ICT Conference 2019
  • HOME
  • Speakers
  • Agenda
  • Sponsorship
  • About
    • Contact
    • Gallery
    • Conferences >
      • PARTICIPANTS AT THE PREVIOUS ​ICT SECURITY CONFERENCES
      • THIRD ICT SECURITY CONFERENCE >
        • Presentations
        • Agenda.pdf
        • Lectures >
          • IT Audit, Risks, Security
          • Internet Security Threat Report
          • Cyber Security And Cyber Crime
          • ATM Security
          • ​Enhancing Security of Electronic Payments - Decision IQ
          • Security in Smart metering - Smart Grid
          • Cloud Based NFC Mobile Payments - Security Risks and Protection Measures
          • How to Protect Confidential Information?
          • Implementation of „SSL for ado.net“ for Encryption of the Data in Transit in the Corporate Network
          • Linux, Open Source and Security
          • Anatomy of a Social Engineering Attack
          • Endpoint Protection, New Technologies That Are Replacing/Complementing Traditional Antivirus
          • App Centric Computing - Impact on Your IT
          • Tor Network - How to Achieve Anonymity?
          • Secure Printing
          • Microsoft Advanced Threat Analytics
          • Creating WiFi NSA station
          • The Safety of Cryptography
          • The Problem of Protecting Security of Persons and Property in Light of Development of Internet of Things
        • Speakers >
          • Ph.D. Zoran Jovanovic
          • Slobodan Nedeljkovic
          • Nebojsa Cvijetic
          • Davor Kodrnja
          • Filip Bojovic
          • Ivan Dragas
          • Ivan Stijovic
          • Krzysztof Graczek
          • Nenad Andrejevic
          • Bojan Pavlovic
          • Luka Milinkovic
          • Darko Mihajlovski
          • Srdjan Popovic
          • Jovan Sikanja
          • Vladimir Vucinic
          • Bojan Milovanovic
          • Ph.D. Zoran Cica
          • Dragan Petrovic
          • Mirad Maglic
          • Milan Gabor
          • Ph.D. Zarko Stanisavljevic
          • Ph.D. Dragan Djurdjevic
          • Filip Simeonov
          • Mane Piperevski
        • Workshops >
          • What Code Come In Must Come Out - Threats at iOS and Android Applications
          • Hacking Attacks - The Power of IPv6 Driven Malware
      • Second ICT Security Conference >
        • Luka Milinkovic1
        • Viktor Kanizai
        • Viktor Varga - Saga
        • Dejan Spasic
        • Halkbank
        • Ivan Dragas
        • Piperevski
        • Zakljucak konferencije 2015
        • Zbornik radova
        • Halcom i svecano otvaranje
      • First ICT Security Conference
      • FOURTH ICT SECURITY CONFERENCE >
        • Lecturers
        • Speakers
        • Video
        • Sponsors
      • Blog

PAPER SUBMISSION
CHAIN or BLOCKCHAIN

Admission of Abstract's until 30th of November 2018
​
Admission of papers until 31st of March 2018

Report of acceptance will be sent 15 days after reception of the paper, at the latest on 15th of April 2018


The maximum length of a paper is eight pages and number of co-authors per paper is limited to three.

All submitted papers are subject to review. The registration fee is to be paid per paper, regardless of the number of authors.

Each participant may submit a maximum of two papers - one as the first author, the second one as a co-author. Accepted papers will be published in the Proceedings, after the conference.

The registration fee for the publication of scholarly / scientific papers:

Publishing of the paper in the Proceedings - 90 Euros
Publication in the Proceedings and presence at the conference- 90 Euros (per participant of the conference - one presenter, co-authors also pay the sum of 90 euros for attending the conference).

Forms for application can be downloaded from the following links.

Formular za biografiju / Biography form
File Size: 27 kb
File Type: doc
Download File

ict_2018_abstract.docx
File Size: 36 kb
File Type: docx
Download File


APPLICATION FORM


Location

Become part of ICT Security conference

5th ICT Security Conference gathers leading experts in cybersecurity, digital forensics, cryptography, network and data security, ethical hacking and fraud prevention. We strive to provide our delegates top-of-the-line content and hands-on experence.

Contact Us

    Subscribe Today!

Submit