posted by organizer: Vzt15 || 242 views || tracked by 1 users: [display]

INTERNET 2026 : The Eighteenth International Conference on Evolving Internet

FacebookTwitterLinkedInGoogle

Link: https://www.iaria.org/conferences2026/INTERNET26.html
 
When Mar 8, 2026 - Mar 12, 2026
Where Valencia, Spain
Submission Deadline Nov 16, 2025
Notification Due Jan 4, 2026
Final Version Due Feb 1, 2026
Categories    internet   graph theory   trust   security
 

Call For Papers

Call for Papers: INTERNET 2026 || March 8 - 12, 2026 - Valencia, Spain

INVITATION:

=================

Please consider to contribute to and/or forward to the appropriate groups the following opportunity to submit and publish original scientific results to:

- INTERNET 2026, The Eighteenth International Conference on Evolving Internet

INTERNET 2026 is scheduled to be March 8 - 12, 2026 in Valencia, Spain under the InfoWare 2026 umbrella.

The submission deadline is November 16, 2025.

Authors of selected papers will be invited to submit extended article versions to one of the IARIA Journals: https://www.iariajournals.org

All events will be held in a hybrid mode: on site, online, prerecorded videos, voiced presentation slides, pdf slides.

=================


============== INTERNET 2026 | Call for Papers ===============

CALL FOR PAPERS, TUTORIALS, PANELS


INTERNET 2026, The Eighteenth International Conference on Evolving Internet

General page: https://www.iaria.org/conferences2026/INTERNET26.html

Submission page: https://www.iaria.org/conferences2026/SubmitINTERNET26.html


Event schedule: March 8 - 12, 2026


Contributions:

- regular papers [in the proceedings, digital library]

- short papers (work in progress) [in the proceedings, digital library]

- ideas: two pages [in the proceedings, digital library]

- extended abstracts: two pages [in the proceedings, digital library]

- posters: two pages [in the proceedings, digital library]

- posters: slide only [slide-deck posted at www.iaria.org]

- presentations: slide only [slide-deck posted at www.iaria.org]

- demos: two pages [posted at www.iaria.org]


Submission deadline: November 16, 2025.


Extended versions of selected papers will be published in IARIA Journals: https://www.iariajournals.org

Print proceedings will be available via Curran Associates, Inc.: https://www.proceedings.com/9769.html

Articles will be archived in the free access ThinkMind Digital Library: https://www.thinkmind.org


The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas.

All tracks are open to both research and industry contributions.
Before submission, please check and comply with the editorial rules: https://www.iaria.org/editorialrules.html


INTERNET 2026 Topics (for topics and submission details: see CfP on the site)

Call for Papers: https://www.iaria.org/conferences2026/CfPINTERNET26.html

============================================================

INTERNET 2026 Tracks (topics and submission details: see CfP on the site)

Hot topics in Internet

From Internet of Thinks (IoT) to Internet of People (IoP) and Internet of Everything (IoE); Improving reliability; Congestion-adaptive data collection; Accuracy in cyber-physical systems; Internet and home environments; Fog computing in industrial IoT-context; Mobile Edge Computing (MEC); Cloud-based: networking (NaaS), multimedia (MaaS), videogames (VaaS); LTE broadcasting; Identity-oriented networks; Selectivity-aware MU-MIMO for wideband WiFi; mmWave networks and technologies; Deadline-sensitive opportunistic utility-based protocols; Social sensing applications; Opportunistic smartphone sensing; Delay-tolerant IoT; IoP and Smart cities; Multi-vendor NVF (Network Virtual Functionalities) orchestration; SDN (Software Defined Network)--based resilience; Policy-based NFV management; Performance of SDN controllers; Performance optimization for NFV; SDN Access control; 5G Edge caching techniques; Performance in 5G networks; Security and privacy in data-centers; Identity and privacy management; QoS (Quality of Service) and QoE (Quality of Experience); Standardization efforts (MEC, mmWave, SDN, NFV, 5G, etc.)

New Internet Challenges

SDN, SDX, NFV; 4G/5G and advanced mobile Internet; Internet of X (everything, things, people, etc.); Internet, Virtualization and Cloud; Internet and Big Data; Sensing and sensor networks; Energy-aware networks; Content-oriented networking; Cellular cognitive networks; Future routing mechanisms; Non-Terrestrial (GEO/LEO satellite) Networks: transport protocols; Internet (IP) over satellite protocols and applications; Hybrid satellite/terrestrial networks; Internet services over rural/remote areas

Future Internet Architecture

Architectures for the Internet of Things; Web of Things; Web of Things and Semantic; Internet of Things and Clouds internetworking; Network media, content and service orientation; Embedded Web Services (CoAP / Lightweight SOAP); Mobility and Future Internet; Pervasive Internet of Things; User-oriented, context-aware Internet of Things services; Location and discovery of things on the Internet; Crowd-sourcing and things; Trust, security and privacy in Internet of Things; Lightweight implementations of cryptographic stacks; Experiences with Open Platforms and hardware within Internet of Things; Internet of Vehicle (IOV)

Advanced Internet mechanisms

Access: call admission control vs. QoE vs. structural QoS / capability-based access control vs. role-based access control vs. attribute-based access control; Routing and pricing models: BGP, pricing peering agreements using microeconomics, topological routing vs. table-based routing vs. network coding, power-efficient routing; Optimization in P2P/CDN networks: peer placement for streaming P2P, analysis of P2P networks; Traffic engineering: estimating traffic matrices, constrained routing, exponentially bounded burstness; Behavioral traffic recognition: identifying applications from traffic behavior; Traffic analysis: methods for analysis and visualization of multidimensional measurements, characterizing protocols; Software defined radio networks: low power signal processing methods, applications of machine learning; Cognitive radio: medium access, spatiotemporality, complexity, spectrum sharing and leasing, channel selection, multi-stage pricing, cyclostationary signatures, frame synchronization; Streaming video: learning from video, techniques for in-network modulation, adaptive video streaming; Location: statistical location, partial measurements, delay estimation

Graph theory/topology/routing Internet support

Information theory: distributed network coding, Shannon's entropy, Nash equilibrium; Optimization: LP, NLP, NeuroP, quadratic, convex programming, compressed sensing; Graph theory: random graphs, spectra graph theory, percolations and phase transitions, methods from statistical physics, geometric random graphs; Algebraic techniques: tensor analysis, matrix decomposition; Processing: signal processing techniques, equalization, point-process, source coding vs. network coding, recoverability; Statistical machine learning: probabilistic graphical models, classification, clustering, regression, classification, neural networks, support vector machines, decision forests; Game Theory/Microeconomic theory: social choice theory, equilibria, arbitrage and incentive oriented distributed mechanism design, cooperative games, and games on graphs; Stochastic network calculus; Fractal behavior and stability mechanisms; Kolmogorov complexity for performance evaluation; Complexity theory

Internet security mechanisms

Cryptography: design and analysis of cryptographic algorithms, applied cryptography, cryptographic protocols and functions; Specification, validation design of security and dependability: security and trust models, semantics and computational models for security and trust, business models in security management, security policies models, security architectures, formal methods for verification and certification, multi-level security specification; Vulnerabilities, attacks and risks: methods of detection, analysis, prevention, intrusion detection, tolerance, response and prevention, attacks and prevention of on-line fraud, denial of services attacks and prevention methods; Access Control: authentication and non-repudiation, accounting and audit, anonymity and pseudonymity; identity and trust management, biometric methods; Anti-malware techniques: detection, analysis, prevention; Cyber-crime response: anti-phishing, anti-spam, anti-fraud methods

Internet trust, security, and dependability levels

Network and transport level security; Network edge security controls: firewalls, packet filters, application gateways; Wireless and mobile network security: risks of wireless insecurity, wireless vulnerabilities and intrusion detection, WLAN and WMAN MAC layer security technologies, key management mechanisms and protocols, security in ad hoc, sensor, mesh and personal communication networks; Security of Internet protocols: routing security, naming, network management, signaling security, transport layer security; Network security policies: specification, implementation, deployment and management; Security of P2P and overlay/middleware systems; Security for multiple domains, large-scale systems and critical infrastructures; Applications and high level services security: Web-based applications and services, VoIP, multimedia streaming services, VoD and IPTV, collaborative applications (conferencing), electronic commerce and eBusiness, eVoting, grid computing, security of eGovernment; Intellectual property protection: digital rights management, licensing, metering, watermarking, information hiding, implementations; Security services integration in complex architectures; Tradeoffs between security and efficiency, usability, reliability and cost.

Internet performance

Performance degradation and anomaly detection mechanisms; User-oriented performance metrics; Network and service provider-oriented performance metrics; Hybrid (chip and network) performance calculi; Intrusive and non-intrusive performance measurement mechanisms; Mechanisms for performance degradation-tolerant applications; Mechanisms for application performance and network performance; Performance enhancement mechanisms; Performance and traffic entropy algorithms; Performance prediction algorithms

Internet AQM/QoS

Buffer sizing, majorization, QoS routing, finite buffer queue vs. infinite buffer queue and performance; Control theoretic framework for modeling of TCP and AQM schemes; Discrete mathematics to model buffer occupancy at queues of a network (given workloads); Game theoretic modeling of AQMs (mathematics to model selfish traffic); Fairness models (proportional fairness, max-min fairness, low state global fairness); Optimization framework for congestion control, fairness and utility maximization; Modeling and simulation of large network scenarios using queuing theory

Internet monitoring and control

Visualization mechanisms; Sub-network/device isolation mechanisms; Control feedback mechanisms (limited feedback, delay and disruption tolerance, optimal and adaptive feedback); Optimal control; Adaptive behavior control; Network resiliency; Self-adaptable and tunable performance; Mechanisms for anticipative measurements and control

Internet and wireless

Capacity of wireless networks; Potential based routing; Algebraic techniques to mine patterns from wireless networks; QoS/QoE translation; Wireless ad hoc / mesh networks: MAC protocols, routing, congestion control, P2P CDNs on wireless meshes

Internet and data streaming/mining algorithms

Mathematics for clustering massive data streams; Randomized algorithms etc and impossibility results; Dimension reduction in metric spaces; Tensor and multidimensional algebraic techniques; Non linear dimension reduction; Optimal collector positioning; Data fusion and correlation algorithms

Internet and sensor-oriented networks/algorithms

Optimal sensor placement; Inference models for sensing; Congestion control; Resource allocation; Mathematics to model different diffusion processes and applications to routing; Algorithms for data fusion; Algorithms for computing dormant/active sending periods; Energy-driven adaptive communication protocols

Internet challenges

Future Internet architecture and design; Next generation Internet infrastructure; Internet cross-layer design and optimization; Internet security enforcement and validation; Future cross-Internet computing; Configurable Internet protocols; Internet-scale overlay content hosting; Internet citizen-centric services; End-user customizable Internet; Mobile Internet; Internet imaging; Internet coding; Internet resilience; Internet QoS/QoE; Context-aware, ambient, and adaptive Internet; Virtualization and Internet; Privacy Enhancing Technologies - PETs

Access networks

Next generation access technologies; Femtocells-based access; Broadband wireless Internet access; Optical access networks; Mobile wireless access; Dynamic and cognitive access; Hybrid optical and wireless access networks; Copper Access; Giga/Tera Access; Access Control; Neutral Access Networks; Legal aspects on network and service access


------------------------

INTERNET 2026 Committee: https://www.iaria.org/conferences2026/ComINTERNET26.html


IARIA Ambassadors

Steve Chan, Decision Engineering Analysis Laboratory, USA
Dirceu Cavendish, Kyushu Institute of Technology, Japan
Monika Maria Moehring, Study Centre for Blind and Disabled Students, Technische Hochschule Mittelhessen, Gie en Germany
Carlos Becker Westphall, Federal University of Santa Catarina, Brazil
Lasse Berntzen, University of South-Eastern Norway, Norway
Les Sztandera, Thomas Jefferson University, Philadelphia, USA
Andreas Rausch, TU Clausthal, Clausthal-Zellerfeld, Germany
Timothy Phan, NASA, Jet Propulsion Laboratory, USA
Manuela Vieira, CTS/ISEL/IPL, Portugal
Luigi Lavazza, Universit dell'Insubria - Varese, Italy

Related Resources

IEEE-ACAI 2025   2025 IEEE 8th International Conference on Algorithms, Computing and Artificial Intelligence (ACAI 2025)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ICIMT--EI 2026   2026 16th International Conference on Information and Multimedia Technology (ICIMT 2026)
ICPDI 2025   2025 4th International Conference on Public Management, Digital Economy and Internet Technology -EI Compendex/Scopus
IEEE-ICICCS 2025   2025 International Conference on Intelligent Control and Computing Science-EI/Scopus
CEIJ 2025   Chemical Engineering: An International Journal
BDCI 2026   2026 The 6th International Conference on Big Data and Computational Intelligence (BDCI 2026)
DSA 2025   The 12th International Conference on Dependability Systems and Their Applications
BIOTC 2026   2026 8th Blockchain and Internet of Things Conference (BIOTC 2026)
BDPC 2026   2026 4th International Conference on Big Data and Privacy Computing (BDPC 2026)