| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
All CFPs on WikiCFP | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Present CFP : 2020 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Call for Papers ISSA 2020 - (see https://infosecsa.com)
The 2020 Information Security for South Africa conference will take place on 25 – 26 Aug 2020- n Pretoria, South Africa. ISSA 2020 proceedings are to be published by Springer CCIS (Communications in Computer and Information Science) (pending). CCIS is abstracted/indexed in DBLP, Google Scholar, EI-Compendex, Mathematical Reviews, SCImago, Scopus. CCIS volumes are also submitted for the inclusion in ISI Proceedings. The 19th international ISSA conference will be held from 25 - 26 Aug 2020 in Pretoria, South Africa. As with the previous ISSA conferences, the forthcoming ISSA 2020 will again present the latest developments in information security and bring together national and international researchers and practitioners. We solicit previously unpublished papers offering novel research contributions in any aspect of information security. Important dates: Full papers submission: 27 May 2020 Notification of acceptance: 06 July 2020 Camera-ready papers: 12 July 2020 Conference: 25 - 26 Aug 2020 Topics include but are not limited to: Access control Applied cryptography Audit Big data forensics Cloud computing security Cyber-security Cyber-security & Big Data & Data Science Data and application security Digital Forensics Human aspects of information security Identification & authentication Identity Management Information security awareness training Information security governance Information security risk analysis Intrusion detection and fraud detection Legal and ethical aspects of information security Mobile computing security Network security Phishing Privacy Security and usability Security of distributed architectures and infrastructures Software security Standards guidelines and certification Trust models and trust management Trusted computing Visit https://infosecsa.com for more details on the topics, guidelines and other information. ISSA ORGANISING COMMITTEE Reinhardt Botha (ReinhardtA.Botha@mandela.ac.za), Information Technology Department, Nelson Mandela University Mariki Eloff (eloffmm@unisa.ac.za), Institute for Corporate Citizenship, University of South Africa Hein Venter (hventer@cs.up.ac.za), Department of Computer Science, University of Pretoria Marijke Coetzee (marijkec@uj.ac.za), Academy of Computer Science and Software Engineering, University of Johannesburg Marianne Loock (loockm@unisa.ac.za), School of Computing, University of South Africa Jan Eloff (jan.eloff@up.ac.za), Department of Computer Science, University of Pretoria | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|