Military College of Signals (MCS), a Campus of National University of Sciences and Technology (NUST), is dedicated to advancing knowledge and educating students in science and technology. As part of its continuing pursuit for excellence in research, MCS is organizing 5th IEEE International Conference on Communication Technologies (ComTech-2025) in collaboration with National Cyber Security Auditing and Evaluation Lab (NCSAEL), MCS, NUST and Higher Education Commission of Pakistan. The conference will be focusing on the future roadmap of Telecommunication, Software Engineering & Information/Cyber Security to meet the real world challenges in these fields of technology.

The aim of the conference is:

  • To provide a forum for researchers, developers and practitioners from academia and industry to meet and share cutting-edge technologies in the field of Telecommunication Engineering, Software Engineering & Information/Cyber Security
  • To establish a consortium of R&D between Pakistani universities offering similar Engineering Programs and Industry
  • To enhance the image of MCS at national and international forums as a Centre of Excellence in Telecommunication Engineering

International Keynotes
Professor Arnold Beckmann
Professor of Computer Science, Director of Zienkiewicz Institute for Modelling, Data and AI, Swansea University, UK

Topic: Responsible AI for Industrial Systems
Professor Muttukrishnan Rajarajan
Professor of Security Engineering & Director Institute for Cyber Security City St George's, University of London, UK

Topic: Translating Digital Security Research & Innovation to commercialization
Professor Siraj Shaikh
Professor in Systems Security Department of Computer Science, Swansea University, UK

Topic: Towards a maturing cybersecurity ecosystem: the role of economics and regulation
National Keynotes
Professor Khurram Khurshid Professor Khurram Khurshid
Professor/Head of Department, Department of Computer Science Institute of Space Technology (IST), Pakistan

Topic: ICUBE-Qamar: Pakistan's First Lunar CubeSat - From Inception to Realization
Dr Haider Abbas (TI)
DG National Cert, Pakistan

Topic: Emerging and Disruptive Technologies- Role of Cyber Security
Professor Usman Akram (TI)
HOD Department of Computer & Software Engineering
College of Electrical & Mechanical Engineering, NUST, Pakistan

Topic: Dermopsy: Transforming Skin Tissue Analysis with Generative AI and Transformer Models
Industry Talks
Professor Nosherwan Shoaib
HOD Department of RF & Microwave (RF&M-EE), SEECS, NUST
Chairman IEEE Islamabad Section

Topic: IEEE pivotal role in fostering education
Muhammad Afzal Malik
CEO USEN global & USEN Pakistan

Topic: Massive IoT data-driven insights
Mr. Altaf Ur Rehman
Consultant Lynx Information Security, Pak

Topic: Building Resilience for Supply Chain Attacks

Partners & Sponsors

Major areas of the conference will be as following:
Communication Track
  • Antennas, Propagation and RF Design
  • Transmission Technologies and Communication Theory
  • Spectrum Efficient Management, Sensing and Cognitive Radio
  • Multiple Antenna Systems and Services
  • Cooperative Communications, Distributed MIMO and Relaying
  • Wireless / Radio Access Technologies
  • Mobile Network Applications and Services
  • Ad-hoc, Mesh, Machine-to-Machine and Sensor Networks
  • Wireless Networks and Security
  • Green Communications and Networks
  • Satellite Networks, Positioning Technologies, Localization and Navigation
  • Vehicular Communications, Networks and Transportation Systems,
  • Smart Grid, Electric Vehicles, and Vehicular Electronics
  • Optical Networks and NGN
  • 5G Cellular systems and SON
  • Future Trends and Emerging Technologies

Software Track

  • Distributed Computing
  • Cloud Computing
  • Requirements Engineering
  • User Centric Design
  • Modeling Techniques & Methods in Software Engineering
  • Software Quality
  • Formal Methods
  • Security Aspects in Software Engineering
  • Agile Software Engineering
  • Reverse Engineering
  • Software dependability
  • Service-centric software engineering
  • Engineering Web Applications
  • Intelligent Systems
  • Big Data Analysis
  • Image Processing
  • Software Engineering Case Studies and Industrial experiences
  • Software Evolution & Reuse

Cyber Security Track

  • Authentication and Access Control
  • Botnets
  • Cryptography and Cryptanalysis
  • Data Security and Privacy
  • Digital Signatures
  • Information Hiding
  • Key Management
  • Secure Programming
  • Cloud Security and Forensics
  • Distributed Systems Security
  • Internet Security
  • Cryptocurrency and Blockchain
  • Cyber Crime and Social Implications
  • Cyber Laws
  • Information Security Auditing and Management
  • Information Security Strategy
  • Security Standards and Best Practices
  • Digital Forensics
  • Ethical Hacking
  • Future of Information Security
  • Malware: Detection
  • Vulnerability Assessment and Defense
  • Searchable Encryption
  • Quantum Computing and Cryptography