ICITST-2015. The International Conference for Internet Technology and Secured Transactions



London Pictures


The 10th International Conference for Internet Technology and Secured Transactions (ICITST-2015)

December 14-16, 2015, London, UK

Free Post-Conference London Tour (Travel Information)



Notification and Preliminary Call for Papers

The 10th International Conference for Internet Technology and Secured Transactions (ICITST-2015) is Technical Co-sponsored by IEEE UK/RI Computer Chapter. The ICITST is an international refereed conference dedicated to the advancement of theory and practical implementation of secured Internet transactions and to fostering discussions on information technology evolution. The ICITST aims to provide a highly professional and comparative academic research forum that promotes collaborative excellence between academia and industry.

The objectives of the ICITST are to bridge the knowledge gap between academia and industry, promote research esteem in secured Internet transactions and the importance of information technology evolution to secured transactions. The ICITST-2015 invites research papers that encompass conceptual analysis, design implementation and performance evaluation.

The topics in ICITST-2015 include but are not confined to the following areas:

Internet Application and Technology
  • Internet technologies
  • Internet Architecture
  • Internet of things
  • Broadband Access Technologies
  • Application Agents
  • Boundary Issues of Internet Security
  • Database Management
  • Data Models for Production Systems and Services
  • Artificial Intelligence and Expert Systems
  • IPSec Quality of Service
  • Knowledge Management
  • Embedded Systems
  • Defence Systems


Infonomics and e-Technology

  • Infonomics
  • Information Visualization
  • Information Management
  • Information Quality
  • Technology-Enabled Information
  • e-Learning
  • e-Commerce
  • e-Business
  • e-Government
  • e-Society
  • System Design and Security for e-Services
  • Synchronizing e-Security

Cyber Security and Cyber warfare

  • Surveillance Systems
  • Cyber Warfare Trends and Approaches
  • Social engineering
  • Template Protection and Liveliness detection
  • New theories and algorithms in biometrics
  • Formal Methods Application in Security
  • Operating Systems and Database Security
  • nterprise Systems Security
  • SCADA and Embedded systems security
  • Distributed and Pervasive Systems Security
  • Secure Software Development

Information Security

  • Collaborative Learning
  • Trust, Privacy and Data Security
  • Network Security Issues and Protocols
  • Security Challenges and Content Authoring
  • Cryptography
  • Secure Communications
  • Authentication Techniques
  • Chaos-based Data Security
  • MANET Security
  • Wireless Sensor Network Security
  • Organization Considerations in Security Policy Formulation and Implementations
  • Digital Forensics and Crimes
  • Biometrics
  • Cyber Security

Multimedia and Web Services

  • Intelligent Multimedia and its Data Management
  • Multimedia Information Systems
  • Multimedia Security
  • Web Databases
  • Web Metrics and its Applications
  • Web Mining including Web Intelligence and Web 3.0.
  • Web Services
  • XML and other extensible languages
  • Semantic Web and Ontology

Digital Forensic

  • Data leakage and Database forensics
  • Forensics of Virtual and Cloud Environments
  • Network Forensics and Traffic Analysis
  • Information Hiding
  • File System and Memory Analysis
  • Executable Content and Content Filtering
  • Anti-Forensics Techniques
  • Malware forensics
  • Evidentiary Aspects of Digital Forensics
  • Large-Scale Investigations
  • New threats and Non-Traditional approaches
  • Incident Handling and Penetration Testing

Ubi/Cloud Computing

  • Authentication and Access Control for Data Protection in Ubi/Cloud Computing
  • Context-Awareness and its Data Mining for UbiCom
  • Data Grids
  • Distributed Information Systems
  • Human-Computer Interface and Interaction for UbiCom
  • Ubiquitous Systems
  • USN/RFID Service
  • Smart Homes and its Business Model for UbiCom Service
  • Security and Data Management for UbiCom
  • Peer to Peer Data Management
  • New Novel Mechanism and Application for Ubi/Cloud Computing

Cloud Security

  • Secure Virtual Infrastructure and Private Cloud
  • Cryptographic Enforcement of Multi-Tenancy
  • Cloud Requirements for PaaS and SaaS
  • Security Policy and Privacy Requirements
  • CloudAudit Protocol
  • Corporate Governance
  • Laws and Regulations
  • Threats, Vulnerabilities, and Risk Management
  • Disaster Recovery Planning
  • Critical Infrastructure Protection
  • Digital Rights Management
  • Security Policies and Trust Management
  • Identity Management
  • Decidability and Complexity
  • Economics of Security
  • Fraud Management

Research in Progress

  • Ongoing research from undergraduates, graduates/postgraduates and professionals
  • Collaborative Research
  • Future Technologies

Panel Discussion

Proposals from those who would like to facilitate a panel discussion are welcomed. The proposals may address any of the topics falling within the scope of the conference themes.

Panel Discussions provide an opportunity for public discussion amongst a selected group of panelists. Central to the success of a panel discussion is the choice of a good topic as the focus for discussion and panellists who bring differing perspectives and are confident in making clear arguments in a live situation. Panels should comprise of three to five scholars who present their arguments; a discussant offers critical comment on the arguments made and the discussion is opened up to the participating audience.

The proposal must include:

  • Title
  • Panel Chair(s) (if necessary)
  • Speakers Name, Affiliation and Email
  • Scope
  • Objective and motivation

The ICITST-2015 will set aside space for those who wish to pursue discussion of a particular topic or issue. Interested individuals should submit a proposal not more than 400 words, on or before September 30, 2015. In addition, the proposal should indicate the duration of the panel discussion (preferred duration is 90 minutes).

All accepted Panel Discussion proposal will be published in the Conference Proceedings. If you are interested in organising Panel Discussion for the ICITST-2015, please email your proposal to the pandis@icitst.org. Submissions should be in MS Word format.


Virtual Presentation (Video Conferencing)

We understand that some presenters will not be able to make the trip to London to present their research paper, case study, work in progress and report, mainly due to financial and/or political restrictions on travel. The ICITST-2015 has therefore instituted a virtual presentation system to allow the authors of accepted papers the same publication opportunities as regular presenters. A research works submitted without the participant attending the Conference in person, but presented via video conferencing are refereed and published (if accepted) in the conference proceedings.

You can submit a research paper, case study, work in progress and report for virtual presentation under the open call for papers via email to papers@icitst.org


Journal Publications

All the accepted papers will appear in the proceedings and modified version of selected papers will be published in special issues peer reviewed journals.

Journal of Internet Technology and Secured Transactions (JITST) International Journal of Intelligent Computing Research (IJICR) International Journal for Information Secured (IJISR) International Journal for Digital Society (IJDS) International Journal for Infonomics Computers & Security (CS) Journal of IT Professional (JITP)


Who should attend the ICITST?

Undergraduates, Graduates/Postgraduates, researchers and Professionals who are working or studying Internet Security, Cyber Security, Information Security, Smart Cities, Access Control, Biometric System, Computer Forencis, Information Technology, Computer Science Laboratory, Ubi/Cloud Computing, Cloud Security, Internet Application and Technology, Multimedia and Web Services.

Professionals and researchers responsible for security governance of information, IT security, researchers in organizations that deploy compliance of cybersecurity standards and guidelines.

Developers of cybersecurity standards and guidelines for a private and public sectors.

The information securty engineers, technicians, IT security professionals, IT management, automation and control project managers, IT security auditors, compliance officers, cybersecurity planners, critical infrastructure protection specialists; vendors and assessors of security solutions.



Subscribe for ICITST Newsletter


Technical Co-Sponsored by

IEEE UK/RI Computer Chapter



Infonomics Society


Media Partners


Canadian Teacher Magazine

In Cooperation With


Brunel University




University of Nantes


College of Charleston

Previous Conference











Can your organisation sponsor ICITST? If YES, contact us and your organisation's active logo will be display on this window...!






Copyright © ICITST Privacy Policy