Conference Information
ICISS 2022: International Conference on Information Systems Security
https://www.icissconf.org/index.html
Submission Date:
2022-07-18
Notification Date:
2022-10-03
Conference Date:
2022-12-16
Location:
Tirupati, India
Years:
18
CORE: b   QUALIS: b3   Viewed: 14928   Tracked: 6   Attend: 1

Call For Papers
 The International Conference on Information Systems Security (ICISS), held annually in India, is a forum for disseminating research results and meeting finer minds on computer security. ICISS 2022, the 18th edition of the conference, will be held at IIT Tirupati in the city of Tirupati from December 16 to 20, 2022. The conference will include high quality technical papers, a set of visionary/invited papers on important and timely topics from well-known leaders in the field, and a session on the work in progress. Alongside the broader objectives, the ICISS 2022 emphasizes enhancing the cooperation between India and Australia on information security research activity. The conference therefore invites the researchers and security enthusiasts to take advantage of the forum to share and discuss the subject concerns to the topic of computer security. The scope includes theoretical and applied research within the broad area of information and systems security, as mentioned below.

Network and Hardware Security:

    5G/6G Network security
    Mobile network security
    IoT Security
    Sensor and ad-hoc network security
    Intrusion detection and recovery

Data Security and Privacy:

    Key management
    Cryptographic protocols
    Privacy and anonymity
    Secure data streams
    Cloud Security

Systems Security:

    Access control
    Logging and Auditing
    Distributed systems security
    Operating systems security
    Cyber-physical systems security

Application Security:

    Vulnerability detection and mitigation
    Software security
    Web security
    Malware analysis
    Security testing
    SDLC security

Human-Centric Security:

    Usable Authentication/Biometric security
    Usable security
    Usable privacy
    Usage control
    Identity management
    Ethics/Law/Policy/Responsible innovation in security

Emerging areas:

    Quantum Security
    AI/ML Security
    Blockchain Security
    Critical infrastructure security
    Digital forensics
    Threat hunting
    Vulnerability & threat management
Last updated by Dou Sun in 2022-05-15
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
cba1ICIPInternational Conference on Image Processing2022-02-162022-06-202022-10-16
BDCIEEE/ACM International Symposium on Big Data Computing2015-07-032015-08-212015-12-07
SCOMInternational Conference on Soft Computing2020-11-292020-12-052020-12-12
AKBCConference on Automated Knowledge Base Construction2020-02-132020-04-202020-06-22
cIFIPTMIFIP WG 11.11 International Conference on Trust Management2019-04-092019-05-122019-07-17
WoTBDInternational Symposium on Web of Things and Big Data2015-08-302015-09-152015-10-06
ICACARInternational Conference on Advanced Control, Automation and Robotics2023-03-102023-03-202023-04-07
EBISSInternational Conference on e-Business and Information System Security 2011-02-252011-02-262011-05-28
ICSIPInternational Conference on Signal and Image Processing2022-05-012022-05-302022-07-20
ICRCCInternational Conference on Radar, Communication and Computing2016-09-152016-09-202016-08-13
Related Journals
CCFFull NameImpact FactorPublisherISSN
International Journal of Information Security1.988Springer1615-5262
cIET Information Security0.862IET1751-8709
bInformation Systems2.309Elsevier0306-4379
aACM Transactions on Information Systems ACM1046-8188
cBehaviour & Information Technology1.388Taylor & Francis0144-929X
Information Systems Journal3.286Wiley-Blackwell1350-1917
aIEEE Transactions on Information Forensics and Security6.211IEEE1556-6013
Information Systems Research2.457INFORMS1047-7047
Information Systems and e-Business Management5.073Springer1617-9846
Information Systems Management2.042Taylor & Francis1058-0530
Recommendation