posted by organizer: vannguyen || 1551 views || tracked by 6 users: [display]

IIIS 2016 : International Symposium on Information and Cyber Security


When Mar 8, 2016 - Mar 11, 2016
Where Orlando USA
Submission Deadline Dec 11, 2015
Notification Due Jan 10, 2016
Final Version Due Jan 16, 2016
Categories    security   cyber   cryptography   networking

Call For Papers

As it is widely known Cybercrime has had a large impact in our society including individuals as well as business and governmental organizations. Simultaneously, an exponentially increasing number of businesses and government sectors are increasingly becoming information-centric and reliant on communication technologies and networking in the context of the cyber-space. Consequently, there is an increasing concern regarding information security vulnerabilities and cyber security resilience, especially with respect to cyber-espionage, cyber-attacks and cyber-wars, cyber-crimes, etc.

Complex security systems are (or should be) embedded within enterprise architectures and organizational systems, which, in turn are also complex systems. These internal and external complexities require multi-disciplinary teams with skills for inter-disciplinary communication in order address the emerging problems in information and cyber security. Since multi-disciplinary forums oriented to inter-disciplinary communication are a main purpose of the events organized by the International Institute of Informatics and Systemics (IIIS,, then an International Symposium on Information and Cyber Security: Info/Cyber-Security will be organized in the context of IIIS conferences.

On the other hand, Information and Cyber Security systems are both cause and effect of integrative processes of 1) academic activities (research, education, and real life problem solving) and 2) the academic with the private and public sectors. To contribute with these two kinds of integrations is also a main purpose of the IIIS and an important reason for the conferences organized by this institute.

Consequently, the purpose of the Info/Cyber-Security 2016 is to bring together researchers and professionals, from the academic, private and governmental sectors, to present and discuss advances, problems, solutions, reflections, and potential innovations in the areas of information and cyber security; from research, educational, commercial and governmental perspectives.

Some authors conceive Information Security as part of Cyber Security and others perceive Cyber Security as being part of Information Security. It depends on the meaning associated to each of the term. We prefer to consider that both areas intersect each other because we prefer to assign a more comprehensive meaning to each of the two phrases.

General Topics:

Systems Approach, thinking and methodologies to managing the cyber-security risks
Case studies or reports
Case studies as research and educational methodologies
Systems security and security systems
Information and computer security: concepts, techniques, procedures and methodologies.
Cyber Security Technologies and methodologies
Network Communications Security
Cyber security strategies and related Regulations
Information forensics

Related Resources

SIGIR 2017   The 40th International ACM SIGIR Conference on Research and Development in Information Retrieval
IEEE TDSC Journal SI 2016   IEEE TDSC Special Issue on Data-Driven Dependability and Security
CIKM 2017   The 26th 2017 ACM Conference on Information and Knowledge Management
AEIJ 2016   Advanced Energy: An International Journal
ECCWS 2017   16th European Conference on Cyber Warfare and SecurityECCWS 2017
CyberSec 2017   The Fifth International Conference on Cyber Security, Cyber Welfare and Digital Forensic
TDSC-PSCE 2017   Special Issue on Paradigm Shifts in Cryptographic Engineering -- IEEE Transactions on Dependable and Secure Computing
AsiaCCS 2017   Call for paper: ACM Asia Conference on Computer and Communications Security
ORAJ 2016   Operations Research and Applications: An International Journal
SMGSSP 2017   Smart Micro-Grid Systems Security and Privacy