posted by user: ramanma || 5660 views || tracked by 17 users: [display]

ICISS 2013 : 9th International Conference on Information Systems Security

FacebookTwitterLinkedInGoogle


Conference Series : International Conference on Information Systems Security
 
Link: http://www.iciss.org.in
 
When Dec 16, 2013 - Dec 20, 2013
Where Kolkata, India
Submission Deadline Jul 21, 2013
Notification Due Aug 25, 2013
Final Version Due Sep 13, 2013
Categories    computer security   application security   cloud security   communication security
 

Call For Papers

The deadline has been extended to July 21, 2013 for research paper submissions.

=========================================================================

9th International Conference on Information Systems Security (ICISS 2013)

16 -- 20 December, 2013

Kolkata, India

URL: http://www.iciss.org.in

http://www.cs.colostate.edu/~iciss13

Also follow us on: http://www.facebook.com/iciss2013

CALL FOR PAPERS

The conference series ICISS (International Conference on Information Systems Security), held annually, provides a forum for disseminating the latest research results in information and systems security. ICISS 2013, the ninth conference in this series, will be held under the aegis of the newly formed Society for Research in Information Security and Privacy (SRISP). The acceptance ratio of the first eight conferences has averaged less than 30%, and the proceedings have been published as part of the Springer Verlag series of Lecture Notes in Computer Science. ICISS 2013 encourages submissions from the academia, industry and government addressing theoretical and practical problems in information and systems security and related areas.


Topics of interest include but are not limited to:

Application Security

Authentication and Audit

Access and Usage Control

Biometric Security

Cloud Security

Cryptographic Protocols

Cyber-physical Systems Security

Data Security and Privacy

Digital Forensics

Digital Rights Management

Distributed Systems Security

Formal Models in Security

Identity Management

Intrusion Detection and Prevention

Intrusion Tolerance and Recovery

Key Management

Language-based Security

Malware Analysis and Mitigation

Network Security

Operating Systems Security

Privacy and Anonymity

Secure Data Streams

Security and Usability

Security Testing

Sensor and Ad Hoc Network Security

Smartphone Security

Software Security

Vulnerability Detection and Mitigation

Usable Security

Web Security


Important Dates:

Manuscript Submission (Full Paper): 12 July 2013 (NEW DEADLINE: July 21)

Tutorial and Panels Proposal Submission: 5 July 2013

Notification of Acceptance: 25 August 2013

Camera-ready Manuscript Due: 13 September 2013



Paper Submission:

Submissions must be made online at https://www.easychair.org/conferences/?conf=iciss20130. Papers should be formatted as they would appear in the final LNCS proceedings. Papers should be at most 15 pages in length, including the bibliography. One of the authors of an accepted paper must attend the conference to present the paper. Conference papers will be presented on Dec. 18th -- 20th, 2013. ICISS accepts only electronic submissions in PDF format. Note that our publisher, Springer LNCS series, strongly prefers camera-ready manuscripts to be submitted in LaTeX2e (or LaTeX) format using the llncs.cls LaTeX template provided by Springer. See detailed manuscript preparation instructions and options at Information for LNCS authors: http://www.springer.com/computer/lncs?SGWID=0-164-7-72376-0

Dual Submission Policy:

Submitted papers must not substantially overlap with papers published or currently submitted to a journal or conference with proceedings.

Proceedings:

Conference proceedings will be published in the Springer LNCS series.

Tutorial Proposals:

There will be tutorial program for two days (16-17 December 2013). At most four three-hour tutorials will be offered. Proposals are invited for tutorials of duration three hours on relevant topics of current interest. A tutorial proposal should include the extended abstract of the tutorial and a brief biography of the speaker(s). Please mail your proposal to the Tutorial Chair (reachable via tamal.goswami@gmail.com).

The speaker(s) of the accepted proposals need to submit their final presentation one month before the conference to the Tutorial Chair.

More information is available at the conference websites: http://www.iciss.org.in

http://www.cs.colostate.edu/~iciss13


Contact:

Dr. Pinakpani Pal

Organizing Chair, ICISS 2013

Electronics & Communication Sciences Unit (ECSU)

Indian Statistical Institute

203, B.T.Road, Kolkata 700108, India.

e-mail: iciss2013@isical.ac.in

Fax: +91-33-25752914



Program Chairs:

Aditya Bagchi: aditya@isical.ac.in

Indrakshi Ray: iray@cs.colostate.edu

Related Resources

ACIIDS 2018   10th Asian Conference on Intelligent Information and Database Systems
Cybersecurity 2018   The 7th International Workshop on Cyber Security and Privacy
ICISS--Ei Compendex and Scopus 2018   2018 International Conference on Information Science and System (ICISS 2018)--Ei Compendex and Scopus
SCCCS 2018   The Second International Symposium on Cloud Computing and Cyber-Security
IJIBM 2019   Call For Papers - International Journal of Information, Business and Management
WPES 2018   Workshop on Privacy in the Electronic Society
CSITS 2018   International Workshop on Cyber Security for Intelligent Transportation Systems
ICISSP 2019   5th International Conference on Information Systems Security and Privacy
IWTCC 2018   The 3rd International Workshop on Trust in Cloud Computing
ENASE 2019   14th International Conference on Evaluation of Novel Approaches to Software Engineering