficiary Name
PSG Center for Nonformal
and Continuing Education
3. Address
Peelamedu, Coimbatore - 641004
5. Bank Name
Central Bank of India
5. IFSC Code
6. SWIFT Code
Registration amount of conference / workshop is NOT refundable and it includes

           1. Receipt of the conference / workshop link.

           2. Permission to attend all the plenary talks of the conference / workshop.

           3. Attendance / presentation certificate

Register yourself by clicking here: https://forms.gle/D4HMwKfhRXkqfVw86




Cyber-Physical System








Dr. C. Mohan

Distinguished Visiting Professor
Tsinghua University

Board of Governors, Digital University Kerala
ACM Fellow, IEEE Fellow,
Retired IBM Fellow

Dr. Arun Krishnaswamy


Data science

Prof. Hrishikesh Venkatraman

Dept of ECE

IIIT, Sri City

Mr. Rohit Negi

Lead Engineer

Cyber Security and Cyber Defense of Critical Infrastructures
Indian Institute of technology, Kanpur

Dr. Anand Mahendran

HSE University

Moscow, Russia

Dr. SK Hafizul Islam

Dept of CSE

IIIT, Kalyani