2023 7th IEEE Congress on Information Science and Technology (CiSt 2023)
2023/12/16 - 2023/12/22
Essaouira
会议详情

2023 7th IEEE Congress on Information Science and Technology (CiSt 2023)

2023年第7届IEEE信息科学与技术大会(CiSt 2023)


 Important Dates:

Paper Submission Deadline:May 7, 2023

Notification of Acceptance:June 25, 2023

Date of the meeting:December 16-22, 2023

Location : Essaouira, Morocco


Conference introduction:

The IEEE CiSt Congress has developed into a premier INTERNATIONAL event held in Morocco and which encompasses focused CONFERENCES that gather the best scientists and world class experts to share leading edge and multidisciplinary research in various fields related to information science and technology. The congress is co-sponsored by the IEEE Morocco Section, IEEE Region8, IEEE Africa Council and the IEEE Morocco Computer & Communication Joint Chapter. The 2023 seven edition will be held in Agadir - Essaouira, Morocco on December 2023. Accepted papers will be submitted for inclusion into IEEE Xplore subject to meeting IEEE Xplore’s scope and quality requirements.


Organizing Committee:


image.png

image.png

Call for Papers:

Evolution of Blockchain Technologies

Distributed Consensus Algorithms

Blockchain-Based Security Solutions

Scalability and Interoperability in DLTs

Sharding and Layer 2

Privacy Preserving Techniques in the Blockchain

Security of Smart contracts and dapps

Attacks and Defense Methods in Blockchain

Quantum-Resistant Cryptography for Blockchain

Blockchain-Based Energy Optimization Techniques in WSN

Blockchain-Based SDN for Secure Network Management and Control

AI for Cybersecurity

Blockchain for Federated Learning

AI for Blockchain-Based Security Systems

AI and Blockchain for Zero Trust Security

AI and Blockchain for Decentralised I&AM

Trust and Privacy in AI and Blockchain

Blockchain-Based Detection and Prevention with AI

Cyber Threat Intelligence and Response with Blockchain and AI

Secure Multi-party Computation with AI and Blockchain

Secure Hardware Enclave Design and Implementation for Cloud Security

Hardware Security Verification Techniques for Detecting Hardware Vulnerabilities

Secure Boot and Trusted Computing Platforms


Contact Us:

Authors can scan the code to add conference teachers and send IEEE for submission consultation咨询销售-廖舒淇.png


去登录