University of Frères Mentouri, Constantine, Algeria
Dr. Gueltoum Bendiab Academic career has consistently focused on Cyber Security and its application in several areas, including Cloud Computing, IoT, smart homes, smartphones, and vehicular networks. The research topics are covering aspects of Cyber Security related to trust and identity management, biometric authentication, Intrusion Prevention Detection and Response, Insider threats detection, Distributed Denial of Service Attacks, Malware detection and mitigation, and integrating Blockchain technology and Artificial Intelligence in Cyber Security.
She has established a respectable research record in cyber security, AI and Blockchain exemplified in the dozens of published papers and book chapters that have gained recognition among researchers and practitioners (more than 443 Google scholar citations thus far).
Dr. Gueltoum Bendiab has recently published an article on the possible application of an amalgamation of Blockchain and AI technologies for securing connected and Autonomous Vehicles. This article has been published on the IEEE Transactions on Intelligent Transportation Systems. Additionally, Dr. Gueltoum Bendiab is a reviewer at well-known journals and international conferences such as the IEEE Systems Journal, the Elsevier journal “Computer Networks”, IEEE services workshops and the IEEE international conference on Cyber Security and Resilience, etc.
Dr. Gueltoum Bendiab is currently an Assistant Professor in the Electronics Department, Faculty of Sciences of Technology, at university of Frères Mentouri, Constantine, Algeria.
The workshop has a comprehensive scope that covers various aspects of machine learning and its application in the domain of network security. Besides, we also invite submission of papers focusing on all aspects of Applied Mathematics, Applied Physics, Algorithm, Simulation, Machine Learning, and Network Security, ranging from theoretical analysis to practical research. The topics of interest include but are not limited to:
The goals of the workshop “Machine Learning: Integrating machine learning techniques to advance network security” are to:
Prospective authors are kindly invited to submit full papers that include title, abstract, introduction, tables, figures, conclusion and references. It is unnecessary to submit an abstract in advance. Please submit your papers in English.
Each paper should be no less than 4 pages. One regular registration can cover a paper of 6 pages, and additional pages will be charged. Please format your paper well according to the conference template before submission. Paper Template Download
Please prepare your paper in both .doc/.docx and .pdf format and submit your full paper by email with both formats attached directly to [email protected]
Process | Date & Time |
---|---|
Paper Submission | July 5, 2024 |
Review Process | 2 weeks |
Revise & Acceptance | 2 weeks |
Registration & Payment | 2 weeks |
Accepted papers will be published in Theoretical and Natural Science (TNS) (Print ISSN 2753-8818), and will be submitted to Conference Proceedings Citation Index (CPCI), Crossref, CNKI, Portico, Engineering Village (Inspec), Google Scholar, and other databases for indexing. The situation may be affected by factors among databases like processing time, workflow, policy, etc.
Title: Theoretical and Natural Science (TNS)
Press: EWA Publishing, United Kingdom
ISSN: 2753-8818, 2753-8826 (electronic)
* The papers will be exported to production and publication on a regular basis. Early-registered papers are expected to be published online earlier.
The workshop provides an opportunity for poster exhibition. Authors who are interested in presenting a poster, please submit your materials (prefer in .pdf) to [email protected] before July 15, 2024.
Detailed information on your presentation date and time will be confirmed closer to the workshop. If you have any questions about your presentation or the workshop, please email [email protected].
Poster Presentation Guidelines
Title, author and co-author names, and the affiliation(s) information.
Body parts, including "Abstract", "Introduction", "Methods", "Results", "Discussion" and "Conclusions".
(You can refer to the instructions for more detailed information. Additional presentation guidelines may be announced by workshop committees.)
If you want to attend the workshop on-site, please email [email protected]. The workshop seats are limited. Both contributors and non-contributors who wish to participate in the workshop in person need to apply to the workshop organizers.
VISA:
Algeria Visa Types, Requirements, ApplicationIn order to ensure the information is correct and up to date, there may be changes which we are not aware of. And different countries have different rules for the visa application. It is always a good idea to check the latest regulations in your country. This page just gives some general information of the visa application.
When you submit an Algeria visa application, you must have the following required documents:
You can submit an Algeria visa application in one of the following ways:
However, before you submit the application, make sure you know the requirements of the consulate or embassy who will handle your application. Not all consulates accept document submission in all the aforementioned methods.
The Algerian visa application process is as follows:
The Algeria visa processing time depends on the type of visa you're applying for, the county you are applying from, and the specific embassy or consular office.
However, it usually takes about 10-20 working days to process an Algerian visa. However, to make sure, inquire with the embassy or consulate in which you are applying. If you are applying by mail, the processing time will be longer.
If you submitted any wrong documents, it may cause the processing time for your visa to be delayed, or even for the application to be denied.