posted by user: MeredyddWilliams || 18006 views || tracked by 7 users: [display]

ISSA 2016 : 15th International Information Security for South Africa Conference

FacebookTwitterLinkedInGoogle


Conference Series : Information Security for South Africa
 
Link: http://www.infosecsa.co.za
 
When Aug 17, 2016 - Aug 18, 2016
Where Johannesburg, South Africa
Abstract Registration Due Apr 18, 2016
Submission Deadline May 8, 2016
Notification Due Jul 1, 2016
Final Version Due Jul 9, 2016
Categories    security   network security   information security managemen   digital forensics
 

Call For Papers

The 15th international ISSA conference will be held from 17 to 18 Aug 2016
in Johannesburg, South Africa. As with the previous ISSA conferences, the
forthcoming ISSA 2016 will again present the latest developments in
information security, and bring together national and international
researchers and practitioners.

We solicit previously unpublished papers offering novel research contributions
in any aspect of information security.

ISSA 2016 is co-sponsored by the IEEE Systems, Man and Cybernetics Society (SMCS)
Chapter, a chapter of the IEEE South Africa Section, and is also supported by IFIP.

Accepted and registered papers will be published by IEEE Computer Society Press
as well as submitted to DBLP

IMPORTANT DATES
---------------------------
Abstract submission: 3 April 2016 **open
Full papers: 19 April 2016 **extended to 8 May
Notification of acceptance: 1 July 2016
Camera-ready papers: 9 July 2016
Conference: 17 - 18 Aug 2016


SUBMISSION DETAILS
-----------------------------
Authors are invited to submit original papers not previously published nor
submitted in parallel for publication to any other conference, workshop or journal.

Topics include, but are not limited to:
Access control
Applied cryptography
Audit
Big data forensics
Cloud computing security
Cyber-security
Cyber-security & Big Data & Data Science
Data and application security
Digital forensics
Human aspects of information security
Identification and authentication
Identity management
Information security awareness and training
Information security governance
Information security risk analysis
Intrusion detection and fraud detection
Legal and ethical aspects of information security
Mobile computing security
Network security
Phishing
Privacy
Security and usability
Security of distributed architectures and infrastructures
Software security
Standards, guidelines and certification
Trust models and trust management
Trusted computing

Please visit http://www.infosecsa.co.za for more details on the topics, guidelines
and other information.

ORGANISING COMMITTEE
Hein Venter (hventer@cs.up.ac.za), Department of Computer Science, University of Pretoria
Marijke Coetzee (marijkec@uj.ac.za), Academy of Computer Science and Software Engineering,
University of Johannesburg
Marianne Loock (loockm@unisa.ac.za), School of Computing, University of South Africa
Mariki Eloff (eloffmm@unisa.ac.za), Institute for Corporate Citizenship, University of South Africa
Jan Eloff (eloff@cc.up.ac.za), Department of Computer Science, University of Pretoria

Related Resources

ICICT 2025   IEEE--2025 The 8th International Conference on Information and Computer Technologies (ICICT 2025)
CTCM 2024   10th International Conference of Control Theory and Computer Modelling
CSP--EI 2025   2025 9th International Conference on Cryptography, Security and Privacy (CSP 2025)
ARIA 2024   11th International Conference on Artificial Intelligence & Applications
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
ICGDA--EI 2025   2025 8th International Conference on Geoinformatics and Data Analysis (ICGDA 2025)
CSP 2025   2025 9th International Conference on Cryptography, Security and Privacy (CSP 2025)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
BIBC 2024   5th International Conference on Big Data, IOT and Blockchain
ICMIP 2025   2025 10th International Conference on Multimedia and Image Processing (ICMIP 2025)