posted by user: akleylek || 6365 views || tracked by 18 users: [display]

IJISS 2016 : International Journal of Information Security Science (IJISS)

FacebookTwitterLinkedInGoogle

Link: http://www.ijiss.org/
 
When Apr 10, 2016 - Dec 31, 2016
Where Turkey
Submission Deadline Dec 31, 2016
Notification Due Dec 31, 2016
Final Version Due Dec 31, 2017
Categories    information security   cryptology   digital forensics   data privacy
 

Call For Papers

Call for Papers:
International Journal of Information Security Science (IJISS)
ISSN: 2147-0030
http://www.ijiss.org
IJISS seeks original manuscripts in English for the regular issue on the information security and cryptology. The goal of IJISS is to create a volume of recent works on advances in all theoretical aspects of information security and cryptology. Original research results, scientific reviews and short communication notes in various fields of security science and technology are considered for publication. The publication language of the journal is English. Original research results, applications, implementations, scientific reviews and short communication notes in information security science and technology are considered for publication.
Manuscripts with a suitable balance of practice and theory, pure theory or applications are accepted. A review article is expected to give in-depth information and satisfying evaluation of a topic supported with an extensive list of sources. Short communication notes are also accepted to share the first outcomes of researchers' on-going original research work.
IJISS is a quarterly published journal and operates an online submission and peer review system allowing authors to submit articles online and track their progress via its online website. IJISS has been indexed by well reputed international indexing agencies/databases such as EBSCO, DOAJ, Index Copernics, Google Index.
Topics of interest are recent advances in all aspects of information security and cryptology, including, but not limited to:
• Securing Networks, Computers, Services, Systems, Databases
• Digital Forensics, Procedures, Tools, Techniques, Surveillance Technology
• Information Security Science (ISS) and Engineering
• Cryptographic Hardware
• Coding Theory
• Applications of Boolean Functions,Finite Fields and Elliptic Curves to Cryptography
• Artificial Intelligence Techniques for ISS and Engineering
• Smart Card, RFID, NFC, 3G, 4G, etc. Security
• Security Risk Analysis, Modelling, Evaluation and Management
• Secure Coding, Source Code Auditing and Review
• Critical Information and Infrastructure Security
• Security Standards, Protocols and Policies
• Mobile Communication and Application Security
• e-Governance and e-Government Security
• Cryptanalysis (Block Ciphers, Hash Functions, etc.)
• Post-Quantum Cryptography • Steganography and Steganalysis
• Operating System Security
• Cloud Computing and Virtual Machine Security
• Public Key Infrastructures
• Wireless, Ad Hoc and Sensor Network Security
• Web and Web Application Security
• Penetration Tests, Tools and Techniques
• Social Engineering Attacks and Prevention
• Intrusion Detection and Prevention Systems
• Content Protection
• Malicious Software Threats and Protection
• Ethical Hacking
• Biometrics
• Cyber Security, Warefare, Defense and Policies
• M2M Security
• Public Key Cryptography
• Symmetric Key Cryptography

Submitted articles must not have been published or currently submitted for journal publication elsewhere. Author/s is/are responsible for understanding and adhering to the journal submission guidelines. Please access them by clicking on http://ijiss.org/ijiss/index.php/ijiss/about/submissions#authorGuidelines and thoroughly read these before submitting your manuscript at http://www.ijiss.org.
For any query please email to Prof.Dr. Seref Sagiroglu (ss@gazi.edu.tr) or Dr. Sedat Akleylek (akleylek@gmail.com).

Related Resources

CIKM 2017   The 26th 2017 ACM Conference on Information and Knowledge Management
DSAA 2017   The 4th IEEE International Conference on Data Science and Advanced Analytics 2017
SI: Digital Forensics 2017   Call for Papers for Special Issue on Digital Forensics for IEEE S&P magazine
ICONIP 2017   International Conference on Neural Information Processing
ICISE 2017   2017 2nd International Conference on Information Systems Engineering (ICISE 2017)--IEEE, Ei Compendex and Scopus
TDSC-PSCE 2017   Special Issue on Paradigm Shifts in Cryptographic Engineering -- IEEE Transactions on Dependable and Secure Computing
IPMU 2018   17th Information Processing and Management of Uncertainty in Knowledge-Based Systems Conference
ICADIWT 2017   ICADWIT workshop proposals
ICFIT 2017   6th International Conference on Frontiers of Information Technology -EI Compendex, Scopus, and ISI CPCS
EuropeanSeC 2017   2017 European Security Conference