posted by user: ramanma || 5270 views || tracked by 17 users: [display]

ICISS 2013 : 9th International Conference on Information Systems Security

FacebookTwitterLinkedInGoogle


Conference Series : International Conference on Information Systems Security
 
Link: http://www.iciss.org.in
 
When Dec 16, 2013 - Dec 20, 2013
Where Kolkata, India
Submission Deadline Jul 21, 2013
Notification Due Aug 25, 2013
Final Version Due Sep 13, 2013
Categories    computer security   application security   cloud security   communication security
 

Call For Papers

The deadline has been extended to July 21, 2013 for research paper submissions.

=========================================================================

9th International Conference on Information Systems Security (ICISS 2013)

16 -- 20 December, 2013

Kolkata, India

URL: http://www.iciss.org.in

http://www.cs.colostate.edu/~iciss13

Also follow us on: http://www.facebook.com/iciss2013

CALL FOR PAPERS

The conference series ICISS (International Conference on Information Systems Security), held annually, provides a forum for disseminating the latest research results in information and systems security. ICISS 2013, the ninth conference in this series, will be held under the aegis of the newly formed Society for Research in Information Security and Privacy (SRISP). The acceptance ratio of the first eight conferences has averaged less than 30%, and the proceedings have been published as part of the Springer Verlag series of Lecture Notes in Computer Science. ICISS 2013 encourages submissions from the academia, industry and government addressing theoretical and practical problems in information and systems security and related areas.


Topics of interest include but are not limited to:

Application Security

Authentication and Audit

Access and Usage Control

Biometric Security

Cloud Security

Cryptographic Protocols

Cyber-physical Systems Security

Data Security and Privacy

Digital Forensics

Digital Rights Management

Distributed Systems Security

Formal Models in Security

Identity Management

Intrusion Detection and Prevention

Intrusion Tolerance and Recovery

Key Management

Language-based Security

Malware Analysis and Mitigation

Network Security

Operating Systems Security

Privacy and Anonymity

Secure Data Streams

Security and Usability

Security Testing

Sensor and Ad Hoc Network Security

Smartphone Security

Software Security

Vulnerability Detection and Mitigation

Usable Security

Web Security


Important Dates:

Manuscript Submission (Full Paper): 12 July 2013 (NEW DEADLINE: July 21)

Tutorial and Panels Proposal Submission: 5 July 2013

Notification of Acceptance: 25 August 2013

Camera-ready Manuscript Due: 13 September 2013



Paper Submission:

Submissions must be made online at https://www.easychair.org/conferences/?conf=iciss20130. Papers should be formatted as they would appear in the final LNCS proceedings. Papers should be at most 15 pages in length, including the bibliography. One of the authors of an accepted paper must attend the conference to present the paper. Conference papers will be presented on Dec. 18th -- 20th, 2013. ICISS accepts only electronic submissions in PDF format. Note that our publisher, Springer LNCS series, strongly prefers camera-ready manuscripts to be submitted in LaTeX2e (or LaTeX) format using the llncs.cls LaTeX template provided by Springer. See detailed manuscript preparation instructions and options at Information for LNCS authors: http://www.springer.com/computer/lncs?SGWID=0-164-7-72376-0

Dual Submission Policy:

Submitted papers must not substantially overlap with papers published or currently submitted to a journal or conference with proceedings.

Proceedings:

Conference proceedings will be published in the Springer LNCS series.

Tutorial Proposals:

There will be tutorial program for two days (16-17 December 2013). At most four three-hour tutorials will be offered. Proposals are invited for tutorials of duration three hours on relevant topics of current interest. A tutorial proposal should include the extended abstract of the tutorial and a brief biography of the speaker(s). Please mail your proposal to the Tutorial Chair (reachable via tamal.goswami@gmail.com).

The speaker(s) of the accepted proposals need to submit their final presentation one month before the conference to the Tutorial Chair.

More information is available at the conference websites: http://www.iciss.org.in

http://www.cs.colostate.edu/~iciss13


Contact:

Dr. Pinakpani Pal

Organizing Chair, ICISS 2013

Electronics & Communication Sciences Unit (ECSU)

Indian Statistical Institute

203, B.T.Road, Kolkata 700108, India.

e-mail: iciss2013@isical.ac.in

Fax: +91-33-25752914



Program Chairs:

Aditya Bagchi: aditya@isical.ac.in

Indrakshi Ray: iray@cs.colostate.edu

Related Resources

Social Information Systems @ HICSS-51   Social Information Systems Minitrack - Hawaii International Conference on System Sciences (HICSS-51)
ICCSP - Ei & Scopus 2018   2018 the 2nd International Conference on Cryptography, Security and Privacy (ICCSP 2018)--Ei Compendex and Scopus
ACIIDS 2018   10th Asian Conference on Intelligent Information and Database Systems
EMTTSS 2018   Emergent Methods, Techniques and Tools for Systems’ Security
ICANN 2018   27th International Conference on Artificial Neural Networks
DEXA 2018   29th International Conference on Database and Expert Systems Applications
ICISIP 2018   The 6th IIAE International Conference on Intelligent Systems and Image Processing 2018
ICIST 2018   24th International Conference on Information and Software Technologies
eCrime 2018   13th Symposium on Electronic Crime Research
ASYNC 2018   24st IEEE International Symposium on Asynchronous Circuits and Systems