Información de la conferencia
ICICS 2024: International Conference on Information and Communications Security
https://icics2024.aegean.gr/Día de Entrega: |
2024-04-19 |
Fecha de Notificación: |
2024-06-24 |
Fecha de Conferencia: |
2024-08-26 |
Ubicación: |
Mytilene, Greece |
Años: |
26 |
CCF: c CORE: b QUALIS: b1 Vistas: 47844 Seguidores: 201 Asistentes: 47
Solicitud de Artículos
Topics of Interest Topics of Interest include but are not limited to: • Access control and authorization • Anonymity • AI-based security and privacy • Applied cryptography • Threat scenarios, attack models and security analysis • Intrusion detection and prevention • Attestation • Malware and unwanted software • Biometrics security and privacy • Misinformation, disinformation, and fake news • Blockchain and cryptocurrencies • Mobile security and privacy • Cloud computing and virtualization security • Online safety and child protection • Cybercrime • Online social media security, privacy, and trust • Cyber deception and fraud • Operating systems security • Cyber incident response and recovery • Network security • Critical infrastructure protection • Privacy enhancing technologies and mechanisms • Cyber physical systems security • Risk management • Cyber resilience • Security of communication protocols • Cyber security education, training, and awareness • Secure information flow • Cyber threat intelligence • Security management • Data security and privacy • Security and privacy for the (Industrial) Internet of Things • Digital forensics • Security and privacy of AI (e.g., adversarial machine learning and federated learning) • Digital rights management • Security and privacy metrics and policies • Digital watermarking • Security operations and incident management • Distributed systems security • Security visualization • Economics of security and privacy • Secure systems design and architectures • Edge and fog computing security • Side channel attacks • Embedded systems security • Software and application security • Emergency response and recovery • Steganography and steganalysis • Formal methods for security • Trusted computing • Hardware security • Trust management and reputation • Identity management • Usable security and privacy • Information security management • Vulnerability detection and prevention • Internet censorship and defense • Web security and privacy
Última Actualización Por Dou Sun en 2024-01-08
Coeficiente de Aceptación
Año | Enviados | Aceptados | Aceptados(%) |
---|---|---|---|
2013 | 113 | 29 | 25.7% |
2012 | 101 | 49 | 48.5% |
2011 | 141 | 33 | 23.4% |
2010 | 135 | 31 | 23% |
2009 | 162 | 37 | 22.8% |
2008 | 125 | 27 | 21.6% |
2007 | 222 | 38 | 17.1% |
2006 | 119 | 22 | 18.5% |
2005 | 235 | 40 | 17% |
2004 | 245 | 42 | 17.1% |
2003 | 176 | 37 | 21% |
2002 | 161 | 41 | 25.5% |
2001 | 134 | 56 | 41.8% |
1999 | 62 | 24 | 38.7% |
Conferencias Relacionadas
Revistas Relacionadas
CCF | Nombre Completo | Factor de Impacto | Editor | ISSN |
---|---|---|---|---|
a | IEEE Transactions on Information Forensics and Security | 6.211 | IEEE | 1556-6013 |
International Journal of Information Security | 1.988 | Springer | 1615-5262 | |
c | IET Information Security | 0.862 | IET | 1751-8709 |
a | Information and Computation | 0.704 | Elsevier | 0890-5401 |
b | ACM Transactions of Information and System Security | ACM | 1094-9224 | |
c | Information Management & Computer Security | Emerald | 0968-5227 | |
b | IEEE Transaction on Communications | 1.365 | IEEE | 0090-6778 |
IEEE Networking Letters | IEEE | 2576-3156 | ||
International Journal of Digital Information and Wireless Communications | SDIWC | 2225-658X | ||
Kinetics and Catalysis | 0.868 | Pleiades Publishing | 0023-1584 |
Nombre Completo | Factor de Impacto | Editor |
---|---|---|
IEEE Transactions on Information Forensics and Security | 6.211 | IEEE |
International Journal of Information Security | 1.988 | Springer |
IET Information Security | 0.862 | IET |
Information and Computation | 0.704 | Elsevier |
ACM Transactions of Information and System Security | ACM | |
Information Management & Computer Security | Emerald | |
IEEE Transaction on Communications | 1.365 | IEEE |
IEEE Networking Letters | IEEE | |
International Journal of Digital Information and Wireless Communications | SDIWC | |
Kinetics and Catalysis | 0.868 | Pleiades Publishing |
Recomendaciones