posted by user: iCatse || 1413 views || tracked by 1 users: [display]

ICISS 2015 : 2nd International Conference on Information Science and Security (ICISS 2015)

FacebookTwitterLinkedInGoogle

Link: http://icatse.org/iciss/
 
When Dec 14, 2015 - Dec 16, 2015
Where Seoul, Republic of Korea
Submission Deadline Sep 8, 2015
Notification Due Oct 5, 2015
Final Version Due Oct 20, 2015
Categories    information security   information system   information techology   information science
 

Call For Papers

ICISS 2015 conference organized by Korea Convergence Security Association(KCSA)

ICISS 2015 has paper submission in different categories: main conference theme papers, workshop papers, and poster session papers.

Important Conference Deadlines
Paper Submission Deadline: September 1st, 2015
Notification of Paper Acceptance: September 30th, 2015
Final Paper & Copyright: October 20th, 2015
Conference date: December 14th – 16th, 2015

Conference Scope and Topics

Track 1: Information Security
•Access Control
•Anti-Malware
•Accounting and Audit
•Applied Cryptography
•Authentication and Authorization
•Biometrics
•Block and Stream Ciphers
•Cryptanalysis
•Cryptographic Protocol
•Cloud Computing Security
•Database Security
•Digital Forensics
•Distributed System Security
•Electronic Commerce
•Embedded Systems Security
•Hardware Security
•Homomorphic Encryption
•ID-Based Cryptography
•Intrusion Detection and Prevention
•Key Management
•Mobile and Wireless Security
•Network Security
•Operating System Security
•Privacy-Enhancing Technology
•Public Key Cryptography
•Security Architectures
•Security Policy
•Software Security
•Usable Security and Privacy
•Web Security

Track 2: Information and Computer Science
•Artificial Intelligence
•Cloud Computing
•Communication
•Computer Hardware
•Computer Vision
•Data Mining
•Digital Information
•E-learning
•Graphics and Visualization
•Hardware-Software Integration
•Human-Computer Interaction & Interactive Multimedia
•Image Processing
•Internet Technology
•Machine Learning
•Pattern Recognition
•Modeling and Simulation
•Multimedia Computing
•Networks
•Operating Systems
•Optimization
•Robotics
•Simulators
•Soft Computing
•Software Engineering
•Wearable Computing

Submitted papers will subject to stringent peer review by at least three experts and carefully evaluated based on originality, significance and clarity of exposition. Accepted papers will appear in the conference proceedings that will be indexed in EI, ISI, and Scopus. The authors of a selected number of top quality papers will be requested to extend their paper in order to be published as special issues in highly recognized international journals.

ICISS 2015 conference organized by Korea Convergence Security Association(KCSA)

Related Resources

CSP 2023   2023 7th International Conference on Cryptography, Security and Privacy (CSP 2023)
IJPLA 2022   International Journal of Programming Languages and Applications
EI-CFAIS 2022   2022 International Conference on Frontiers of Artificial Intelligence and Statistics (CFAIS 2022)
EI/Scopus--SPISCS 2022   2022 International Conference on Signal Processing, Information System and Cyber Security (SPISCS 2022)
ICISS--ACM, Ei Compendex and Scopus 2022   ACM--2022 The 5th International Conference on Information Science and Systems (ICISS 2022)--EI Compendex, Scopus
FCSIT 2022   2022 4th Euro-Asia Conference on Frontiers of Computer Science and Information Technology (FCSIT 2022)
JMC 2022   JOURNAL OF MATHEMATICAL CRYPTOLOGY
CyberHunt 2022   IEEE BigData Workshop on Cyber Threat Intelligence and Hunting
NISecurity 2022   2022 International Conference on Network and Information Security (NISecurity 2022)
CSP--Scopus, Ei 2023   2023 7th International Conference on Cryptography, Security and Privacy (CSP 2023)--Ei Compendex, Scopus