2020 Hatfield, UK

The 54th Annual International Carnahan Conference on Security Technology will be held in Hatfield, UK, and is scheduled for 2-4 September 2020.


Important Dates

Full paper submission May 4, 2020
Decision to authors May 29, 2020
Camera Ready submission June 15, 2020
Early Bird Registration June 15, 2020
Late Registration August 31, 2020
Conference Dates September 2-4, 2020

Registration is compulsory to include papers in the IEEE Xplore conference proceedings.


Conference topics

This conference has a broad scope and invites papers on advanced security technologies including physical, cyber and electronic security research, development, systems engineering, testing, evaluation, case studies and new research lines to face current and future challenges.

Papers are invited in the following topics which is not an exhaustive list:

  • Sensor and detection technology, including sensor webs and signal fusion
  • Advanced video systems, automatic monitoring, automatic threat recognition
  • Alarm monitoring, command and control systems, including human factors
  • Threat identification and modeling
  • Information security, encryption, privacy
  • Cyber security and malware protection
  • Wireless communications security including spectrum use and encryption
  • Network security
  • IoT security
  • Airport and transportation secure blockchain
  • Biometrics including voice, hand, finger, face and other characteristics
  • Access control and identity management
  • Barrier technology and modeling
  • Inspection and forensics technologies
  • Less-than-lethal weapons technology
  • Counter-proliferation of weapons of mass destruction
  • Airport and transportation security
  • Emergency operations and management
  • Local, state and national interoperability
  • Network-centric systems, deployment, operations and life-cycle management
  • System engineering and modeling
  • Operator training and performance
  • User experiences of operating security systems including testing
  • Vulnerability analysis and modeling
  • Impact of security technology on society
  • Security education, GDPR
  • Less-than-lethal weapons technology
  • Aerospace security
  • Infrastructure security
  • Safety critical systems
  • Blockchain Technologies in Supply-Chain Management
  • Secure Data Processing and Management using DLTs
  • Technology supported crime investigation
  • Virtual, augmented, mixed reality and extended reality (XR)
  • Visualisation & Visual analytics
  • Biofeedback
  • Interactive decision support
  • Analytical reasoning systems
  • Wearables in Security Applications
  • Cognitive demand and training
  • Intelligent interfaces
  • Human/AI interaction



Organising Committee

Special Sessional Chairs

Executive Committee

  • Adrian Schwaninger, Switzerland
  • Alfonso Bilboa, Spain
  • Brian Rich , Canada
  • Daniel A. Pritchard, USA
  • Fabio Garzia, Italy
  • Francisco Vargas, Columbia
  • Gordon Thomas, UK
  • Han LIn, USA
  • Jack Glover, USA
  • Mala John, India
  • Miguel A. Ferrer, Spain
  • Milos Klima, Czech Republic
  • Pu Chang En, ROC
  • Shufei He, Netherlands
  • Soodamani Ramalingam, UK
  • Virginia Espinosa, Spain
  • William R. Claycomb, USA
  • Yen Hsiang Chu, Taiwan, ROC


Submission Guidelines

ICCST2020 Full paper submission

Papers must be submitted according to the IEEE templates (Please use letter size paper and 6 pages maximum). Steps to follow:

  1. Conference Template: https://www.ieee.org/conferences/publishing/templates.html
  2. Paper submission: To be confirmed.
  3. Camera ready paper: To be confirmed.
  4. IEEE copyright form submission: Complete and submit one IEEE copyright form per paper. Instructions will follow for completing the copyright form once you have completed the conference registration.

For any further details, contact Publications Chair.

Authors’ instruction

(to be updated)


Publications Chair, z.j.jeffrey@herts.ac.uk


ICCST2020 Special Sessions

The special sessions call for proposals will soon be announced by the sessional chairs. In addition, the organising committee may decide to move some of the papers from general submission to the special session.

Special Session: Biometric technology and Cybersecurity

Co-Chairs: Iosif Mporas (University of Hertfordshire) and Vitomir Struc (University of Ljubljana)

Biometric technology has become one of the most important components in cybersecurity systems. Biometric interfaces allow users to access to cyberphysical infrastructures in a secure, reliable and convenient way. The goal of this special session is to present the most recent and advanced work related to biometric technology for cybersecurity and to bring together researchers and practitioners working on problems in this area of research.

We invite research papers on (but not limited to):

  • facial, voice, iris, fingerprint, and other biometric modalities applied to problems in cybersecurity,
  • multimodal biometrics technologies for cybersecurity,
  • presentation attacks on cybersecurity systems,
  • novel datasets and performance studies,
  • applications of biometric solutions in the context of cybersecurity systems.


Special Session: Trusted Architectures in the Energy Sector

Chairs: Colin Mallett (University of Hertfordshire)

Trust is fundamental to energy systems, and trustworthiness often describes technical architectures which users feel safe to use. This is aided by a body of knowledge on secure systems which might include authentication processes and strong machine identities. Trusted hardware often denotes devices which have been certified. However ‘trustless’ or ‘zero trust systems’ also require consideration. This includes consensus systems (e.g. blockchains) where participants do not need to know or trust each other or a third party.

This special session seeks to bring together researchers and practitioners interested in demonstrating how their most recent and advanced work can contribute to developing this area.

We invite research papers on (but not limited to):

  • New and emerging certification methodologies and trends
  • Secure trusted hardware and operating systems
  • Development of secure hardware and lightweight client software suitable for distributed energy resources (DERs) based on the Internet of Things (IoT)
  • Secure peer-to-peer networks and low power wireless technology
  • New consensus systems (eg ‘gossip’) which can improve end-to-end trustworthiness and energy efficiency of trustless cores.
  • New and emerging cyber threats such as Sybil attacks and malware which can for example run down battery energy storage systems.


(to be further updated )


Technical Program

The ICCST2020 conference program is scheduled as follows:

  • ICCST2020 Reception: September 1, 2020, 6-8 PM. Venue: Room A161, Lindop Building, College Lane, University of Hertfordshire, Hatfield, AL10 9AB, UK. Download the Herts Mobile app for directions.
  • ICCST2020 Technical program schedule: September 2-4, 2020.  Program-TBD.
  • ICCST2020 Technical dinner schedule: 6-8 PMSeptember 3, 2020. Hatfield House Great North Rd, Hatfield AL9 5HX. (TBD)

Paper presentation instructions:

  • Only those papers registered and presented at the conference will be included in the IEEE Xplore proceedings.
  • 15 minutes slot for all oral presentations with a 12 minutes presentation and 3 minutes questions and disucssions.
  • Please bring a USB memory stick containing your presentation. The conference room is well equipped with visual equipment for presentation.



Coming soon…


Social Program

Coming soon…

See here for a list of things to see in and around Hertfordshire.



Registration Fee in GBP (£)
Category Early Bird Registration Deadline: June 15, 2020 Late Registration Deadline: August 31, 2020 Multiple Papers and Joint Authors
Non_IEEE Member £550 £650 Standard registration fees apply for the first paper depending on early bird or late registration. For every additional paper,  a £70 is reduced from the standard fee.

Joint authors of a paper wishing to attend the conference will have to pay the individual registration fee as indicated.

IEEE Member £470 £570
Student Member £450 £550

Additional Gala Dinner tickets for accompanying participants: £70.00. This can be paid during registration or at the desk.

Registration fee payment mode

(To be confirmed)




Local Information

Visa Information (TBC)

       ICCST2020 will take place in England, UK. International delegates should be particularly aware of and careful about visa requirements. Please refer to the UK Government’s website for further details: https://www.gov.uk/apply-to-come-to-the-uk.
        Registered foreign participants would receive an invitation from the ICCST organsing committee soon after completion of registration formalities. The applicant should enclose this letter while applying for the Visa.
        We woud like to inform the participants that the conference is hosted  by the University of Hertfordshire.

How long it will take

The earliest you can apply is 3 months before you travel.  Example You can apply from 16 March if you plan to travel on 15 June.

Venue and How to Get There

Rooms A161, A166, A154, Lindopp Building, College Lane, University of Hertfordshire, AL10 9AB.

UH Way Finding Mobile App: https://mobile.herts.ac.uk/

Where to find us:

  • See here to locate the University.
  • See here for College Lane maps and directions.
  • See here for College Lane accommodation.


You have several choices of accommodation.

Useful links



Depending on the nature of your query, please contact one of the members of the organising committee. For any emergencies, please contact:

Dr Iosif Mporas, Local Organising Committee Chair, i.mporas@herts.ac.uk