ICICS: International Conference on Information and Communication Security

FacebookTwitterLinkedInGoogle

 

Past:   Proceedings on DBLP

Future:  Post a CFP for 2025 or later   |   Invite the Organizers Email

 
 

All CFPs on WikiCFP

Event When Where Deadline
ICICS 2024 ICICS 2024: 26th International Conference on Information and Communications Security
Aug 26, 2024 - Aug 30, 2024 Mytilene, Greece Feb 2, 2024
ICICS 2023 The 25th International Conference on Information and Communications Security
Nov 18, 2023 - Nov 20, 2023 Nankai University,Tianjin, China Apr 6, 2023
ICICS 2022 The 24th International Conference on Information and Communications Security
Sep 5, 2022 - Sep 8, 2022 Canterbury, UK + virtual Apr 11, 2022
ICICS 2021 the 23rd International Conference on Information and Communications Security
Sep 17, 2021 - Sep 19, 2021 Chongqing, China May 11, 2021
ICICS 2020 22nd International Conference on Information and Communications Security
Aug 24, 2020 - Aug 27, 2020 copenhagen, Denmark May 3, 2020
ICICS 2019 The 21st International Conference on Information and Communications Security
Dec 15, 2019 - Dec 17, 2019 Beijing, China Sep 10, 2019
ICICS 2018 The 20th International Conference on Information and Communications Security
Oct 29, 2018 - Oct 31, 2018 Lille, France Jun 8, 2018
ICICS 2014 The 16th International Conference on Information and Communications Security
Dec 16, 2014 - Dec 17, 2014 Hong Kong Aug 15, 2014
ICICS 2013 15th International Conference on Information and Communications Security
Nov 20, 2013 - Nov 22, 2013 Beijing, China Jun 5, 2013
ICICS 2010 Twelfth International Conference on Information and Communications Security
Dec 15, 2010 - Dec 17, 2010 Barcelona Jul 22, 2010
 
 

Present CFP : 2024

The 2024 International Conference on Information and Communications Security (ICICS 2024) is the 26th edition of a series of a highly successful international conference on information and communications security, since 1997.

------------------------------------------------------------------------------------------------------------

Submission Guidelines

Authors are invited to submit original papers not previously published nor submitted in parallel for publication to any other conference, workshop or journal. All submitted papers must be anonymous, with no author names, affiliations, acknowledgements, or obvious references, for double blind reviews.

Full papers 20 pages, including the bibliography and well-marked appendices
Short papers 12 pages, including the bibliography and well-marked appendices.

------------------------------------------------------------------------------------------------------------


List of Topics

Access control and authorization
AI-based security and privacy
Anonymity
Applied cryptography
Threat scenarios, attack models and security analysis
Attestation
Authentication
Biometrics security and privacy
Blockchain and cryptocurrencies
Cloud computing and virtualization security
Cybercrime
Cyber deception and fraud
Cyber incident response and recovery
Critical infrastructure protection
Cyber physical systems security
Cyber resilience
Cyber security education, training, and awareness
Cyber threat intelligence
Data security and privacy
Digital forensics
Digital rights management
Digital watermarking
Distributed systems security
Economics of security and privacy
Edge and fog computing security
Embedded systems security
Emergency response and recovery
Formal methods for security
Hardware security
Identity management
Information security management
Internet censorship and defense
Intrusion detection and prevention
Malware and unwanted software
Misinformation, disinformation, and fake news
Mobile security and privacy
Online safety and child protection
Online social media security, privacy, and trust
Operating systems security
Network security
Privacy enhancing technologies and mechanisms
Risk management
Security of communication protocols
Secure information flow
Security management
Security and privacy for the (Industrial) Internet of Things
Security and privacy of AI (e.g., adversarial machine learning and federated learning)
Security and privacy metrics and policies
Security operations and incident management
Security visualization
Secure systems design and architectures
Side channel attacks
Software and application security
Steganography and steganalysis
Trusted computing
Trust management and reputation
Usable security and privacy
Vulnerability detection and prevention
Web security and privacy

------------------------------------------------------------------------------------------------------------

Publication

Accepted papers will be included in the conference's proceedings. It is planned to have these published by Springer in its Lecture Notes in Computer Science (LNCS) series, as post-proceedings. Pre-proceedings will be made available shortly before and during the event. Please note that at least one author of each accepted paper must register to the conference and give a presentation at the conference. Failure to register or absence from the presentation will eventually make your paper NOT being included in the conference proceedings.

------------------------------------------------------------------------------------------------------------

Venue

The conference will be held in the premises of the University of the Aegean, in Mytilene, Greece.

------------------------------------------------------------------------------------------------------------

Contact

All questions about submissions should be emailed to one of the program committee chairs at: sokratis.katsikas@ntnu.no or xenakis@unipi.gr
 

Related Resources

ICITS 2025   2025 The 13th International Conference on Information Technology and Science (ICITS 2025)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ICISPC--EI 2025   2025 Ninth International Conference on Imaging, Signal Processing and Communications (ICISPC 2025)
ACM AICCC 2024   ACM--2024 7th Artificial Intelligence and Cloud Computing Conference (AICCC 2024)
IEEE ICSIP 2025   IEEE--2025 10th International Conference on Signal and Image Processing (ICSIP 2025)
ISIR 2024   2024 5th International Conference on Information Security and Information Retrieval (ISIR 2024)
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
ITNG 2024   The 21st Int'l Conf. on Information Technology: New Generations ITNG 2024
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
BDAB 2025   6th International Conference on Big Data and Blockchain