CITS 2020: The 2020 International Conference on Computer, Information and Telecommunication Systems

October 5-7, 2020, Virtual Conference

About the Conference 🔗

CITS 2020 is over! See you in CITS 2021!

The 2020 International Conference on Computer, Information, and Telecommunication Systems, CITS 2020, is an international forum for scientists, engineers, and practitioners to present their latest research and development results in all areas of Computer, Information, and Telecommunication Systems, CITS.

The conference will feature tutorials, technical paper presentations, and distinguished keynote speeches. All accepted and presented papers will be published in the conference proceedings and submitted to IEEE Xplore digital library covered by Scopus and EI Compendex as well as other Abstracting and Indexing (A&I) databases.

Extended versions of selected accepted papers from the conference will be published in special issue(s)/Section(s) of International Journal of Communication Systems (SCI indexed) and Security and Privacy Journal (EI indexed).

The CITS 2020 Conference was planned to be held in Hangzhou, China on October 5-7, 2020. Given the COVID-19 pandemic and associated travel restrictions, as the safety of people is of the highest priority, CITS 2020 will be held virtually on October 5-7, 2020. Accepted papers for the CITS 2020 will be submitted for inclusion in IEEE Xplore Digital Library (covered by Scopus and EI Compendex) after they are presented at the virtual conference. Information and instructions on how to prepare for a virtual presentation will be sent separately. Registration fees for the CITS 2020 (Virtual Conference) have been substantially reduced.

Technical Sponsor

IEEE logo ComSoc logo

Important Dates

  • Invited session, workshop, tutorial proposals:
  • Paper submission:
  • Author notification:
  • Camera-ready paper submission:

You can download a one-page Call For Papers (CFP) as well as the General Chairs' Message and Conference Program (1.0 MB).

Paper Submission

Please, follow instructions given in the detailed final paper preparation and submission instructions (also in PDF format) available for authors.

Papers should be written in English with a maximum paper length of 5 printed pages (10-point font, A4 size paper) including figures. For your submission you can use the standard IEEE Transactions templates for Microsoft Word or LaTeX formats found at: (Remember: A4 size)

Papers must be submitted in Portable Document Format (PDF) format, using the following EDAS link (sign in or, if you do not have an EDAS account, sign up):

Important Notice:

Papers are reviewed on the basis that they do not contain plagiarized material and have not been submitted to any other conference at the same time (multiple submission). To learn more about this matter; visit:

Conference Registration

CITS 2020 Registration [Virtual Conference]

These are the available registration options. Authors can only register on-line with two payment options: credit card and bank wire (through EDAS). Registrations cover: Access to all technical sessions and keynote speeches, e-program and e-proceedings online.

Please read CANCELLATION POLICY below first before you pay for the registration.

CITS 2020 Registration [Virtual Conference] IEEE Member2Non-member2
Author Registration (for Student or Non-Student until September 11, 20201) €360€460
Extra Page Charge (for each page beyond 5 pages/paper) €60€60
  • All attendees at CITS 2020 should make the registration. To be published in the CITS 2020 Conference Proceedings and to be eligible for publication in IEEE Xplore, at least one author of an accepted paper is required to register for the conference at the FULL (member or non-member) registration rate.
  • One Full Registration covers a maximum of 2 papers (each paper up to 5 pages) but it must be under the same 'Registrant' and the Non-refundable registration fees must be paid by September 11, 2020.
  • Author Refunds: Authors who have registered their accepted paper are not eligible for refund if decided to withdraw their paper

1 Until/from 12am (midnight) EST

2 IEEE members must keep updated their society memberships in EDAS.

How to register for CITS 2020

  1. Go to the CITS 2020 Registration at EDAS (sign in or, if you do not have an EDAS account, sign up)
    • Members of IEEE must keep updated their society memberships in EDAS (check the "update your society memberships" link) in order to register with reduced charges
    • Please specify your dietary constraints or special needs in "My Profile"
  2. Click 'Icon' of Payment by Credit Cards or Bank Wire
  3. Enter necessary card details as well as VAT numbers or other details for your invoice; then click the button of 'PAY'
    • For Bank Wire, it takes a while for the EDAS system to update your payment status (Important Reminder: please pay 'All Bank's Charges If Any are To Be Born' by yourself!)
  4. Any problem occurs in EDAS, please Click 'Request help' (on the bottom line of the page) and EDAS staff will reply to you ASAP.

Organizing Committee 🔗

General Chairs

  1. Mohammad S. Obaidat,
    Univ. of Sharjah, UAE
  2. Jian Wan,
    Zhejiang Univ. of Science and Technology, Hangzhou, China
  3. Qing Wu,
    Hangzhou Dianzi Univ., Hangzhou, China

Executive General Chair

  1. Kuei-Fang (Leila) Hsiao,
    Univ. of Sharjah, UAE

Senior Program Chair

  1. Petros Nicopolitidis,
    Aristotle Univ., Greece

Program Chairs

  1. Congfeng Jiang,
    Hangzhou Dianzi Univ., China
  2. Honghao Gao,
    Shanghai Univ., Shanghai, China
  3. Christophe Cerin,
    Univ. of Paris XIII, Paris, France
  4. Imad Mahgoub,
    Florida Atlantic Univ., USA
  5. Neeraj Kumar,
    Thapar Institute of Engineering & Technology, India
  6. Zhaolong Ning,
    Dalian Univ. of Technology, China

Local Arrangement Chairs

  1. Jingsheng Lei,
    Zhejiang Univ. of Science and Technology, China
  2. Youhuizi Li,
    Hangzhou Dianzi Univ., China

Local Arrangement Committee

  1. Jilin Zhang,
    Hangzhou Dianzi Univ., China
  2. Lei Zhang,
    Zhejiang Univ. of Science and Technology, China
  3. Gangyong Jia,
    Hangzhou Dianzi Univ., China
  4. Wujie Zhou,
    Zhejiang Univ. of Science and Technology, China
  5. Kangkang Li,
    Hangzhou Dianzi Univ., China
  6. Weifeng Ma,
    Zhejiang Univ. of Science and Technology, China
  7. Hanfei Lv,
    Zhejiang Police Vocational Academy, China
  8. Wenmin Lin,
    Hangzhou Dianzi Univ., China
  9. Ruiqin Yang,
    Zhejiang Univ. of Science and Technology, China
  10. Liangbin Zhang,
    Zhejiang Wanli Univ., China

Publicity Chairs

  1. Yuyu Yin,
    Hangzhou Dianzi Univ., China
  2. Pedro Cardenas Canto,
    Durham Univ., UK
  3. Woosung Jung,
    Seoul National Univ. of Education, South Korea
  4. Lei Shu,
    Nanjing Agricultural Univ., China
  5. Moi Hoon Yap,
    Manchester Metropolitan Univ., UK
  6. Seungmin (Charlie) Rho,
    Sungkyul Univ., Korea
  7. Xiaochen Lai,
    Dalian Univ. of Technology, China
  8. Hongzhen Shi,
    Yunnan Minzu Univ., China
  9. Sofiane Hamrioui,
    Univ. of Nantes, France
  10. Nitin Gupta,
    National Institute of Technology, Hamirpur, India

Publication Chairs

  1. Daniel Cascado,
    Univ. of Seville, Spain
  2. Guo Yu,
    Univ. of Science and Technology Beijing, China

International Liaisons

  1. Sang-Soo (Martin) Yeo,
    Mokwon Univ., Korea
  2. Balqies Sadoun,
    Univ. of Sharjah, UAE
  3. Hong Ji,
    BUPT, China
  4. Helen Karatza,
    Aristotle Univ., Greece
  5. Haifeng Wu,
    Yunnan Minzu Univ., China

Registration Chair

  1. Kuei-Fang (Leila) Hsiao,
    Univ. of Sharjah, UAE

Finance Chair

  1. Kasim Al-Aubidy,
    Philadelphia Univ., Jordan
  2. Kuei-Fang (Leila) Hsiao,
    Univ. of Sharjah, UAE


  1. Antonio Bueno,
    Univ. of Girona, Spain

Steering Committee 🔗

  • Franco Davoli, Univ. of Genoa, Italy
  • Pascal Lorenz, Univ. of Haute Alsace, France
  • Mohammad S. Obaidat, Univ. of Sharjah, UAE (Chair)
  • Jose L. Sevillano, Univ. of Seville, Spain
  • George A. Tsihrintzis, Univ. of Piraeus, Greece
  • Laurence T. Yang, St. Francis Xavier Univ., Canada

Program Committee 🔗

  • Hamid Arabnia, Univ. of Georgia
  • Gagangeet Aujla, Newcastle Univ.
  • Giulio Bartoli, Univ. of Florence
  • Georgia Beletsioti, Aristotle Univ. of Thessaloniki
  • Jalel Ben Othman, CentraleSupélec & Univ. of Sorbonne Paris Nord
  • Abderrahim Benslimane, Univ. of Avignon
  • Patrick Bours, Norwegian Univ. of Science and Technology
  • Christian Callegari, RaSS National Laboratory - CNIT
  • Luca Caviglione, National Research Council (CNR)
  • Ashok Kumar Das, International Institute of Information Technology, Hyderabad
  • Franco Davoli, Univ. of Genoa
  • Tomaso De Cola, German Aerospace Center (DLR)
  • Gianluigi Ferrari, Univ. of Parma
  • Mario Freire, Univ. of Beira Interior
  • Christos Goumopoulos, Univ. of the Aegean
  • Fabrizio Granelli, Univ. of Trento
  • Jose Luis Guisado, Univ. de Sevilla
  • Georgios Kambourakis, Univ. of the Aegean
  • Helen Karatza, Aristotle Univ. of Thessaloniki
  • Abdelmajid Khelil, Landshut Univ. of Applied Sciences
  • Xiong Li, Hunan Univ. of Science and Technology
  • Jaime Lloret, Univ. Politecnica de Valencia
  • Pascal Lorenz, Univ. of Haute Alsace
  • Valeria Loscrí, Inria Lille-Nord Europe
  • Malamati Louta, Univ. of Western Macedonia
  • Raimundo Macedo, UFBA
  • Imad Mahgoub, Florida Atlantic Univ.
  • Mario Marchese, Univ. of Genoa
  • Sudip Misra, Indian Institute of Technology-Kharagpur
  • Farid Nait-Abdesselam, Univ. of Missouri Kansas City
  • Jianwei Niu, Beihang Univ.
  • Panagiotis Papadimitriou, Univ. of Macedonia
  • Tommaso Pecorella, Univ. degli Studi di Firenze
  • Jun Peng, UTRGV - Edinburg, TX
  • Sophia Petridou, Univ. of Macedonia
  • Kostas Psannis, Univ. of Macedonia
  • Gianluca Reali, Univ. of Perugia
  • Joel Rodrigues, Federal Univ. of Piauí (UFPI)
  • Balqies Sadoun, Univ. of Sharjah, UAE
  • Angel-Antonio San-Blas, Univ. of Elche
  • Dimitrios Stratogiannis, National Technical Univ. of Athens
  • Sudeep Tanwar, Institute of Technology Nirma Univ. Ahmedabad Gujarat
  • John Vardakas, IQUADRAT Informatica S. L. Barcelona
  • P. Venkata Krishna, Sri Padmavati Mahila Univ.
  • Demosthenes Vouyioukas, Univ. of the Aegean
  • Gang Wang, PCTEL, Inc.
  • Jay Wang
  • Bernd Wolfinger, Univ. of Hamburg
  • Tin-Yu Wu, National Ilan Univ.
  • Yueshen Xu, Xidian Univ.
  • Laurence T. Yang, St. Francis Xavier Univ.
  • Sang-Soo Yeo, Mokwon Univ.
  • Sherali Zeadally, Univ. of Kentucky

Keynote Speakers 🔗

Deep Learning Platform for B5G Mobile Network


Photo of Han-Chieh Chao

Han-Chieh Chao received his M.S. and Ph.D. degrees in Electrical Engineering from Purdue University, West Lafayette, Indiana, in 1989 and 1993, respectively. He is currently a professor with the Department of Electrical Engineering, National Dong Hwa University, where he also serves as president. He was the Director of the Computer Center for Ministry of Education Taiwan from September 2008 to July 2010. His research interests include IPv6, Cross-Layer Design, Cloud Computing, IoT, and 5G Mobile Networks. He has authored or co-authored 4 books and has published about 400 refereed professional research papers. He has completed more than 150 MSEE thesis students and 11 Ph.D. students. Dr. Chao has been invited frequently to give talks at national and international conferences and research organizations. He serves as the Editor-in-Chief for the Institution of Engineering and Technology Networks, the Journal of Internet Technology, the International Journal of Internet Protocol Technology, and the International Journal of Ad Hoc and Ubiquitous Computing. He is a Fellow of IET (IEE) and a Chartered Fellow of the British Computer Society. Due to Dr. Chao's contribution of suburban ICT education, he has been awarded the US President's Lifetime Achievement Award and International Albert Schweitzer Foundation Human Contribution Award in 2016.


The 3G and 4G mobile communications had been developed for many years. The 5G mobile communication is scheduled to be launched in 2020. In the future, a wireless network is of various size of cells and different type of communication technologies, forming a special architecture of Heterogeneous Networks (HetNet). Under the complex network architecture, interference and handover problems are critical challenges in access network. How to efficiently manage small cells and to choose an adequate access mechanism for the better quality of service is a vital research issue. Traditional network architecture can no longer support existing network requirements. It is necessary to develop a novel network architecture. Therefore, this keynote speech will share a solution of deep learning-based B5G mobile network which can enhance and improve communication performance through combing some specific technologies. e.g., deep learning, fog computing, cloud computing, cloud radio access network (C-RAN) and fog radio access network (F-RAN).

Autonomic Cyber Security (ACS) - The Next Generation of Self Protection Systems and Services


Photo of Salim Hariri

Salim Hariri is a Professor in the Department of Electrical and Computer Engineering at The University of Arizona. He received his Ph.D. in computer engineering from University of Southern California in 1986, and an MSc from The Ohio State University in 1982. He is the director of NSF Center for Cloud and Autonomic Computing and he is the Editor-In-Chief for the CLUSTER COMPUTING JOURNAL (Springer, Research interests include Cybersecurity modeling and analysis, resilient cyber resources and services, and high performance distributed systems.

Dr. Hariri is a founder of AVIRTEK, a startup Cybersecurity company from the NSF CAC center at UA. AVIRTEK received more than 7.00 million dollars in DoD funding to develop innovative autonomic cyber security products and services. He has lead the development of AVIRTEK AIM products that are currently being deployed commercially.


The increased dependence on cyber systems in business, finance, government and education make them prime targets for cyberattacks due to the profound and catastrophic damage these attacks might inflict on our economy and all aspects of our life. It is widely recognized that cyber resources and services can be penetrated and exploited. Furthermore, it is widely accepted that the cyber resilient techniques are the most promising solutions to mitigate cyber attacks and change the game to advantage the defender over the attacker. In this presentation, I will present an approach based on biological systems to develop autonomic cybersecurity technologies that will significantly change how we manage, secure and protect cyber resources and services. Our approach is based on autonomic computing (self-manage systems with little or no involvement from users or system administrators), data mining, and anomaly behavior analysis techniques. The main building component to implement Autonomic Cyber Security (ACS) are: 1) Innovative data structures (cyber-DNAs) to accurately detect current operational state of any cyber system and predict its behavior in the near future; 2) Anomaly Behavior Analysis (ABA) methodology that can detect with high accuracy and almost no false alarms any anomalous behavior triggered by cyberattacks, faults (hardware or software) and accidents (malicious or natural); and 3) Self-Management Engine to deliver automated and semi-automated actions so we can proactively stop or mitigate the impacts of cyberattacks. I will show through several examples how to apply ACS to secure and protect a wide range of cyber systems and applications.

Lightweight Security Schemes for IoT Healthcare applications


Photo of Mohsen Guizani

Mohsen Guizani (S'85-M'89-SM'99-F'09) received the B.S. (with distinction) and M.S. degrees in electrical engineering, the M.S. and Ph.D. degrees in computer engineering from Syracuse University, Syracuse, NY, USA, in 1984, 1986, 1987, and 1990, respectively. He is currently a Professor at the Computer Science and Engineering Department in Qatar University, Qatar. Previously, he served in different academic and administrative positions at the University of Idaho, Western Michigan University, University of West Florida, University of Missouri-Kansas City, University of Colorado-Boulder, and Syracuse University. His research interests include wireless communications and mobile computing, computer networks, mobile cloud computing, security, and smart grid. He is currently the Editor-in-Chief of the IEEE Network Magazine, serves on the editorial boards of several international technical journals and the Founder and Editor-in-Chief of Wireless Communications and Mobile Computing journal (Wiley). He is the author of nine books and more than 600 publications in refereed journals and conferences. He guest edited a number of special issues in IEEE journals and magazines. He also served as a member, Chair, and General Chair of a number of international conferences. Throughout his career, he received three teaching awards and four research awards. He is the recipient of the 2017 IEEE Communications Society Wireless Technical Committee (WTC) Recognition Award, the 2018 AdHoc Technical Committee Recognition Award for his contribution to outstanding research in wireless communications and Ad-Hoc Sensor networks and the 2019 IEEE Communications and Information Security Technical Recognition (CISTC) Award for outstanding contributions to the technological advancement of security. He was the Chair of the IEEE Communications Society Wireless Technical Committee and the Chair of the TAOS Technical Committee. He served as the IEEE Computer Society Distinguished Speaker and is currently the IEEE ComSoc Distinguished Lecturer. He is a Fellow of IEEE and a Senior Member of ACM.


Internet of Things (IoT) is transforming our society and daily lives by connecting the world. This is expected to fundamentally transform industry, business, transportation and healthcare. However, this ubiquitous connection brings with it many challenges that range from security, scalability, data analytics, to device-level protocols. It is estimated that there will be hundreds of billions of IoT devices that need to be connected in the next few years. In addition, more than half of the world's population live in cities, many with multiple devices that need to be connected to the Internet. This is expected to create a complex infrastructure. These smart services rely on computation and communication resources. Furthermore, being able to provide adequate services using these complex systems present enormous challenges.

In this Keynote, we review the current efforts by experts around the world to mitigate some of these challenges. Then, we showcase our research activities to contribute to these efforts and advocate possible solutions using AI and other tools. We provide ways on how to manage the available resources intelligently and efficiently in order to offer better living conditions and provide better services. Finally, we discuss some of our research results to support a variety of applications including how to secure these devices for successful healthcare service delivery in different aspects.

Advanced architectures of Next Generation Wireless Networks


Photo of Pascal Lorenz

Pascal Lorenz ( received his M.Sc. (1990) and Ph.D. (1994) from the University of Nancy, France. Between 1990 and 1995 he was a research engineer at WorldFIP Europe and at Alcatel-Alsthom. He is a professor at the University of Haute-Alsace, France, since 1995. His research interests include QoS, wireless networks and high-speed networks. He is the author/co-author of 3 books, 3 patents and 200 international publications in refereed journals and conferences. He was Technical Editor of the IEEE Communications Magazine Editorial Board (2000-2006), IEEE Networks Magazine since 2015, IEEE Transactions on Vehicular Technology since 2017, Chair of IEEE ComSoc France (2014-2018), Financial chair of IEEE France (2017-2019), Chair of Vertical Issues in Communication Systems Technical Committee Cluster (2008-2009), Chair of the Communications Systems Integration and Modeling Technical Committee (2003-2009), Chair of the Communications Software Technical Committee (2008-2010) and Chair of the Technical Committee on Information Infrastructure and Networking (2016-2017). He has served as Co-Program Chair of IEEE WCNC'2012 and ICC'2004, Executive Vice-Chair of ICC'2017, TPC Vice Chair of Globecom'2018, Panel sessions co-chair for Globecom'16, tutorial chair of VTC'2013 Spring and WCNC'2010, track chair of PIMRC'2012 and WCNC'2014, symposium Co-Chair at Globecom 2007-2011, Globecom'2019, ICC 2008-2010, ICC'2014 and '2016. He has served as Co-Guest Editor for special issues of IEEE Communications Magazine, Networks Magazine, Wireless Communications Magazine, Telecommunications Systems and LNCS. He is associate Editor for International Journal of Communication Systems (IJCS-Wiley), Journal on Security and Communication Networks (SCN-Wiley) and International Journal of Business Data Communications and Networking, Journal of Network and Computer Applications (JNCA-Elsevier). He is senior member of the IEEE, IARIA fellow and member of many international program committees. He has organized many conferences, chaired several technical sessions, and gave tutorials at major international conferences. He was IEEE ComSoc Distinguished Lecturer Tour during 2013-2014.


Internet Quality of Service (QoS) mechanisms are expected to enable widespread use of real time services. New standards and new communication architectures allowing guaranteed QoS services are now developed. We will cover the issues of QoS provisioning in heterogeneous networks, Internet access over 5G networks and discusses most emerging technologies in the area of networks and telecommunications such as IoT, SDN, Edge Computing and MEC networking. We will also present routing, security, baseline architectures of the inter-networking protocols and end-to-end traffic management issues.

Topics of Interest 🔗

Track I: Computer Systems

  • Cloud computing
  • Cloud management
  • Cloud services
  • Computer architectures
  • Computer hardware technology
  • Computer-aided designs and technology
  • Display technology
  • Digital circuits, systems and logic design
  • Embedded systems
  • Evolutionary algorithms and computing
  • Fuzzy systems and fuzzy logic
  • Green computing
  • Grid computing and architectures
  • Hardware and software co-design
  • High-performance computing
  • Input/Output systems
  • Low-power computer technology
  • Memory systems
  • Mobile computing
  • Modeling and simulation
  • Object Oriented Languages
  • Operating system and middleware for mobile computing and networking
  • Performance evaluation
  • Pervasive computing
  • Real-time systems and simulations
  • Reconfigurable computing
  • System integration
  • Systems on chip (SoC)
  • Scientific computing algorithms
  • Soft computing
  • Software design, verification and validation
  • Software performance and engineering
  • Social networking and computing
  • VLSI design

Track II: Information Technology

  • Agents and multi-agents systems
  • Artificial intelligence and expert systems
  • Adaptive learning automata
  • Bioinformatics and biological computing and engineering
  • Database and data warehouses
  • Data mining
  • Future web
  • e-Government
  • e-Commerce
  • e-Health
  • e-Learning and adaptive learning
  • Geographical information systems (GIS)
  • Global positioning systems (GPS)
  • Human-computer interaction (HCI)
  • Network systems, proxies and servers
  • Neural networks
  • Protocols and standards
  • RF technology and control error correction
  • Signal and image processing
  • System engineering
  • Telematics
  • Web-Based Simulation Applications

Track III: Web Technologies

  • Accessibility issues and Technology
  • Data Fusion
  • Digital Libraries
  • Content transformation and adaptation in proxy server
  • Metadata and metamodeling
  • Multimedia
  • Ontology and semantic web
  • Personalized web sites/Web site classification and optimization
  • Portal strategies
  • Quality recommendation for software service provisioning
  • Service oriented architecture
  • System integration
  • User modeling
  • Usability and ergonomics
  • Web analytics
  • Web services and engineering
  • Web interfaces and applications
  • Web searching, browsing and ranking
  • Web information retrieval
  • Web intelligence
  • Web performance measurement, modeling and caching
  • XML and data management

Track IV: Networking Systems

  • Bio-inspired and nature-inspired solutions in wireless ad hoc and sensor networks
  • Broadband access technologies
  • Cognitive radio
  • Cross-layer design for mobile and wireless networks
  • Dynamic spectrum management
  • Disruption tolerant networks
  • Energy-efficient networks
  • Future Internet
  • Hybrid networks
  • Medium access control protocols
  • Network management
  • Network services and protocols
  • Optical networks
  • Opportunistic networks
  • Personal area networks
  • Performance-oriented design and evaluation focused on networks and mobile applications
  • Quality of service provisioning
  • Routing protocols
  • Sensor networks
  • Smart grids
  • Testbed design and implementation
  • Traffic Eng. & measurements
  • Under water networks
  • 60 GHz networking
  • Wireless networks

Track V: Telecommunication Systems

  • Adaptive communications
  • Channel estimation
  • Cognitive vehicular ad hoc networks
  • Cooperative communications
  • Channel coding
  • Interference management
  • Massive MIMO systems
  • Modulation techniques
  • MIMO systems
  • Novel applications enabled by telecommunication networking systems
  • OFDM communications
  • Power line communication
  • Satellite communication
  • Spread-spectrum communications
  • UWB communications
  • Wireless broadcasting
  • Wireless communication

Track VI: Security Systems

  • Authentication and access control
  • Biometrics systems
  • Computer and communication security
  • Cryptography and cryptanalysis
  • Digital watermarking, fingerprinting, and traitor tracing schemes
  • Detection analysis and prevention of malware
  • Denial of service issues
  • Intrusion detection systems
  • Information systems security
  • Keystroke dynamic systems
  • Multimedia security
  • Network security
  • Network systems forensics
  • Operating systems security
  • Program security
  • Physical security
  • Privacy enhancing technologies
  • Public-key infrastructure systems
  • Quantum cryptography
  • Security of e-Systems and applications
  • Security modeling, tools & simulation
  • Security of personal area networks
  • Security of WiFi and WiMax systems
  • Security of web systems
  • Secure PHY and MAC protocols
  • User & location privacy
  • Virtual Private Network systems
  • Vulnerability and Virus analysis
  • Vulnerability and attack modeling
  • Web security and privacy
  • Web-based application security

Promote CITS 2020 🔗

Help to promote CITS 2020

Help us make CITS 2020 a success!

More attendees means better discussions and a richer experience for everyone.

  • Pass the word about CITS 2020 to your colleagues and friends and encourage them to participate or simply attend
  • Announce CITS 2020 through your contacts, mailing lists, blogs, newsgroups and online forums

Linking to the conference website

You can use the following code to link to us from your site:

<a href="" title="2020 International Conference on Computer, Information and Telecommunication Systems - October 5-7, 2020, Virtual Conference">CITS 2020</a>

CITS 2020

Mentioning CITS 2020 in social media

Please use "CITS2020" (one word) if you refer the conference (e.g. use the hashtag #CITS2020 in Twitter) and link to the main webpage:

Thank you so much for your help!

Previous CITS Conferences 🔗