posted by user: ramanma || 9007 views || tracked by 17 users: [display]

ICISS 2013 : 9th International Conference on Information Systems Security

FacebookTwitterLinkedInGoogle


Conference Series : International Conference on Information Systems Security
 
Link: http://www.iciss.org.in
 
When Dec 16, 2013 - Dec 20, 2013
Where Kolkata, India
Submission Deadline Jul 21, 2013
Notification Due Aug 25, 2013
Final Version Due Sep 13, 2013
Categories    computer security   application security   cloud security   communication security
 

Call For Papers

The deadline has been extended to July 21, 2013 for research paper submissions.

=========================================================================

9th International Conference on Information Systems Security (ICISS 2013)

16 -- 20 December, 2013

Kolkata, India

URL: http://www.iciss.org.in

http://www.cs.colostate.edu/~iciss13

Also follow us on: http://www.facebook.com/iciss2013

CALL FOR PAPERS

The conference series ICISS (International Conference on Information Systems Security), held annually, provides a forum for disseminating the latest research results in information and systems security. ICISS 2013, the ninth conference in this series, will be held under the aegis of the newly formed Society for Research in Information Security and Privacy (SRISP). The acceptance ratio of the first eight conferences has averaged less than 30%, and the proceedings have been published as part of the Springer Verlag series of Lecture Notes in Computer Science. ICISS 2013 encourages submissions from the academia, industry and government addressing theoretical and practical problems in information and systems security and related areas.


Topics of interest include but are not limited to:

Application Security

Authentication and Audit

Access and Usage Control

Biometric Security

Cloud Security

Cryptographic Protocols

Cyber-physical Systems Security

Data Security and Privacy

Digital Forensics

Digital Rights Management

Distributed Systems Security

Formal Models in Security

Identity Management

Intrusion Detection and Prevention

Intrusion Tolerance and Recovery

Key Management

Language-based Security

Malware Analysis and Mitigation

Network Security

Operating Systems Security

Privacy and Anonymity

Secure Data Streams

Security and Usability

Security Testing

Sensor and Ad Hoc Network Security

Smartphone Security

Software Security

Vulnerability Detection and Mitigation

Usable Security

Web Security


Important Dates:

Manuscript Submission (Full Paper): 12 July 2013 (NEW DEADLINE: July 21)

Tutorial and Panels Proposal Submission: 5 July 2013

Notification of Acceptance: 25 August 2013

Camera-ready Manuscript Due: 13 September 2013



Paper Submission:

Submissions must be made online at https://www.easychair.org/conferences/?conf=iciss20130. Papers should be formatted as they would appear in the final LNCS proceedings. Papers should be at most 15 pages in length, including the bibliography. One of the authors of an accepted paper must attend the conference to present the paper. Conference papers will be presented on Dec. 18th -- 20th, 2013. ICISS accepts only electronic submissions in PDF format. Note that our publisher, Springer LNCS series, strongly prefers camera-ready manuscripts to be submitted in LaTeX2e (or LaTeX) format using the llncs.cls LaTeX template provided by Springer. See detailed manuscript preparation instructions and options at Information for LNCS authors: http://www.springer.com/computer/lncs?SGWID=0-164-7-72376-0

Dual Submission Policy:

Submitted papers must not substantially overlap with papers published or currently submitted to a journal or conference with proceedings.

Proceedings:

Conference proceedings will be published in the Springer LNCS series.

Tutorial Proposals:

There will be tutorial program for two days (16-17 December 2013). At most four three-hour tutorials will be offered. Proposals are invited for tutorials of duration three hours on relevant topics of current interest. A tutorial proposal should include the extended abstract of the tutorial and a brief biography of the speaker(s). Please mail your proposal to the Tutorial Chair (reachable via tamal.goswami@gmail.com).

The speaker(s) of the accepted proposals need to submit their final presentation one month before the conference to the Tutorial Chair.

More information is available at the conference websites: http://www.iciss.org.in

http://www.cs.colostate.edu/~iciss13


Contact:

Dr. Pinakpani Pal

Organizing Chair, ICISS 2013

Electronics & Communication Sciences Unit (ECSU)

Indian Statistical Institute

203, B.T.Road, Kolkata 700108, India.

e-mail: iciss2013@isical.ac.in

Fax: +91-33-25752914



Program Chairs:

Aditya Bagchi: aditya@isical.ac.in

Indrakshi Ray: iray@cs.colostate.edu

Related Resources

ICISS 2025   ACM--2025 The 8th International Conference on Information Science and Systems (ICISS 2025)
IOTBS 2025   5th International Conference on IOT, Big Data and Security
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
ICISSP 2025   11th International Conference on Information Systems Security and Privacy
ACM ICISS 2025   ACM--2025 The 8th International Conference on Information Science and Systems (ICISS 2025)
SECRYPT 2025   22nd International Conference on Security and Cryptography
Hong Kong-MIST 2025   2025 Asia-Pacific Conference on Marine Intelligent Systems and Technologies (MIST 2025)
JITST 2024   Journal of Internet Technology and Secured Transactions
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
EMERGING 2025   The Seventeenth International Conference on Emerging Networks and Systems Intelligence