Submissions must adhere to the following guidelines:

  • Papers must be formatted using the LNNS format without altering margins or the font point.
  • The maximum length of a regular paper (including references) is 10 pages. Authors need to strictly follow the page length in the revised manuscript. 

All the authors need to submit CRC copy of their paper (both PDF and word and Latex files), Copyright form and other documents  on following email ID:

We solicit original research and technical papers not published elsewhere. The papers can be theoretical, practical and application oriented on the following conference tracks but not limited to:
    Track #1: Cyber Security and Privacy
    Track #2: Next Generation Computing and Networking Technology
    Track #3: Data Analytics and Cloud Computing
    Track #4: Artificial Intelligence and Machine Learning

ICSET Global is going to organize an International Conference on Cyber Security, Privacy and Networking (ICSPN 2021) in Virtual Format (due to the ongoing COVID19 pandemic) during September 17-19, 2021. The ICSPN 2021 aims to bring the researchers, academicians, industry, and government personnel together to share and discuss the various aspects of Cyber Security. The conference will witness multiple eminent keynote speakers from academia and industry from all over the world along with the presentation of accepted peer-reviewed articles. The scope of this conference encompasses, but is not restricted to, the following topics:

  • Security and Privacy
  • Authentication, Privacy and Security Models
  • Intelligent data analysis for Security
  • Big data intelligence in security and privacy
  • Deep Learning in security and privacy
  • Identity and Trust Management
  • Statistical learning for security and privacy
  • AI and Machine Learning for Security
  • Data mining for security and privacy
  • Computational intelligence in security and privacy
  • Intrusion, anomaly and fraud detection
  • Data-driven access control
  • Secure cloud computing
  • Secure multi-party computation
  • Data privacy
  • Sensitive data collection Privacy-preserving data mining
  • Privacy-preserving data publishing
  • Cloud Computing
  • Distributed Computing
  • Fog Computing
  • Mobile Computing
  • Cellular Network
  • Cognitive Network
  • Delay Tolerant Network
  • 4G/5G Networks
  • Satellite Communication
  • Group Communication
  • Radio Frequency Identification (RFID)
  • Neurocomputing
  • Big Data for Networks
  • Reliability and Robustness
  • Security and privacy of mobile cloud computing
  • Security, privacy and reliability issues of MCC and IoT
  • Security and privacy of IoT
  • Security and privacy management in MCC
  • MCC intrusion detection systems
  • Secure data management, data processing and analytics in Automotive
  • Security of pricing and billing for mobile cloud computing services
  • Security of mobile, peer-to-peer and pervasive services in clouds
  • Security of mobile commerce and mobile Internet of Things
  • Security of mobile social networks
  • Security and privacy in smartphone devices
  • Security and privacy in social applications and networks
  • Security of Mobile, peer-to-peer and pervasive services in clouds
  • Security of Mobile commerce and mobile internet of things
  • Security of Operating system and middleware support for mobile computing
  • Security and privacy in sensor networks
  • Security and privacy in social applications and networks
  • Web service security
  • Security of 3G/4G systems, Wi-MAX, Ad-hoc
  • Security of Mobile social networks
  • Near field communication services
  • Service-oriented architectures, service portability, P2P
  • Network virtualisation and cloud-based radio access networks
  • Cyber-Physical System and Cryptographic Algorithms
  • Trust Management
  • Authentication and Key Management
  • Blockchain
  • Public Key Infrastructure (PKI) and Quantum Cryptography
  • Web Security
  • Android Security
  • Vulnerability Assessment and Cyber Forensic
  • Secure Techniques for Big Data
  • Honeypot Technologies
  • Secure and privacy-preserving V2X communication in Automotive
  • Security in intelligent mobile App for transport service
  • Secure cloud/edge computing architectures for Automotive
  • Interoperable security for transport service platform
  • Location verification in Automotive
  • Secure sensor and RFID applications in Automotive
  • Security life-cycle management of cars
  • Secure over the air update of software
  • Cyber-security detection and prevention in Automotive
  • Critical infrastructures resilience and security in Automotive

Best Paper Award

The Organizing Committee will select three high-quality submissions for the Best Paper Award which includes:

  • Free Registration
  • Best Paper Award Certificate


All accepted and registered papers of ICSPN 2021 will be published by Springer in LNNS SeriesSelected best papers (more than 30 papers) presented at the conference, after further revision, will be published in special issues of various SCI/ESCI/WoS/Scopus/EI indexed journals