posted by user: akleylek || 6663 views || tracked by 20 users: [display]

IJISS 2016 : International Journal of Information Security Science (IJISS)

FacebookTwitterLinkedInGoogle

Link: http://www.ijiss.org/
 
When Apr 10, 2016 - Dec 31, 2016
Where Turkey
Submission Deadline Dec 31, 2016
Notification Due Dec 31, 2016
Final Version Due Dec 31, 2017
Categories    information security   cryptology   digital forensics   data privacy
 

Call For Papers

Call for Papers:
International Journal of Information Security Science (IJISS)
ISSN: 2147-0030
http://www.ijiss.org
IJISS seeks original manuscripts in English for the regular issue on the information security and cryptology. The goal of IJISS is to create a volume of recent works on advances in all theoretical aspects of information security and cryptology. Original research results, scientific reviews and short communication notes in various fields of security science and technology are considered for publication. The publication language of the journal is English. Original research results, applications, implementations, scientific reviews and short communication notes in information security science and technology are considered for publication.
Manuscripts with a suitable balance of practice and theory, pure theory or applications are accepted. A review article is expected to give in-depth information and satisfying evaluation of a topic supported with an extensive list of sources. Short communication notes are also accepted to share the first outcomes of researchers' on-going original research work.
IJISS is a quarterly published journal and operates an online submission and peer review system allowing authors to submit articles online and track their progress via its online website. IJISS has been indexed by well reputed international indexing agencies/databases such as EBSCO, DOAJ, Index Copernics, Google Index.
Topics of interest are recent advances in all aspects of information security and cryptology, including, but not limited to:
• Securing Networks, Computers, Services, Systems, Databases
• Digital Forensics, Procedures, Tools, Techniques, Surveillance Technology
• Information Security Science (ISS) and Engineering
• Cryptographic Hardware
• Coding Theory
• Applications of Boolean Functions,Finite Fields and Elliptic Curves to Cryptography
• Artificial Intelligence Techniques for ISS and Engineering
• Smart Card, RFID, NFC, 3G, 4G, etc. Security
• Security Risk Analysis, Modelling, Evaluation and Management
• Secure Coding, Source Code Auditing and Review
• Critical Information and Infrastructure Security
• Security Standards, Protocols and Policies
• Mobile Communication and Application Security
• e-Governance and e-Government Security
• Cryptanalysis (Block Ciphers, Hash Functions, etc.)
• Post-Quantum Cryptography • Steganography and Steganalysis
• Operating System Security
• Cloud Computing and Virtual Machine Security
• Public Key Infrastructures
• Wireless, Ad Hoc and Sensor Network Security
• Web and Web Application Security
• Penetration Tests, Tools and Techniques
• Social Engineering Attacks and Prevention
• Intrusion Detection and Prevention Systems
• Content Protection
• Malicious Software Threats and Protection
• Ethical Hacking
• Biometrics
• Cyber Security, Warefare, Defense and Policies
• M2M Security
• Public Key Cryptography
• Symmetric Key Cryptography

Submitted articles must not have been published or currently submitted for journal publication elsewhere. Author/s is/are responsible for understanding and adhering to the journal submission guidelines. Please access them by clicking on http://ijiss.org/ijiss/index.php/ijiss/about/submissions#authorGuidelines and thoroughly read these before submitting your manuscript at http://www.ijiss.org.
For any query please email to Prof.Dr. Seref Sagiroglu (ss@gazi.edu.tr) or Dr. Sedat Akleylek (akleylek@gmail.com).

Related Resources

SoICT 2017   The Eighth Interntional Symposium on Information and Communication Technology
SI: Digital Forensics 2017   Call for Papers for Special Issue on Digital Forensics for IEEE S&P magazine
ICCNS - ACM 2017   ACM--2017 the 7th International Conference on Communication and Network Security (ICCNS 2017)--SCOPUS, Ei Compendex
SECRYPT 2017   14th International Conference on Security and Cryptography
IPMU 2018   17th Information Processing and Management of Uncertainty in Knowledge-Based Systems Conference
DBSec 2017   31st Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy
ICCIP - EI, ACM 2017   ACM--2017 the 3rd International Conference on Communication and Information Processing (ICCIP 2017)--Ei Compendex, ISI Web of Science and Scopus
EuropeanSeC 2017   2017 European Security Conference
ACM--ICCIP 2017   ACM--2017 the 3rd International Conference on Communication and Information Processing (ICCIP 2017)--Ei Compendex, ISI Web of Science and Scopus
CCS 2017   The ACM Conference on Computer and Communications Security (CCS)