| |||||||||||||
ICISS 2015 : 11th International Conference on Information Systems SecurityConference Series : International Conference on Information Systems Security | |||||||||||||
Link: http://www.iciss.org.in | |||||||||||||
| |||||||||||||
Call For Papers | |||||||||||||
** Deadline extended: 10 August 2015!! **
========================================================================= 11th International Conference on Information Systems Security (ICISS 2015) 16 - 20 December, 2015 Kolkata, India URL: http://www.iciss.org.in ========================================================================= CALL FOR PAPERS The conference series ICISS (International Conference on Information Systems Security), held annually, provides a forum for disseminating latest research results in information and systems security. ICISS 2015, the eleventh conference in this series, will be held under the aegis of the Society for Research in Information Security and Privacy (SRISP). The acceptance ratio of the first ten conferences has averaged less than 30%. Like previous years, proceedings of the conference will be published as part of the Springer Verlag series of Lecture Notes in Computer Science. Submissions are encouraged from academia, industry and government, addressing theoretical and practical problems in information and systems security and related areas. Topics of interest include but are not limited to: Access and Usage Control Application Security Authentication and Audit Biometric Security Cloud Security Cryptographic Protocols Cyber-physical Systems Security Data Security and Privacy Digital Forensics Digital Rights Management Distributed Systems Security Formal Models in Security Identity Management Intrusion Detection and Prevention Intrusion Tolerance and Recovery Key Management Language-based Security Malware Analysis and Mitigation Network Security Operating Systems Security Privacy and Anonymity Secure Data Streams Security and Usability Security Testing Sensor and Ad Hoc Network Security Smartphone Security Software Security Usable Security Vulnerability Detection and Mitigation Web Security Important Dates: Manuscript Submission: 10 August 2015 (11.59 p.m., U.S. Mountain Time) Tutorial Proposal Submission: 31 August 2015 Notification of Acceptance: 15 September 2015 Camera-ready Manuscript: 25 September 2015 Paper Submission: Papers should be formatted as they would appear in the final LNCS proceedings. Papers should be at most 20 pages in length, including the bibliography. Detailed submission instructions can be found at the conference web site. One of the authors of an accepted paper must attend the conference to present the paper. ICISS accepts only electronic submissions in PDF format. Camera-Ready manuscripts must be submitted in LaTeX. Dual Submission Policy: Submitted papers must not substantially overlap with papers published or currently submitted to a journal or a conference with proceedings. Proceedings: Conference proceedings will be published in the Springer LNCS series. Tutorial Proposals: There will be tutorial program for two days (16-17 December 2015). At most four 3-hour tutorials will be offered. Proposals are invited for tutorials of duration three hours on relevant topics of current interest. A tutorial proposal should include the extended abstract of the tutorial and a brief biography of the speaker(s). Please mail your proposal to the Tutorial Chair. The speaker(s) of the accepted proposals need to submit their final presentation one month before the conference. More information is available at the conference website: http://www.iciss.org.in Contact: Prof. Sanjoy K. Saha and Prof. Mridul Sankar Barik Organizing Chairs, ICISS 2015 Department of Computer Science & Engineering Jadavpur University 188, Raja S. C. Mullick Road, Kolkata 700032, India. e-mail: iciss2015india@gmail.com Tel: +91-33-24146209 Fax: +91-33-24133599 Program Chairs: Sushil Jajodia: jajodia@gmu.edu Chandan Mazumdar: chandan.mazumdar@gmail.com |
|