posted by user: okip || 1071 views || tracked by 3 users: [display]

AISA 2022 : 2022 OkIP International Conference on Advances in Information Security and Assurance

FacebookTwitterLinkedInGoogle

Link: https://eventutor.com/e/AISA002
 
When Oct 3, 2022 - Oct 6, 2022
Where Downtown Oklahoma City, OK, USA & Online
Submission Deadline Jul 11, 2022
Notification Due Aug 1, 2022
Final Version Due Aug 22, 2022
Categories    is modeling and design   ai in security   security and distributed syst.   ia and information warfare
 

Call For Papers

--- 1st Call for Abstracts and Papers -------------
2022 OkIP International Conference on Advances in Information Security and Assurance (AISA)
Downtown Oklahoma City, OK, USA & Online
October 3-6, 2022
https://eventutor.com/e/AISA002
Submission Deadline: July 11, 2022

AISA aims to bring together scholars from different disciplinary backgrounds to emphasize disseminating ongoing research and development in the field. Proposals are solicited describing original works in the fields below and related technologies.
AISA will include a peer-reviewed program of technical, industrial, and poster sessions. Accepted and presented full papers from the tracks below will be published in the conference proceedings and submitted for indexation in major abstract and citation databases of peer-reviewed literature. Extended versions of the best papers will be considered for journals publication.

)) IS Modeling and Design
- Information Security (IS) Architecture Design
- IS Authentication and Privacy Control
- IS Frameworks and Protocols
- IS Architecture Design and Testing
- Data Breach Protection
- Information Systems Security
- Information Analytical Models
- IS Modeling and Analysis
- Critical Information Management
- IS Performance, Requirements, and Issues
- Security Information Sharing

)) AI in Security
- AI/ Machine Learning for Security
- Cryptographic Checksums and Algorithms
- Risk and Reputation Management
- Malware Detection and Response
- Vulnerability Analysis and Countermeasures
- Intrusion Detection and Anomaly Recovery
- Information/Temporal Access Controls
- Vulnerability Detection
- Improved Authentication Process
- Information Hiding and Anonymity
- Behavioral Biometrics
- Security Situational Awareness

)) Security and Distributed Systems
- Edge Computing Security
- Trusted Computing | Crowdsourcing
- Cyber-physical Systems Security
- Distributed Systems Security
- Embedded Systems Security
- IS Virtualization and Data Center Network
- Secure Internet Connectivity
- Cloud Security and Adoption Risks
- Physical-layer Security

)) Wireless and Digital Forensics
- Trust Authority Distribution
- Wireless Network Information Assurance (IA)
- Bluetooth Information Assurance
- Radio Frequency Fingerprints
- Intelligent Forensic Systems
- Honeypot Deception and Forensics
- Steganography Techniques
- Cyber-Attack Thwarting
- Crime Data Mining
- Anti-Spam Filtering Techniques
- Untrusted Hardware Testing
- Privacy Preservation and Protection
- Intelligent and Secure Autofill Systems

)) IA and Information Warfare
- Secure Passport System
- Insider Threat Prediction
- Key Management and Recovery
- Critical Infrastructure Protection
- Threat Awareness Analysis
- Traffic Flow Confidentiality
- Intellectual Property Protection
- Cyber-Attack and Cyber-Terrorism
- Tamper Detection and Prevention
- Physical Security and Soldier Security
- Electromagnetic Bomb and Electronic Attack
- Tactical Communication and Network Security

)) IS & IA Applications
- Electronic Voting System
- Signature Verification
- Parental Control Systems
- Biometric Protection
- Watermarking Techniques
- Secure Diagnostic
- Mobile Security | Database Security
- Intelligent and Secure Autofill System
- Energy Harvesting Security
- IS & IA Awareness and Education
- Green Communications Security
- Power Information System Security
- Corporations and Businesses Protection
- Internet of Things Security
- Software Security Assurance

)) IS & IA Policy and Legal Issues
- IS & IA Policy Approaches
- IS & IA Enforcement Models
- Cybersecurity Legal
- Regulatory Issues
- Digital Rights Management
- Ethics, Identity and Trust Management
- Steganography Legal Issues

)) Contribution Types (One-Column IEEE Format Style): OkIP Published & SCOPUS/WoS Indexed
- Full Paper: Accomplished research results (10 pages)
- Short Paper: Work in progress/fresh developments (6 pages)
- Extended Abstract/Poster/Journal First: Displayed/Oral presented (3 pages)

)) Important Dates:
- Submission Deadline: July 11, 2022
- Notification Due: August 01, 2022
- Camera-ready Due: August 22, 2022

)) Technical Program Committee
https://eventutor.com/event/29/page/76-committee

Please feel free to contact us for any inquiry at: info@okipublishing.com

--------
Pierre Tiako
General Chair

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CSP--EI 2025   2025 9th International Conference on Cryptography, Security and Privacy (CSP 2025)
Applied Sciences (MDPI) SI:Cybersecurity 2024   Applied Sciences (MDPI) Special Issue - Cybersecurity: Advances in Security and Privacy Enhancing Technology
CSP 2025   2025 9th International Conference on Cryptography, Security and Privacy (CSP 2025)
ICICT 2025   IEEE--2025 The 8th International Conference on Information and Computer Technologies (ICICT 2025)
ICBDA 2025   IEEE--2025 the 10th International Conference on Big Data Analytics (ICBDA 2025)
ICAIBD 2025   IEEE--2025 The 8th International Conference on Artificial Intelligence and Big Data (ICAIBD 2025)
ICGDA--EI 2025   2025 8th International Conference on Geoinformatics and Data Analysis (ICGDA 2025)
ACM ICMIP 2025   ACM--2025 10th International Conference on Multimedia and Image Processing (ICMIP 2025)
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 2