posted by user: b0bc4t || 4728 views || tracked by 3 users: [display]

ISSA 2019 : 18th International Information Security South Africa Conference


Conference Series : Information Security for South Africa
When Aug 14, 2019 - Aug 15, 2019
Where Johannesburg, South Africa
Submission Deadline Apr 20, 2019
Notification Due Jun 29, 2019
Final Version Due Jul 9, 2019
Categories    information security   digital forensics   security awareness   cyber security

Call For Papers


ISSA 2019

18th International Information Security for South Africa Conference
14 to 15 Aug 2019
Johannesburg, South Africa

The 18th international ISSA conference will be held from 14 to 15 Aug 2019 in Johannesburg, South Africa. As with the previous ISSA conferences, the forthcoming ISSA 2019 will again present the latest developments in information security, and bring together national and international researchers and practitioners. We solicit previously unpublished papers offering novel research contributions in any aspect of information security.

As for ISSA 2018, the poroceedings to be published in Springer CCIS (Communications in Computer and Information Science) pending approval.
CCIS is abstracted/indexed in DBLP, Google Scholar, EI-Compendex, Mathematical Reviews, SCImago, Scopus.
CCIS volumes are also submitted for the inclusion in ISI Proceedings.

Full papers submission: 20 April 2019
Notification of acceptance: 29 June 2019
Camera-ready papers: 9 July 2019
Conference: 14 – 15 Aug 2019

Authors are invited to submit original papers not previously published nor
submitted in parallel for publication to any other conference, workshop or journal.

Topics include, but are not limited to:
Access control
Applied cryptography
Big data forensics
Cloud computing security
Cyber-security & Big Data & Data Science
Data and application security
Digital forensics
Human aspects of information security
Identification and authentication
Identity management
Information security awareness and training
Information security governance
Information security risk analysis
Intrusion detection and fraud detection
Legal and ethical aspects of information security
Mobile computing security
Network security
Security and usability
Security of distributed architectures and infrastructures
Software security
Standards, guidelines and certification
Trust models and trust management
Trusted computing

Reinhardt Botha, Department of Information Technology, Nelson Mandela University
Hein Venter, Department of Computer Science, University of Pretoria
Marijke Coetzee, Academy of Computer Science and Software Engineering, University of Johannesburg
Marianne Loock, School of Computing, University of South Africa
Mariki Eloff, Institute for Corporate Citizenship, University of South Africa
Jan Eloff, Department of Computer Science, University of Pretoria

Related Resources

MoDRE 2019   9th International Workshop on Model-Driven Requirements Engineering (MoDRE)
ICISSP 2020   6th International Conference on Information Systems Security and Privacy
ICEEI--EI Compendex, Scopus 2020   2020 The 5th International Conference on Electronics Engineering and Informatics (ICEEI 2020)--Scopus, Ei Compendex
ECCWS 2020   19th European Conference on Cyber Warfare and Security
EI-MEAMT 2020   2020 4th International Conference on Material Engineering and Advanced Manufacturing Technology (MEAMT 2020)
CyBlock 2020   COMSNET2020 Workshop - Workshop on Cyber Security and Blockchain
SP 2020   IEEE Symposium on Security and Privacy
ICITST 2019   The 14th International Conference for Internet Technology and Secured Transactions
ASIACCS 2020   ACM ASIACCS 2020 : The 15th ACM ASIA Conference on Computer and Communications Security
CyberHunt 2019   International Workshop on Big Data Analytics for Cyber Threat Hunting (CyberHunt 2019)