WorldCIS-2020 World Congress on Internet Security December 8 - 10, 2020 | London, UK Call for Speakers The WorldCIS-2020 Conference theme
is Cyber Security
Call for Speakers December 8 - 10, 2020 | London, UK
The WorldCIS-2020 Conference theme is
Cyber Security
Call for Speakers December 8 - 10, 2020 | London, UK


World Congress on Internet Security


Conference Venue

To Be Announced...!

Notification and Preliminary Call for Papers

The World Congress on Internet Security (WorldCIS) is an international refereed conference dedicated to the advancement of the theory and practical implementation of security on the Internet and Computer Networks. The inability to properly secure the Internet, computer networks, protecting the Internet against emerging threats and vulnerabilities, and sustaining privacy and trust has been a key focus of research. The WorldCIS aims to provide a highly professional and comparative academic research forum that promotes collaborative excellence between academia and industry.

The objectives of the WorldCIS are to bridge the knowledge gap between academia and industry, promote research esteem and to fostering discussions on information technologies, information systems and global security applications. The WorldCIS-2020 invites speakers and researchers to submit papers that encompass conceptual analysis, design implementation and performance evaluation. All submitted papers are peer-reviewed (blind reviewed).

Undergraduates, Graduates/Postgraduates, researchers and Professionals who are working or studying Internet Security, Cyber Security, Information Security, Smart Cities, Access Control, Bio-metric System, Computer Forensics, Information Technology, Computer Science Laboratory, Ubi/Cloud Computing, Cloud Security, Internet Application, Internet of Things (IoT) and Technology, Multimedia and Web Services.

Professionals and researchers responsible for security governance of information, IT security, researchers in organizations that deploy compliance of cyber security standards and guidelines.

The information security engineers, technicians, IT security professionals, IT management, automation and control project managers, IT security auditors, compliance officers, cyber security planners, critical infrastructure protection specialists; vendors and assessors of security solutions.

We listened to all the great feedback we received from last year’s attendees and have incorporated some of their suggestions into WorldCIS-2020. Explore highly relevant sessions, led by industry’s and academic top experts. The sessions will giving you the ability to dive deeper into a topic, ask more questions and interact more with presenters. Attend Keynotes. Be inspired by presentations from thought leaders representing a wide range of disciplines within and outside the cyber security. Share a common interest to explore a specific security topic.

Full Paper

You are allowed a total of 6 pages for your paper (including all figures, tables, and references). If you are planning to submit a Full Paper, you do not need to submit an Extended Abstract. You can submit it via email at or online (see Paper Submission)

Extended Abstract (Work in Progress)

The extended abstract should not exceed 2 pages (including introduction, body of knowledge and conclusion, supported by not more than 10 references). Please submit your extended abstract in PDF format at

Proposals from those who would like to facilitate a panel discussion are welcomed. The proposals may address any of the topics falling within the scope of the conference themes. Panel Discussions provide an opportunity for public discussion amongst a selected group of panelists. Central to the success of a panel discussion is the choice of a good topic as the focus for discussion and panellists who bring differing perspectives and are confident in making clear arguments in a live situation. Panels should comprise of three to five scholars who present their arguments; a discussant offers critical comment on the arguments made and the discussion is opened up to the participating audience. The proposal must include:

  • Title
  • Panel Chair(s) (if necessary)
  • Speaker(s) Name, Affiliation and Email
  • Scope
  • Objective and motivation

The WorldCIS-2020 will set aside space for those who wish to pursue discussion of a particular topic or issue. Interested individuals should submit a proposal not more than 400 words, on or before June 30, 2020. In addition, the proposal should indicate the duration of the panel discussion (preferred duration is 90 minutes). All accepted Panel Discussion proposal will be published in the Conference Proceedings. If you are interested in organising Panel Discussion for the WorldCIS-2020, please email your proposal to the Submissions should be in MS Word format.

We understand that some presenters will not be able to make the trip to London to present their research paper, case study, work in progress and report, mainly due to financial and/or political restrictions on travel. The WorldCIS-2020 has therefore instituted a virtual presentation system to allow the authors of accepted papers the same publication opportunities as regular presenters. A research works submitted without the participant attending the Conference in person, but presented via video conferencing are refereed and published (if accepted) in the conference proceedings. You can submit a research paper, case study, work in progress and report for virtual presentation under the open call for papers via email to

Topics in WorldCIS-2020

The topics in WorldCIS-2020 include but are not confined to the following areas:

  • Cyber Security
  • Surveillance Systems
  • Cyber Warfare Trends and Approaches
  • Social engineering
  • Template Protection and Liveliness detection
  • New theories and algorithms in biometrics
  • Formal Methods Application in Security
  • Operating Systems and Database Security
  • Enterprise Systems Security
  • SCADA and Embedded systems security
  • Distributed and Pervasive Systems Security
  • Secure Software Development
  • Accountability
  • Anonymity
  • Application security
  • Attacks and defenses
  • Authentication
  • Censorship and censorship-resistance
  • Distributed systems security
  • Embedded systems security
  • Intrusion detection
  • Language-based security
  • Malware
  • Metrics
  • Network security
  • Privacy-preserving
  • Resource usage control
  • Security for mobile computing
  • Security models
  • systems Protocol security
  • Secure information flow
  • Security and privacy policies
  • Security architectures
  • System security
  • Usability and security
  • Web security
  • Anonymity and Privacy
  • Application Agents
  • Artificial Intelligence and Expert Systems
  • Big Data
  • Data Security and Provenance
  • Boundary Issues of Internet Security
  • Broadband Access Technologies
  • Data Models for Production Systems and Services
  • Database Management
  • Defence Systems Internet Security
  • Electronic Voting
  • Embedded Systems
  • Internet Architecture and Technologies
  • Network Security 
  • Knowledge Management
  • Modeling and Verifying
  • Self-Organizing Networks
  • Sensor Nets and Embedded systems
  • Service Overlays
  • Switches and Switching
  • Topology Characterisation and Inference
  • Traffic Measurement and Analysis
  • Traffic Engineering and Control
  • Virtual and Overlay Networks
  • Data leakage and Database forensics
  • Forensics of Virtual and Cloud Environments
  • Network Forensics and Traffic Analysis
  • Information Hiding
  • File System and Memory Analysis
  • Executable Content and Content Filtering
  • Anti-Forensics Techniques
  • Malware forensics
  • Evidentiary Aspects of Digital Forensics
  • Large-Scale Investigations
  • New threats and Non-Traditional approaches
  • Incident Handling and Penetration Testing
  • Cloud Computing
  • Distributed and Parallel Systems
  • Embedded Computing
  • Grid Computing
  • High Performance Computing
  • Human-centred Computing
  • Large-scale Applications
  • Mobile Computing
  • Quantum Computing
  • Social Computing
  • Cognitive Radio
  • Communication Protocols
  • Connected Machines
  • 3G/4G Network Evolutions
  • Mobile Adhoc Networks
  • Networking
  • Open Spectrum Solutions
  • Satellite Communication Systems
  • Signal Processing
  • Wireless/ Mobile Communication
  • Advancing the Bitcoin User Experience
  • Bitcoin and Cryptocurrency Technologies
  • Bitcoin Threat Models
  • Blockchain Technology Developments
  • Crypto-Assets
  • Current State of Privacy in Bitcoin
  • Data Licensing
  • Digital Identity
  • Fintechs
  • Future Payment Implications
  • Hardware Wallets - General Attack Analysis
  • Stable Coins
  • Technical Principles of Bitcoin Wallets
  • The Current State of Bitcoin Fungibility
  • The Difficulties in Designing Protocols: Bitcoin vs Ethereum
  • The Great Industrialisation of Cryptocurreny Mining
  • The Privacy Issues and Blockchain
  • Biometrics
  • Chaos-based Data Security
  • Cryptography
  • Collaborative Learning
  • Cyber Security Congestion control
  • Content Distribution
  • Cross Layer Design and Optimization
  • Cyber-physical computing/networking
  • Distributed Systems Security
  • Information flow monitor
  • Language-based security
  • Network Security Issues and Protocols
  • Security Challenges and Content Authoring
  • Secure Communications
  • Authentication Techniques
  • MANET Security
  • Wireless Sensor Network Security
  • Organization Considerations in Security Policy
  • Digital Forensics and Crimes
  • Formulation and Implementations
  • Geographic information systems
  • Privacy Protection
  • Regulations
  • Quantitative Information Flow
  • Intelligent Multimedia and its Data Management
  • Multimedia Information Systems
  • Multimedia Security
  • Web Databases
  • Web Metrics and its Applications
  • Web Mining including Web Intelligence and Web 3.0.
  • XML and other extensible languages
  • Semantic Web and Ontology
  • Web services and performance
  • Secured Database Systems
  • Security in Data Mining
  • Defence Systems
  • Virtual Reality
  • Hardware-Based Security
  • Trust and trust management
  • Trust, Privacy and Data Security
  • Anonymity, Pseudonymity, and Unlinkability
  • data Correlation and Leakage Attacks
  • Privacy Enhancing Technologies
  • Wireless Privacy
  • User Profiling
  • Information Dissemination Control
  • Dynamic vs. Static Flow-Sensitive Security Analysis
  • Cyber Situation Awareness Tools and Techniques
  • Social Media Analysis
  • Collaborative Defences Approach
  • Risk Management, Governance and Compliance
  • Network Situation Awareness
  • Human Factor Cognitive
  • National and Critical Infrastructure Security Issues
  • Situation Awareness in Military Operations
  • Cyber Situation Awareness Frameworks
  • Fusion Centres
  • Situation Awareness Training
  • Decision Control
  • Preparedness and Readiness
  • Investigation Techniques
  • Digital Services
  • Protection of Digital Services
  • GeoIP Location Systems Attribution
  • Geo-Location of IP Networks
  • Geo-Location of Cyber Physical Systems
  • Geo-Location of Internet of Things (IoT)
  • GeoIP Enrichment Methods
  • GeoIP for Fraud Detection
  • Web Analytics
  • GeoIP Detection
  • Agents and Multi-agent Systems
  • Ambient Intelligence
  • Artificial Intelligence
  • Data Mining
  • Expert Systems
  • Fuzzy Logic
  • Natural Language Processing
  • Neural Networks
  • Sentiment Analysis
  • Support Vector Machines
  • Collaborative Learning
  • Curriculum Content Design
  • Delivery Systems and Environments
  • Educational Systems Design
  • E-Learning Organisational Issues
  • E-Learning Tools
  • Gamification
  • Mobile Learning
  • Virtual Learning Environments
  • Web-based Learning
  • Ethical Hackers
  • Ethical Hacking Methodology
  • Fingerprint and Enumerate Targets
  • Network Scanning and Sniffing
  • Pre-attack Reconnaissance
  • Preventing Cyber Attacks
  • Unethical Hacker
  • Vulnerability Assessments
  • Vectors Attack
  • Web Attacks (XSS, Directory Traversals and SQL Injection)
  • Ad hoc Mobile Networks Security
  • Addressing and Location Management
  • Broadband Access Technologies
  • Blended Internet Security Methods
  • Boundary Issues of Internet Security
  • Capacity Planning
  • Cellular and Broadband Wireless Nets
  • Complex systems and complexity
  • Formal verification of privacy for RFID systems
  • Optical Networks
  • Middleware Support for Networking
  • Mobility Models and Systems
  • Multicast and Anycast
  • Multimedia Protocols and Networking
  • Network Applications and Services
  • Network Architectures
  • Network Simulation and Emulation
  • Novel Network Architectures
  • Network and Protocol Architectures
  • Peer-to-Peer Communications
  • Performance Evaluation
  • Power Control and Management
  • Protocols and Standards
  • Resource Allocation and Management
  • Wireless Mesh Networks and Protocols
  • Context-Awareness and its Data Mining for UbiCom
  • Data Grids
  • Distributed Information Systems
  • Forensics in Ubi-com
  • Human-Computer Interface and Interaction for UbiCom
  • Ubiquitous Systems
  • USN/RFID Service
  • UbiCom Service Business Model
  • Data Management for UbiCom
  • Peer to Peer Data Management
  • Ubiquitous Application
  • Delay/disruption tolerant networks
  • End Users
  • Enabling Technologies for the Internet
  • Implementation and Experimental Testbeds
  • Quality of Service Issues
  • Secure Virtual Infrastructure and Private Cloud
  • Cryptographic Enforcement of Multi-Tenancy
  • Cloud Requirements for PaaS and SaaS
  • Security Policy and Privacy Requirements
  • CloudAudit Protocol
  • Corporate Governance
  • Laws and Regulations
  • Threats, Vulnerabilities, and Risk Management
  • Disaster Recovery Planning
  • Critical Infrastructure Protection
  • Digital Rights Management
  • Security Policies and Trust Management
  • Identity Management
  • Decidability and Complexity
  • Economics of Security
  • Fraud Management
  • Smart Cities Strategic Sustainability Challenge
  • Cyber security challenges
  • Security Design and Applications
  • Big Data
  • Blockchain
  • Data Analytics
  • Deep Learning
  • Digital Transformation
  • Information Society
  • Internet of Things
  • Smart Cities
  • Machine to Machine
  • Mobile Applications
  • Small World Concept
  • Software Engineering and Quality
  • Augmented Reality
  • Computer Vision
  • Geographic Information Systems
  • Human Computer Interaction
  • Image Processing
  • Medical Diagnosis
  • Segmentation Techniques
  • Robotics
  • Video Analysis
  • Virtual Reality
  • Analog Circuits & Signal Processing
  • Assembly and Packaging
  • Computer Aided Network Design
  • Digital Circuits
  • Design Automation
  • E-Waste
  • Green Computing
  • Sensing and Sensor Networks
  • Smart Grids
  • Systems Architectures

Journal Publications

All the accepted papers will appear in the proceedings and modified version of selected papers will be published in special issues peer reviewed journals.

Subscribe To Newsletter
Be the first to get latest updates and exclusive content straight to your email inbox.
Stay Updated
Give it a try, you can unsubscribe anytime.