Conference Information
ICICS 2022: International Conference on Information and Communications Security
https://icics2022.cyber.kent.ac.uk/index.php
Submission Date:
2022-03-21
Notification Date:
2022-06-06
Conference Date:
2022-09-05
Location:
Canterbury, UK
Years:
24
CCF: c   CORE: b   QUALIS: b1   Viewed: 36934   Tracked: 163   Attend: 31

Call For Papers
Topics of particular interest include, but are not limited to:

    Access control and authorization
    AI-based security and privacy
    Anonymity
    Applied cryptography
    Threat scenarios, attack models and security analysis
    Attestation
    Authentication
    Biometrics security and privacy
    Blockchain and cryptocurrencies
    Cloud computing and virtualization security
    Cybercrime and online harms
    Cyber deception and fraud
    Cyber incident response and recovery
    Critical infrastructure protection
    Cyber physical systems security
    Cyber resilience
    Cyber security education, games and awareness
    Cyber threat intelligence
    Data security and privacy
    Digital forensics
    Digital rights management
    Digital watermarking
    Distributed systems security
    Economics of security and privacy
    Edge and fog computing security
    Embedded systems security
    Emergency response and recovery
    Hardware security
    Identity management
    Information security management
    Internet censorship and defence
    Intrusion detection and prevention
    Malware and unwanted software
    Misinformation, disinformation and fake news
    Mobile security and privacy
    Online safety and child protection
    Online social media security, privacy and trust
    Operating systems security
    Network security
    Privacy enhancing technologies and mechanisms
    Security of communication protocols
    Secure information flow
    Security and privacy for (Industrial) Internet of Things
    Security and privacy of AI (e.g., adversarial machine learning and federated learning)
    Security and privacy metrics and policies
    Security operations and incident management
    Security visualization
    Secure systems design and architectures
    Side channel attacks
    Software and application security
    Steganography and steganalysis
    Trusted computing
    Trust management and reputation
    Usable security and privacy
    Web security and privacy
Last updated by Dou Sun in 2021-11-07
Acceptance Ratio
YearSubmittedAcceptedAccepted(%)
20131132925.7%
20121014948.5%
20111413323.4%
20101353123%
20091623722.8%
20081252721.6%
20072223817.1%
20061192218.5%
20052354017%
20042454217.1%
20031763721%
20021614125.5%
20011345641.8%
1999622438.7%
Related Conferences
Recommendation