posted by organizer: okip || 2377 views || tracked by 3 users: [display]

AISA 2021 : 2021 International Conference on Advances in Information Security and Assurance (AISA)


When Nov 15, 2021 - Nov 18, 2021
Where Oklahoma City, OK, USA and Online
Abstract Registration Due Aug 17, 2021
Submission Deadline Aug 31, 2021
Categories    information security   information assurance

Call For Papers

[Apologies if you receive multiple copies, we fell behind our schedule in making this Call for Papers months earlier due to difficulties in securing a location that provides ample space for social distancing.]
--- 1st Call for Abstracts and Papers -------------
2021 OkIP International Conference on Advances in Information Security and Assurance (AISA)
MNTC Conference Center, Oklahoma City, OK, USA & Online
November 15-18, 2021

AISA aims to bring together scholars from different disciplinary backgrounds to emphasize the dissemination of ongoing research and development in the field. Proposals are solicited describing original works in fields below and related technologies.
AISA will include a peer-reviewed program of technical, industrial, and poster sessions. Accepted and presented full papers from the tracks below will be published in the conference proceedings and submitted for indexation in major abstract and citation databases of peer-reviewed literature. Extended versions of best papers will be considered for the inaugural issue of the International Journal of Information Technology Research ISSN 1553-653X.

)) IS Modeling and Design
- Information Security (IS) Architecture Design
- IS Authentication and Privacy Control
- IS Frameworks and Protocols
- IS Architecture Design and Testing
- Data Breach Protection
- Information Systems Security
- Information Analytical Models
- IS Modeling and Analysis
- Critical Information Management
- IS Performance, Requirements, and Issues
- Security Information Sharing

)) AI in Security
- AI/ Machine Learning for Security
- Cryptographic Checksuns and Algorithms
- Risk and Reputation Management
- Malware Detection and Response
- Vulnerability Analysis and Countermeasures
- Intrusion Detection and Anomaly Recovery
- Information/Temporal Access Controls
- Vulnerability Detection
- Improved Authentication Process
- Information Hiding and Anonymity
- Behavioral Biometrics
- Security Situational Awareness

)) Security and Distributed Systems
- Edge Computing Security
- Trusted Computing | Crowdsourcing
- Cyber-physical Systems Security
- Distributed Systems Security
- Embedded Systems Security
- IS Virtualization and Data Center Network
- Secure Internet Connectivity
- Cloud Security and Adoption Risks
- Physical-layer Security

)) Wireless and Digital Forensics
- Trust Authority Distribution
- Wireless Network Information Assurance (IA)
- Bluetooth Information Assurance
- Radio Frequency Fingerprints
- Intelligent Forensic Systems
- Honeypot Deception and Forensics
- Steganography Techniques
- Cyber-Attack Thwarting
- Crime Data Mining
- Anti-Spam Filtering Techniques
- Untrusted Hardware Testing
- Privacy Preservation and Protection
- Intelligent and Secure Autofill Systems

)) IA and Information Warfare
- Secure Passport System
- Insider Threat Prediction
- Key Management and Recovery
- Critical Infrastructure Protection
- Threat Awareness Analysis
- Traffic Flow Confidentiality
- Intellectual Property Protection
- Cyber-Attack and Cyber-Terrorism
- Tamper Detection and Prevention
- Physical Security and Soldier Security
- Electromagnetic Bomb and Electronic Attack
- Tactical Communication and Network Security

)) IS & IA Applications
- Electronic Voting System
- Signature Verification
- Parental Control Systems
- Biometric Protection
- Watermarking Techniques
- Secure Diagnostic
- Mobile Security | Database Security
- Intelligent and Secure Autofill System
- Energy Harvesting Security
- IS & IA Awareness and Education
- Green Communications Security
- Power Information System Security
- Corporations and Businesses Protection
- Internet of Things Security
- Software Security Assurance

)) IS & IA Policy and Legal Issues
- IS & IA Policy Approaches
- IS & IA Enforcement Models
- Cybersecurity Legal
- Regulatory Issues
- Digital Rights Management
- Ethics, Identity and Trust Management
- Steganography Legal Issues

)) Technical Research & Industry Contribution
- Full Paper: Accomplished research results (6 pages)
- Short Paper: Work in progress/fresh developments (3 pages)
- Poster/Journal First: Displayed/Oral presented (1 page)

)) Corporate Showcase & Exhibition
- Booth: Display product and/or service offerings (1 page)
- Oral: Present product and/or service offerings (1 page)

)) Student Poster & Career Fair
- Graduate & Doctoral: Peer-reviewed Poster (1 page)
- Undergraduate/High School: Selected Poster (1 page)
- Recruiter Booth: Product/Service & Job offerings (1 page)

)) Workshop, Tutorial, Forum & Panel
- Workshop, Tutorial & Tour: Proposal (1 page)
- Executive Forum, Panel & Talk: Proposal (1 page)

)) Important Dates:
- Submission: Aug 31, 2021
- Notification: Sep 26, 2021
- Conference: Nov 15-18, 2021

)) Technical Program Committee

)) Venue

)) Co-located Conferences and Events

)) For more information, submission details, and important dates visit:

Please feel free to contact us for any inquiry at:

Pierre Tiako
2021 OkIP AISA General Chair

Related Resources

IEEE-Ei/Scopus-ACEPE 2024   2024 IEEE Asia Conference on Advances in Electrical and Power Engineering (ACEPE 2024) -Ei Compendex
JARES 2024   International Journal of Advance Robotics & Expert Systems
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ACM AICCC 2024   ACM--2024 7th Artificial Intelligence and Cloud Computing Conference (AICCC 2024)
CyberHunt 2024   7th Annual Workshop on Cyber Threat Intelligence and Hunting in conjunction with the IEEE Big Data Conference
Ei/Scopus-AIMLR 2024   2024 2nd Asia Conference on Artificial Intelligence, Machine Learning and Robotics (AIMLR 2024)
Applied Sciences (MDPI) SI:Cybersecurity 2024   Applied Sciences (MDPI) Special Issue - Cybersecurity: Advances in Security and Privacy Enhancing Technology
ICBTA 2024   ACM--2024 7th International Conference on Blockchain Technology and Applications (ICBTA 2024)
LAJC 2024   Latin-American Journal of Computing
ICICT 2025   IEEE--2025 The 8th International Conference on Information and Computer Technologies (ICICT 2025)