| |||||||||||||||||
ICISS 2022 : 18th International Conference on Information Systems SecurityConference Series : International Conference on Information Systems Security | |||||||||||||||||
Link: https://www.icissconf.org | |||||||||||||||||
| |||||||||||||||||
Call For Papers | |||||||||||||||||
The International Conference on Information Systems Security (ICISS), held annually in India, is a forum for dissemination of research results and a place of meeting of finer minds on computer security. ICISS 2022, the 18th edition of the conference, will be held at IIT Tirupati in the city of Tirupati from December 16 to 20, 2022. The conference will include a high quality technical papers, a set of visionary/invited papers on important and timely topics from well-known leaders in the field, and a session on the work in progress. Along side the broader objectives, the ICISS 2022 emphasizes on enhancing the co-operation between India and Australia on information security research activity. The conference therefore invites the researchers and security enthusiasts to take advantage of the forum to share and discuss the subject concerns to the topic of computer security.
------------------- Research Areas ------------------- The scope includes both theoretical and applied research within the broad area of information and systems security as mentioned below. * Network and Hardware Security: 5G/6G Network security, Mobile network security, IoT Security, Sensor and ad-hoc network security, Intrusion detection and recovery * Data Security and Privacy: Key management, Cryptographic protocols, Privacy and anonymity, Secure data streams, Cloud Security * Systems Security: Access control, Logging and Auditing, Distributed systems security, Operating systems security, Cyber-physical systems security * Application Security: Vulnerability detection and mitigation, Software security, Web security, Malware analysis, Security testing, SDLC Security * Human-Centric Security: Usable authentication/Bio-metric security, Usable security, Usable privacy, Usage control, Identity management, Ethics/Law/Policy/Responsible innovation in security * Emerging areas: Quantum security, AI/ML security, Blockchain security, Critical infrastructure security, Digital forensics, Threat hunting, Vulnerability and threat management ------------------------- Submission Guidelines ------------------------- This year, we invite papers in multiple categories * Regular papers, which present mature, complete research results. These papers should be at most 20 pages in length, including bibliography. * Work-in-progress (WiP) papers for early dissemination of research that isn't yet complete. These papers should be at most 12 pages in length, including bibliography. WiP papers must clearly identify the goals of the work and the technical approach, and include enough initial development to demonstrate viability of the approach. The title must be prefixed with "WiP: " to clearly indicate that the submission is a WiP paper. * Visionary papers from seasoned researchers or technical committees to share their visions on a significant trend or technical challenges, and the innovative ideas/concepts that may produce a wide range of impacts in the area of information and systems security. A paper of this type is intended to promote, influence or lead the research activities in the subject area. Papers must be written in English and submitted in the Springer Verlag LNCS Latex or Word style in PDF format, via EasyChair (Link https://easychair.org/conferences/?conf=iciss20221). The review process is single-blind, meaning that author names will be visible to reviewers. ----------------- Proceedings ----------------- The past proceedings of the conference are published by Springer Verlag as part of their LNCS series. The same tradition will follow. The extended versions of selected and accepted papers will be invited for publication in the Indian Academy of Sciences’ journal-SADHANA. ICISS will also have a best paper award. |
|