Objective

The primary objective of the International Conference on Emerging Trends in Cybersecurity (ICETCS 2026) is to provide a global platform for researchers, academicians, industry professionals, and policymakers to converge, share insights, and collaboratively explore the latest advancements and emerging trends in the field of cybersecurity. This conference aims to facilitate discussions on cutting-edge research, innovative technologies, and practical solutions that address the evolving challenges posed by cyber threats in our interconnected world. By fostering interdisciplinary dialogue and knowledge exchange, the conference aims to contribute to the development of robust cybersecurity strategies, enhance collaboration between academia and industry, and ultimately strengthen collective resilience against cyber threats on a global scale. Please Note: All accepted papers will be published in Lecture Notes in Electrical Engineering which is the Scopus-indexed proceedings with Springer.

Join Us

The conference invites high-quality papers in the broad areas related to ubiquitous intelligence in cyber security, cyber security challenges, cyber intelligence, analytics, and Blockchain technology from different layers of a network, cloud security and big data, and the people towards the Cyber Space. Proposals for tutorials, special sessions, workshops, forums, demos, exhibitions are also extremely welcome.

Major Tracks

Hacking

Phishing

Supply Chain Risks

Man-in-the-Middle Attack

DNS Tunnelling

Malware and Ransomware

DoS and DDoS

Cloud and Insider Threats

Cybersecurity Awareness

Expert Support in Cybersecurity

Updating Systems and software

Prevent Database Exposure

Spyware

Strategic Threat Intelligence

Tactical Threat Intelligence

Operational Threat Intelligence

Technical Threat Intelligence

Information Gathering

Sniffing

Spoofing

Structured Query Language (SQL) Injection

Ransomeware

Scamming

Exploitation of Devices or Networks

Automatic License Plate Recognition

Automatic Traffic Control Signals and System

Digital Control System of networks in Tunnels

Passenger Announcement System

Guideway Intrusion Detection System

Closed-Circuit Television with Cyber Defence Solutions

Ticketing System

Access Control System

Distributed Control System and Operations Zone

Sensor Jamming

Blinding

Spoofing,

Saturation

Information Disclosure of Sensitive Personal and AI Data

DDoS Attacks

Manipulation of Communication Equipment

State of Cloud Security

Manual Configurations

No Disaster Recovery Plan

Domain Hijacking

Inventory Management

Bad Logging and Monitoring

Misconfigured Networks

Broken Access Control

Improper Use of Default Configs

Publicly Accessible Storage

Insecure Developer Credentials

Theories of blockchain and distributed ledger technology

New blockchain architecture

Distributed consensus and fault tolerance mechanisms

Security privacy and trust of blockchain and distributed ledger technology

Decentralization, scalability, and security tradeoff

Performance analysis and optimization

Simulation and performance evaluation techniques

Smart contract and chain code

Applications and services based on blockchain

Protocols and algorithms based on blockchain

Challenges and Solutions in IoT Device Security

Cybersecurity in IoT-enabled Cyber-Physical Systems Securing Social Networks within IoT Frameworks

IoT Supply Chain Security and Blockchain Integration

Ensuring Cyber Resilience in IoT Agriculture Systems

Security Measures for Connected and Autonomous Vehicles

Crowdsourcing and Crowdsensing Security in IoT Environments

Securing Mobile Cellular Networks in IoT Landscapes

Edge and Cloud Computing Security for IoT Infrastructure

Next-Generation Communications and Networks Security in IoT

Cryptocurrency Security in IoT Transactions

Artificial Intelligence and its Role in IoT Security

Game Theory Applications for IoT Cybersecurity

Industry 4.0 Security Challenges in IoT Implementations

Cyber resilience of satellite and ground-segment systems

Detection of jamming and spoofing in GNSS and satellite communications

Secure architectures for LEO

MEO

GEO satellite constellations

AI and machine learning for space cyber threat detection

Zero-trust frameworks for space-ground integration

Secure space-based IoT and inter-satellite communication

Space situational awareness and cyber-physical protection

Policy, regulation, and international cooperation in space cybersecurity

Quantum-resistant cryptography for satellite systems

Risk assessment and digital twin modelling for space security

Cyber-Physical Vehicular Health Monitoring Systems (CP-VHMS)

AI-ML-driven anomaly detection in CAN

Automotive Ethernet, and V2X networks

Intrusion Detection and Prevention Systems (IDS or IPS) for in-vehicle networks

Secure Over-the-Air (OTA) update mechanisms

Edge and Fog computing architectures for vehicular cybersecurity

Digital twins for vehicle security and predictive maintenance

Resilient V2X communication protocols (5G

6G-enabled ITS)

Cyber resilience modelling for autonomous and electric vehicles

Integration of safety and security co-design (ISO 21434, UNECE WP.29)

Blockchain and distributed trust mechanisms for vehicle data integrity

Threat modelling and risk assessment for intelligent transportation systems

Paper Submission

"The Microsoft CMT service was used for managing the peer-reviewing process for this conference. This service was provided for free by Microsoft and they bore all expenses, including costs for Azure cloud services as well as for software development and support."

A. SUBMISSION DEADLINE:

All papers to ICETCS 2026 must be submitted through the Microsoft CMT Service (Submission Link). The Initial Paper Submission deadline is July 31, 2026. All accepted papers will be submitted for publication in the Scopus Indexed proceedings with Springer.

B. PREPARATION OF MANUSCRIPT:
Abstract:
The abstract should clearly summarize the paper's objectives, methods, key findings, and significance in a single paragraph, typically within 150–250 words, which will be included in the Conference Proceedings if the paper is accepted.

Summary: Manuscripts for Springer proceedings should adhere to the provided template, ensuring consistent formatting, including font size, margin settings, and section styles. Authors must include a concise title, author details, an abstract, keywords, and clearly organized content with sections such as introduction, methodology, results, and conclusion. Figures, tables, and references should be formatted according to Springer’s guidelines, ensuring high-quality visuals and proper citation styles. In exceptional circumstances, authors must contact the publication chair Dr. Arafatur Rahman (email: [email protected]) and an extra charge will be applied for each page.

Double-Blind Paper: The authors should not include their names, affiliations, postal addresses, and email addresses in the initial manuscript.

Manuscript Template: Submissions must follow standard SPRINGER conference templates (not more than 15 pages). The manuscript template is also available at the following linksManuscript Guideline

C. PLAGIARISM & MULTIPLE SUBMISSION POLICY
Plagiarism: All papers submitted to ITSS-IoE 2026 for publication must present original, unpublished work. Any suspected cases of plagiarism will be addressed in accordance with the ICETCS 2025 and Springer policies on plagiarism, copyright infringement, moral rights violations, and simultaneous submissions to multiple publication outlets.
Springer’s policy on plagiarism can be accessed under the Springer Policy on Plagiarism.

Multiple Submissions: ICETCS 2026 and Springer strictly prohibit manuscripts submitted to the conference proceedings from being simultaneously under review for any other conference, journal, or publication outlet. If a case of multiple submissions is confirmed, the manuscript(s) will be promptly rejected for publication by ICETCS 2026 and Springer, and appropriate disciplinary actions will be taken.

Springer’s policy on multiple submissions can be found under the Springer Policy on Multiple Submissions.

D. COPYRIGHT
All accepted papers will be submitted for publication in the Scopus-indexed proceedings with Springer, who will hold the copyright for the conference publication. A separate Springer copyright form will need to be completed for each individual paper.

Download Copyright form: SPRINGER Copyright form

Registration

Registration will be announced shortly. Please always keep on update with any news through our website. Registration fees are stated below. Any requirement please do contact us.

Local Fees: EUR 400

Overseas Fees: EUR 400

Local Fees: EUR 450

Overseas Fees: EUR 450

Event Speakers / meet with greaters

Dr Ihsan Ullah

Assistant Professor

University of Galway

Dr. Kim-Kwang Raymond Choo

Professor

University of Texas at San Antonio, U.S.

Mario Marchese

Professor

University Genoa, Italy

Prof. Dr Md Arafatur Rahman

Professor in Cybersecurity and Communication Networks

University of Wolverhampton

Event Organizer

Organising Committee

Prof. Dr. Prashant Pillai, Pro Vice-Chancellor for Research and Knowledge Exchange and Director of Wolverhampton Cyber Research Institute, University of Wolverhampton, UK

Prof. Dr. Mohammed Atiquzzaman, Hitachi Chair, Presidential Professor of Computer Science, University of Oklahoma and Advisor of RITECHs, UK

Prof Mario Marchese, University of Genoa, Italy

Prof. Dr. Arafatur Rahman, University of Wolverhampton, UK

Prof. Dr. Kim-Kwang Raymond Choo, University of Texas at San Antonio, U.S.

Prof. Fabio Patrone, University of Genoa, Italy

Dr. Giovanni Gaggero, University of Genoa, Italy

Dr. Shancang Li, Cardiff University, UK

Dr Nazmul Hussain, University of Nottingham

Dr. Zakirul Alam Bhuiyan, Fordham University, USA

Ihsan Ullah, National University of Ireland, Galway, Ireland

Rashed Al Amin, University of Siegen, Germany

Jasim Uddin, Cardiff Metropolitan University, UK

Dr Adeel Rafiq, University of Wolverhampton, UK

Dr. S M Nazmus Sadat, Uttara University, Bangladesh,

Dr. Muhammad Kamran Naeem, Lecturer in Computer Science, University of Northampton, UK

Dr Zeeshan Ahmad, University of Wolverhampton, UK

Hai Tao, Baoji University of Arts and Science, China

Dr Manimuthu, Aston University, Aston University, UK

Nour Moustafa, UNSW, Australia

Dr. A. Taufiq Asyhari, Monash University, Australia

Xiaokang Wang, St. Francis Xavier University, Canada

Dr. Ahmad Firdaus bin Zainal Abidin, Universiti Malaysia Pahang Al-Sultan Abdullah , Malaysia

Andultahman Ahmed Mohammed Al-Sewari, Universiti Malaysia Pahang, Malaysia

Dr Muhammad Kamran Naeem, University of Northampton, UK

Taha Hussein Rassem (TPC Co-Chair), Universiti Malaysia Pahang, Malaysia

Celia Shahnaz, Bangladesh University of Engineering & Technology(BUET), Bangladesh

Lounis Chermak, University of London (Birkbeck College), UK

Paul Yoo, University of London (Birkbeck College), UK

B.K. Kaushik, IIT Roorkee, India

Debajani Mitra, IIT(ISM) Dhanbad, India

Mohammad M. Hassan, King Saud University, Riyadh, KSA

Xiong Li, Hunan University of Science and Technology, China

Zubair Md. Fadlullah, Tohoku University, Sendai, Japan

Khoirul Anwar, Telkom University, Indonesia

Valentina E. Balas, Aurel Vlaicu university of Arad, Romania

Musfiq Rahman, Thompson Rivers University, Canada

Mohd Mawardi Bin Saari, Universiti Malaysia Pahang, Malaysia

Roshahliza M Ramli, Universiti Malaysia Pahang, Malaysia

Sikder M Kamruzzaman, Ryerson University, Canada

Eklas Hossain, Oregon Institute of Technology, USA

Mohammad Osiur Rahman, University of Chittagong, Bangladesh

Ganesh Gopal, Galgotias University, India

Anton Satria Prabuwono, King Abdulaziz University, Saudi Arabia

Deepak Gupta, Maharaja Agrasen Institute of Technology, Delhi, India

Waheb AbdulJabar, Universiti Malaysia Pahang, Malaysia

Muhammad Akmal Bin Ramli, University Malaysia Kelantan, Malaysia

Syifak Izhar Hisham, Universiti Malaysia Pahang, Malaysia

Belal Abdullah Al-Fuhaidi, University of Science and Technology, Yemen

Ashish Khanna, Maharaja Agrasen Institute of Technology, Delhi, India

Gandeva Bayu Satrya, Telkom University, Indonesia

Vitaliy Mezhuyev, FH JOANNEUM University of Applied Sciences, Austria

Krishna Kant Singh, GL BAJAJ Institute of Technology and Management, Greater Noida, India

B. Balamurugan, Galgotias University, India

Akansha Singh, Galgotias University, India

Nadia Refat, Universiti Malaysia Pahang, Malaysia

Safwan Mahmood Yahya Ghaleb, University Malaysia Terengganu, Malaysia

Ramdan bin Razali, RiTECHS, Malaysia

Ihsan Ullah, National University of Ireland, Galway, Ireland

Dr. Md Saiful Azad, Green University, Bangladesh

Subrta Chowdhury, SVCET Engineering college Andra Pradesh, India

Eklas Hossain, Oregon Institute of Technology, USA

DR. MOHD FAIZAL BIN AB RAZAK, Universiti Malaysia Pahang Al-Sultan Abdullah , Malaysia

Dr. Muhammad Ajmal Azad, Birmingham City University, UK

Mohammed Jumah Alenazi, King Saud bin Abdulaziz University, Saudi Arabia

Dr. Syifak Izhar, Universiti Malaysia Pahang, Malaysia

Dr Abdul Ghani, De Montfort University, UK

Dr Faisal Saeed, Birmingham City University, UK

Dr Mohemed Farah, Birmingham City University, UK

Essa Q. Shahra, Birmingham City University, UK

Dalia Elbanna, Birmingham City University, UK

Haitham Mahmoud, Birmingham City University, UK

Fuad Ghaleb, Birmingham City University, UK

Junaid Arshad, Birmingham City University, UK

Edlira Vakaj, Birmingham City University, UK

Dr Raouf Abozariba, Birmingham City University, UK

Abdurrahman Alsewari , Birmingham City University, UK

Muhammad Towfiqur Rahman, University of Asia Pacific, Bangladesh

Dr Kashinath Basu, Oxford Brookes University, UK

Md Omar Faruqe, University of Wolverhampton, UK

Prof. Umer Rana, Cardiff University, UK

Md Mustafizur Rahman, Universiti Malaysia Pahang

Hamdan Bin Daniyal, Universiti Malaysia Pahang

Sabira Khatun, RiTECHS

Md Rafiqul Islam, International Islamic University Malaysia

A. H. M. Zahirul Alam, International Islamic University Malaysia

Naveen Chilamkurt, SMIEEE La Trobe University, Melbourne, Australia

Dr Andrew Gascoyne, University of Wolverhampton, UK

Dr Consolee Mbarushimana, University of Wolverhampton, UK

Dr Joseph Kaberuka, University of Wolverhampton, UK

Dr Muhammad Amjad, University of Wolverhampton, UK

Dr Salman Arif, University of Wolverhampton, UK

Dr Amin Noroozi Fakhabi, University of Wolverhampton, UK

Dr Anirban Chakraborty, University of Wolverhampton, UK

Dr Atiku Abubakar, University of Wolverhampton, UK

Contact Us / lorem ipsum