| |||||||||||||||
ISSA 2017 : 16th International Information Security for South Africa conferenceConference Series : Information Security for South Africa | |||||||||||||||
Link: http://www.infosecsa.co.za | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
CALL FOR PAPERS
------------------------------------------------------------------------------------ ISSA 2017 16th International Information Security for South Africa Conference http://www.infosecsa.co.za 16 to 17 Aug 2017 Johannesburg, South Africa ------------------------------------------------------------------------------------ ISSA 2017 is co-sponsored by the IEEE Systems, Man and Cybernetics Society (SMCS) Chapter, a chapter of the IEEE South Africa Section, and is also supported by IFIP. Accepted and registered papers will be published by IEEE Computer Society Press as well as submitted to DBLP The 16th international ISSA conference will be held from 16 to 17 Aug 2017 in Johannesburg, South Africa. As with the previous ISSA conferences, the forthcoming ISSA 2017 will again present the latest developments in information security, and bring together national and international researchers and practitioners. We solicit previously unpublished papers offering novel research contributions in any aspect of information security. Visit http://www.infosecsa.co.za for more details on the topics, guidelines and other information. IMPORTANT DATES --------------------------- Full papers: extended to 7 May 2017 Notification of acceptance: 30 June 2017 Camera-ready papers: 10 July 2017 Conference: 16 - 17 Aug 2017 SUBMISSION DETAILS ----------------------------- Authors are invited to submit original papers not previously published nor submitted in parallel for publication to any other conference, workshop or journal. Topics include, but are not limited to: Access control Applied cryptography Audit Big data forensics Cloud computing security Cyber-security Cyber-security & Big Data & Data Science Data and application security Digital forensics Human aspects of information security Identification and authentication Identity management Information security awareness and training Information security governance Information security risk analysis Intrusion detection and fraud detection Legal and ethical aspects of information security Mobile computing security Network security Phishing Privacy Security and usability Security of distributed architectures and infrastructures Software security Standards, guidelines and certification Trust models and trust management Trusted computing ORGANISING COMMITTEE Hein Venter (hventer@cs.up.ac.za), Department of Computer Science, University of Pretoria Marijke Coetzee (marijkec@uj.ac.za), Academy of Computer Science and Software Engineering, University of Johannesburg Marianne Loock (loockm@unisa.ac.za), School of Computing, University of South Africa Mariki Eloff (eloffmm@unisa.ac.za), Institute for Corporate Citizenship, University of South Africa Jan Eloff (eloff@cc.up.ac.za), Department of Computer Science, University of Pretoria |
|