Authors are invited to submit their full papers by November 30, Manuscripts submitted for the conference must be original, must not be previously published or currently under review anywhere. Submitted manuscripts should respect the standard guidelines of the Springer proceeding chapter format. Manuscripts must be prepared using Latex, or Word. The submitted paper must be formatted according to Springer Format: MS Word TemplateLatex Template

The paper should contain between 8-12 pages. Contributions MUST be in English. All submitted manuscripts will be peer-reviewed by at least 3 program committee members. Prospective authors should send their manuscripts electronically through the easychair submission system as mentioned below:

Online Presentations:

Official conference language is English. All submissions and presentations will be in English. Authors who are interested to present their papers in CCSET2023 but could not attend the conference, they can present their works by a Virtual Presentation.

Best Paper awards:

The overall Best Paper Awards will be given and recognized during the conference.

  • Best Paper Awards in Cybersecurity and Cybercrime
  • Best Paper Awards in Smart Emerging Technologies

Similarity, plagiarism and self-plagiarism:

Since CCSET2023 will be submitted to Springer which policy requires all Springer content to be screened for possible plagiarism. All submitted papers to CCSET2023 will be checked and scanned using Turnitin, before being sent to reviewers. Note that to be submitted to Springer, the overall similarity rate of a paper should not exceed 25 percent, and the similarity rate to a single source should not exceed 10 percent. The score and report are provided to assist you in revising your manuscript, if necessary. The conference will not be able to provide you a score or a report for the revised manuscript.


Track 1: Cybersecurity and Cybercrime

  • Cryptography and its applications
  • Network and critical infrastructure security
  • Attacks and defenses
  • Hardware security
  • Information Systems Security
  • Cyber Security and Malware
  • Digital Forensics
  • Software and system security
  • Data-driven security and measurement studies
  • Blockchain for cybersecurity
  • Cloud security
  • Cyber physical systems security
  • Hardware security
  • Intrusion detection and prevention
  • Malware and unwanted software
  • Mobile security and privacy
  • Privacy-invasive software
  • IoT Security
  • AI Security
  • Image security
  • Web applications security
  • Computer security, audit, control and data integrity in all sectors – industry, commerce and academia

Track 2: Cybersecurity with NLP and Deep Machine Learning

  • Cyber-Grooming using NLP
  • Advances of NLP for safer and secure cyberspace
  • Cyber Risk and Compliance with NLP
  • Fake profiles, Honey accounts and unlawful accounts on social media
  • Advances of deep machine learning for cybersecurity

Track 3: Smart Emerging Technologies

  • Network Technologies & Wireless Communications
  • Explainable AI in Medical Sensors
  • Explainable AI for smart applications
  • Deep learning for smart applications
  • Social Network Analysis
  • 5G/6G Mobile Systems
  • Machine learning applications for Intelligent Systems and Smart Applications
  • Leveraging blockchain and AI for IoT, mist, fog and cloud computing
  • Cloud Computing and applications
  • Internet of Things (IoT) and Internet of vehicle (IoV)
  • Augmented reality (AR) and Virtual Reality (VR)
  • Smart Sensor Networks
  • Optimization and learning
  • Smart Sensor Systems
  • Evolutionary Swarm Robotics
  • IoT-enabled Smart Healthcare Systems
  • Applied cognition
  • Emerging Trends in Image Processing, Computer Vision and Pattern Recognition
  • Emerging Technologies for Sustainable and Smart Energy