
Europe, Middle East and North Africa Conference on Technology and Security to Support Learning.
(EMENA-TSSL 2016)
October 3-5, 2016, Saïdia, Morocco
http://www.emena.org/
Scope
The Europe Middle East and North Africa Conference on Technology and Security to Support Learning 2016 (EURO-MENA TSSL’2016) will take place at the Ibero-Star 5* Hotel in the wonderful Moroccan “Blue Pearl” city of Saïdia from 3 to 5 October 2016. EURO-MENA-TSSL’2016 is a world- leading multidisciplinary conference that offers the cutting edge in academic and technological development in all fields of information systems technologies and security to support learning.
This conference will be a world-leading platform gathers academics, computer scientists, practitioners, professionals and PhD students from Europe, Middle East and North Africa regions. Within a friendly atmosphere, it will be an outstanding arena to exchange ideas, discuss the latest emerging issues, trends, results, experiences and concerns in the several perspectives of information systems technologies and security. All partnerships and collaboration among EURO and MENA universities will be highlighted.
Tracks & Topics
The Conference Topics are (but are not limited to):
-
Track 1: Educational Technology
-
Track 2 : Artificial Intelligence in Education
-
Track 3 : Network and Web Technologies Applications
-
Track 4 : Security, Privacy, and Data Forensic
For more details about topics please visit Website: www.emena.org Paper Submission, Proceedings, and Publications
EURO-MENA-TSSL’2016 solicits high-quality papers reporting research results and/or experimental results in any areas of the conference. Prospective authors are invited to submit papers electronically in EasyChair submission system at: https://easychair.org/conferences/?conf=emenatssl16.
Submitted papers should be original and not previously submitted to other Conferences or Journals. All submissions will be reviewed on the basis of relevance, originality, importance and clarity following a double blind peer review process. The authors of all accepted papers will be asked to improve their papers on the basis of reviewers’ comments.
Papers can be submitted as, full paper should not exceed 10 pages in length, short paper 6- pages, or poster 4-pages, should be written in english and submitted in PDF format, using the proceeding template, see Instructions for Authors at Springer Website at http://www.springer.com/series/11156. Papers that do not respect these guidelines will be rejected.
All conferene accepted papers will be included in the conference proceedings published by Springer and distributed in CD-ROM format during conference. One of the authors of an accepted submission must attend the conference and present their work as a condition of publication, published papers will be available in the Springer Link Digital Library.
Extended versions of some selected papers will be published in special issues of international recognized journals. Indexed by ISI/SCI, SCOPUS and DBLP, among others.
Submission Deadline: April 5, 2016
Contact Information
Email : [email protected]
Web site : www.emena.org
Workshops Proposals : [email protected]
PDF Version: CFP
Author

- Hakin9 is a monthly magazine dedicated to hacking and cybersecurity. In every edition, we try to focus on different approaches to show various techniques - defensive and offensive. This knowledge will help you understand how most popular attacks are performed and how to protect your data from them. Our tutorials, case studies and online courses will prepare you for the upcoming, potential threats in the cyber security world. We collaborate with many individuals and universities and public institutions, but also with companies such as Xento Systems, CATO Networks, EY, CIPHER Intelligence LAB, redBorder, TSG, and others.
Latest Articles
Blog2022.12.13What are the Common Security Weaknesses of Cloud Based Networks?
Blog2022.10.12Vulnerability management with Wazuh open source XDR
Blog2022.08.29Deception Technologies: Improving Incident Detection and Response by Alex Vakulov
Blog2022.08.25Exploring the Heightened Importance of Cybersecurity in Mobile App Development by Jeff Kalwerisky
Subscribe
0 Comments