Conference Information
ICICS 2024: International Conference on Information and Communications Security
https://icics2024.aegean.gr/
Submission Date:
2024-04-19
Notification Date:
2024-06-24
Conference Date:
2024-08-26
Location:
Mytilene, Greece
Years:
26
CCF: c   CORE: b   QUALIS: b1   Viewed: 53717   Tracked: 200   Attend: 49

Call For Papers
Topics of Interest

Topics of Interest include but are not limited to:

• Access control and authorization	
• Anonymity
• AI-based security and privacy	
• Applied cryptography
• Threat scenarios, attack models and security analysis	
• Intrusion detection and prevention
• Attestation	
• Malware and unwanted software
• Biometrics security and privacy	
• Misinformation, disinformation, and fake news
• Blockchain and cryptocurrencies	
• Mobile security and privacy
• Cloud computing and virtualization security	
• Online safety and child protection
• Cybercrime	
• Online social media security, privacy, and trust
• Cyber deception and fraud	
• Operating systems security
• Cyber incident response and recovery	
• Network security
• Critical infrastructure protection	
• Privacy enhancing technologies and mechanisms
• Cyber physical systems security	
• Risk management
• Cyber resilience	
• Security of communication protocols
• Cyber security education, training, and awareness	
• Secure information flow
• Cyber threat intelligence	
• Security management
• Data security and privacy	
• Security and privacy for the (Industrial) Internet of Things
• Digital forensics	
• Security and privacy of AI (e.g., adversarial machine learning and federated learning)
• Digital rights management	
• Security and privacy metrics and policies
• Digital watermarking	
• Security operations and incident management
• Distributed systems security	
• Security visualization
• Economics of security and privacy	
• Secure systems design and architectures
• Edge and fog computing security	
• Side channel attacks
• Embedded systems security	
• Software and application security
• Emergency response and recovery	
• Steganography and steganalysis
• Formal methods for security	
• Trusted computing
• Hardware security	
• Trust management and reputation
• Identity management	
• Usable security and privacy
• Information security management	
• Vulnerability detection and prevention
• Internet censorship and defense	
• Web security and privacy
Last updated by Dou Sun in 2024-01-08
Acceptance Ratio
YearSubmittedAcceptedAccepted(%)
20131132925.7%
20121014948.5%
20111413323.4%
20101353123%
20091623722.8%
20081252721.6%
20072223817.1%
20061192218.5%
20052354017%
20042454217.1%
20031763721%
20021614125.5%
20011345641.8%
1999622438.7%
Related Conferences
Recommendation