posted by user: hooklee || 1154 views || tracked by 8 users: [display]

ICICS 2022 : The 24th International Conference on Information and Communications Security


Conference Series : International Conference on Information and Communication Security
When Sep 5, 2022 - Sep 8, 2022
Where Canterbury, UK + virtual
Submission Deadline Apr 11, 2022
Notification Due Jun 6, 2022
Final Version Due Jun 20, 2022
Categories    information security   cyber security   privacy   cryptology

Call For Papers


The 24th International Conference on Information and Communications Security
(ICICS 2022) is the next event in a series of highly successful international
conference on information and communications security since 1997.

Previous editions of ICICS were held in
China (1997, 2001, 2003, 2005, 2007, 2009, 2011-2015, 2017, 2019, 2021);
Denmark (2020); France (2018); Singapore (2002,2016); Spain (2004,2010);
UK (2008); USA (2006); and Australia (1999).

Considering the uncertainties around the ongoing COVID-19 pandemic and travel
restrictions of some countries, ICICS 2022 will be held as a hybrid event, allowing
both physical attendance and remote participation.

==Important Dates==

* Submission deadline (EXTENDED): April 11 (23:59 AoE)
* Notification: June 6
* Camera-ready due: June 20


ICICS 2022 will have four awards for papers submitted and presented at the Conference. All award winners will receive a certificate from the Conference and a cash award sponsored by Springer or the Institute of Cyber Security for Society (iCSS), University of Kent.

Best Paper Award and Best Student Paper Award sponsored by Springer

Best Presentation Award and Best Artifact Award sponsored by iCSS, University of Kent

==Topics of Interest==

Topics of interest include, but are not limited to:

* Access control and authorization
* AI-based security and privacy
* Anonymity
* Applied cryptography
* Threat scenarios, attack models and security analysis
* Attestation
* Authentication
* Biometrics security and privacy
* Blockchain and cryptocurrencies
* Cloud computing and virtualization security
* Cybercrime and online harms
* Cyber deception and fraud
* Cyber incident response and recovery
* Critical infrastructure protection
* Cyber physical systems security
* Cyber resilience
* Cyber security education, games and awareness
* Cyber threat intelligence
* Data security and privacy
* Digital forensics
* Digital rights management
* Digital watermarking
* Distributed systems security
* Economics of security and privacy
* Edge and fog computing security
* Embedded systems security
* Emergency response and recovery
* Hardware security
* Identity management
* Information security management
* Internet censorship and defence
* Intrusion detection and prevention
* Malware and unwanted software
* Misinformation, disinformation and fake news
* Mobile security and privacy
* Online safety and child protection
* Online social media security, privacy and trust
* Operating systems security
* Network security
* Privacy enhancing technologies and mechanisms
* Security of communication protocols
* Secure information flow
* Security and privacy for (Industrial) Internet of Things
* Security and privacy of AI (e.g., adversarial AI and federated learning)
* Security and privacy metrics and policies
* Security operations and incident management
* Security visualization
* Secure systems design and architectures
* Side channel attacks
* Software and application security
* Steganography and steganalysis
* Trusted computing
* Trust management and reputation
* Usable security and privacy
* Web security and privacy

==Paper Submission Guidelines==

Submissions must be made through EasyChair at:
Papers must be received by the aforementioned dates 23:59 (AOE).

Authors are invited to submit original papers not previously published nor
submitted in parallel for publication to any other conference, workshop or
journal. All submitted papers must be anonymous, with no author names,
affiliations, acknowledgements, or obvious references, for double blind

Accepted papers will be presented at ICICS 2022 and included in the
conference's proceedings published by Springer in its Lecture Notes in
Computer Science (LNCS) series. Please note that at least one author of
each accepted paper should register with full rate to the conference and
give a presentation at the conference. Failure to register or absence from
the presentation will eventually make your paper NOT being included in the
conference proceedings.

Submissions should be in English, as a PDF file with all fonts embedded, in
the Springer LNCS format, typeset with 10pt font, and using reasonable spacing
and margins. Papers should not exceed 16 pages in LNCS style including the
bibliography, but excluding well-marked appendices (no more than 18 pages in
total). Note that papers should be intelligible without all appendices, since
committee members are not required to read them. Submitted papers may risk
being rejected directly without consideration of their merits if they do not
follow all the above submission instructions. More details about the Springer
LNCS format and templates can be found at:

==Call for Posters and Demos==

A separate call for posters and demos is being planned. More details will be
sent after the submission deadline of regular papers. A Best Poster/Demo Award
will be provided by the Institute of Cyber Security for Society (iCSS), University of

==Organisation Committee==

--General Co-Chairs--

Shujun Li, University of Kent, Canterbury, UK
Pierangela Samarati, Università degli Studi di Milano, Italy

--Program Committee Co-Chairs--

Cristina Alcaraz, University of Malaga, Spain
Liqun Chen, University of Surrey, UK

--Local Arrangement Co-Chairs--

Budi Arief, University of Kent, UK
Sanjay Bhattacherjee, University of Kent, UK

--Publicity Co-Chairs--

Kalikinkar Mandal, University of New Brunswick, Canada
Ding Wang, Nankai University, China

--Poster/Demo Co-Chairs--

Özgür Kafalı, University of Kent, UK
Vineet Rajani, University of Kent, UK

--Web Chair--

Ali Raza, University of Kent, UK

--Steering Committee--

Jianying Zhou, Singapore University of Technology and Design, Singapore

Robert Deng, Singapore Management University, Singapore
Dieter Gollmann, Hamburg University of Technology, Germany
Javier Lopez, University of Malaga, Spain
Qingni Shen, Peking University, China
Zhen Xu, Institute of Information Engineering, Chinese Academy of Sciences, China

Related Resources

IJPLA 2022   International Journal of Programming Languages and Applications
CyberHunt 2022   IEEE BigData Workshop on Cyber Threat Intelligence and Hunting
CSW 2022   2022 International Workshop on Cyber Security (CSW 2022)
CSP--Scopus, Ei 2023   2023 7th International Conference on Cryptography, Security and Privacy (CSP 2023)--Ei Compendex, Scopus
EI/Scopus--SPISCS 2022   2022 International Conference on Signal Processing, Information System and Cyber Security (SPISCS 2022)
CEVVE 2022   2022 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2022)
CSP 2023   2023 7th International Conference on Cryptography, Security and Privacy (CSP 2023)
SI on ATD&IS II 2022   Special Issue on Advanced Technologies in Data and Information Security II, Applied Sciences, MDPI
ICMIP--Ei and Scopus 2023   2023 8th International Conference on Multimedia and Image Processing (ICMIP 2023)--Ei Compendex, Scopus