WorldCIS-2015. World Congress on Internet Security


Notification and Preliminary Call for Papers

The World Congress on Internet Security (WorldCIS-2015) is Technical Co-sponsored by IEEE UK/RI Computer Chapter. The WorldCIS is an international refereed conference dedicated to the advancement of the theory and practical implementation of security on the Internet and Computer Networks. The inability to properly secure the Internet, computer networks, protecting the Internet against emerging threats and vulnerabilities, and sustaining privacy and trust has been a key focus of research. The WorldCIS aims to provide a highly professional and comparative academic research forum that promotes collaborative excellence between academia and industry.

The objectives of the WorldCIS are to bridge the knowledge gap between academia and industry, promote research esteem and to fostering discussions on information technologies, information systems and global security applications. The WorldCIS-2015 invites speakers and researchers to submit papers that encompass conceptual analysis, design implementation and performance evaluation. All submitted papers are peer-reviewed (blind reviewed).

Topics of Interest

Original papers are invited on recent advances in Internet, Computer Communications and Networking Security. The topics in WorldCIS-2015 include but are not confined to the following areas:

Access Control

  • Accountability
  • Anonymity
  • Application security
  • Attacks and defenses
  • Authentication
  • Censorship and censorship-resistance
  • Distributed systems security
  • Embedded systems security
  • Intrusion detection
  • Language-based security
  • Malware
  • Metrics
  • Network security
  • Privacy-preserving
  • Resource usage control
  • Security for mobile computing
  • Security models
  • systems Protocol security
  • Secure information flow
  • Security and privacy policies
  • Security architectures
  • System security
  • Usability and security
  • Web security

Internet Application and Technology

  • Internet Architecture and Technologies
  • Anonymity and Privacy
  • Artificial Intelligence and Expert Systems
  • Network security
  • Broadband Access Technologies
  • Application Agents
  • Boundary Issues of Internet Security
  • Database Management
  • Data Models for Production Systems and Services
  • Data Provenance
  • Defence Systems Internet Security
  • Electronic voting
  • Embedded Systems
  • IPSec Quality of Service
  • Knowledge Management
  • Modeling and verifying
  • Security, Trust and Privacy
  • Self-Organizing Networks
  • Sensor nets and embedded systems
  • Service overlays
  • Switches and switching
  • Topology characterization and Inference
  • Traffic Measurement and Analysis
  • Traffic Engineering and Control
  • Data Security
  • Virtual and Overlay Networks
  • Quantification of Integrity

Cyber Security and Cyber warfare

  • Surveillance Systems
  • Cyber Warfare Trends and Approaches
  • Social engineering
  • Template Protection and Liveliness detection
  • New theories and algorithms in biometrics
  • Formal Methods Application in Security
  • Operating Systems and Database Security
  • nterprise Systems Security
  • SCADA and Embedded systems security
  • Distributed and Pervasive Systems Security
  • Secure Software Development

Information Security

  • Biometrics
  • Chaos-based Data Security
  • Cryptography
  • Collaborative Learning
  • Cyber Security Congestion control
  • Content Distribution
  • Cross Layer Design and Optimization
  • Cyber-physical computing/networking
  • Distributed Systems Security
  • Information flow monitor
  • Language-based security
  • Network Security Issues and Protocols
  • Security Challenges and Content Authoring
  • Secure Communications
  • Authentication Techniques
  • MANET Security
  • Wireless Sensor Network Security
  • Organization Considerations in Security Policy
  • Digital Forensics and Crimes
  • Formulation and Implementations
  • Geographic information systems
  • Privacy Protection
  • Regulations
  • Quantitative Information Flow

Multimedia and Web Services

  • Intelligent Multimedia and its Data Management
  • Multimedia Information Systems
  • Multimedia Security
  • Web Databases
  • Web Metrics and its Applications
  • Web Mining including Web Intelligence and Web 3.0.
  • XML and other extensible languages
  • Semantic Web and Ontology
  • Web services and performance
  • Secured Database Systems
  • Security in Data Mining
  • Defence Systems
  • Virtual Reality
  • Hardware-Based Security
  • Trust and trust management

Electronic Society

  • Trust, Privacy and Data Security
  • Anonymity, Pseudonymity, and Unlinkability
  • data Correlation and Leakage Attacks
  • Privacy Enhancing Technologies
  • Wireless Privacy
  • User Profiling
  • Information Dissemination Control
  • Dynamic vs. Static Flow-Sensitive Security Analysis

Digital Forensic

  • Data leakage and Database forensics
  • Forensics of Virtual and Cloud Environments
  • Network Forensics and Traffic Analysis
  • Information Hiding
  • File System and Memory Analysis
  • Executable Content and Content Filtering
  • Anti-Forensics Techniques
  • Malware forensics
  • Evidentiary Aspects of Digital Forensics
  • Large-Scale Investigations
  • New threats and Non-Traditional approaches
  • Incident Handling and Penetration Testing

Network Security

  • Ad hoc Mobile Networks Security
  • Addressing and Location Management
  • Broadband Access Technologies
  • Blended Internet Security Methods
  • Boundary Issues of Internet Security
  • Capacity Planning
  • Cellular and Broadband Wireless Nets
  • Complex systems and complexity
  • Formal verification of privacy for RFID systems
  • Optical Networks
  • Middleware Support for Networking
  • Mobility Models and Systems
  • Multicast and Anycast
  • Multimedia Protocols and Networking
  • Network Applications and Services
  • Network Architectures
  • Network Simulation and Emulation
  • Novel Network Architectures
  • Network and Protocol Architectures
  • Peer-to-Peer Communications
  • Performance Evaluation
  • Power Control and Management
  • Protocols and Standards
  • Resource Allocation and Management
  • Wireless Mesh Networks and Protocols

Ubiquitous Computing

  • Context-Awareness and its Data Mining for UbiCom
  • Data Grids
  • Distributed Information Systems
  • Forensic in Ubi-com
  • Human-Computer Interface and Interaction for UbiCom
  • Ubiquitous Systems
  • USN/RFID Service
  • UbiCom Service Business Model
  • Data Management for UbiCom
  • Peer to Peer Data Management
  • Ubiquitous Application
  • Delay/disruption tolerant networks
  • End Users
  • Enabling Technologies for the Internet
  • Implementation and Experimental Testbeds
  • Quality of Service Issues 

Cloud Security

  • Secure Virtual Infrastructure and Private Cloud
  • Cryptographic Enforcement of Multi-Tenancy
  • Cloud Requirements for PaaS and SaaS
  • Security Policy and Privacy Requirements
  • CloudAudit Protocol
  • Corporate Governance
  • Laws and Regulations
  • Threats, Vulnerabilities, and Risk Management
  • Disaster Recovery Planning
  • Critical Infrastructure Protection
  • Digital Rights Management
  • Security Policies and Trust Management
  • Identity Management
  • Decidability and Complexity
  • Economics of Security
  • Fraud Management

Smart City

  • Smart Cities Strategic Sustainability Challenge
  • Cyber security challenges
  • Security Design and Applications

Research in Progress

Undergraduates, Graduates/Postgraduates and Professionals are encourage to submit ongoing research work in future Internet Security Design and Applications.


Panel Discussion

Proposals from those who would like to facilitate a panel discussion are welcomed. The proposals may address any of the topics falling within the scope of the conference themes.

Panel Discussions provide an opportunity for public discussion amongst a selected group of panelists. Central to the success of a panel discussion is the choice of a good topic as the focus for discussion and panellists who bring differing perspectives and are confident in making clear arguments in a live situation. Panels should comprise of three to five scholars who present their arguments; a discussant offers critical comment on the arguments made and the discussion is opened up to the participating audience.

The proposal must include:

• Title
• Panel Chair(s) (if necessary)
• Speakers Name, Affiliation and Email
• Scope
• Objective and motivation

The WorldCIS-2015 will set aside space for those who wish to pursue discussion of a particular topic or issue. Interested individuals should submit a proposal not more than 400 words, on or before September 30th, 2015. In addition, the proposal should indicate the duration of the panel discussion (preferred duration is 90 minutes).

All accepted Panel Discussion proposal will be published in the Conference Proceedings. If you are interested in organising Panel Discussion for the WorldCIS-2015, please email your proposal to the Submissions should be in MS Word format.


Virtual Presentation (Video Conferencing)

We understand that some presenters will not be able to make the trip to Ireland to present their research paper, case study, work in progress and report, mainly due to financial and/or political restrictions on travel. The WorldCIS-2015 has therefore instituted a virtual presentation system to allow the authors of accepted papers the same publication opportunities as regular presenters. A research works submitted without the participant attending the Conference in person, but presented via video conferencing are refereed and published (if accepted) in the conference proceedings.

You can submit a research paper, case study, work in progress and report for virtual presentation under the open call for papers via email to


Journal Publications

All the accepted papers will appear in the proceedings and modified version of selected papers will be published in special issues peer reviewed journals.

Journal of Internet Technology and Secured Transactions (JITST) International Journal of Intelligent Computing Research (IJICR) International Journal for Information Secured (IJISR) International Journal for Digital Society (IJDS) International Journal for Infonomics Journal of IT Professional (JITP)


Who should attend the WorldCIS?

Undergraduates, Graduates/Postgraduates, researchers and Professionals who are working or studing Internet Security, Cyber Security, Information Security, Smart Cities, Computer Forencis, Information Technology, Computer Sciencis Laboratory.

Professionals and researchers responsible for security governance of information, IT security, researchers in organizations that deploy compliance of cybersecurity standards and guidelines.

Developers of cybersecurity standards and guidelines for a private and public sectors.

The information securty engineers, technicians, IT security professionals, IT management, automation and control project managers, IT security auditors, compliance officers, cybersecurity planners, critical infrastructure protection specialists; vendors and assessors of security solutions.



Subscribe For WorldCIS Newsletter


Technical Co-Sponsored by

IEEE UK/RI Computer Chapter


Infonomics Society

Media Partners



Canadian Teacher Magazine




Can your organisation sponsor WorldCIS? If YES,
contact us and your organisation active logo will be display on this window...!


Copyright © WorldCIS Privacy Policy