posted by user: Huang_Q || 13569 views || tracked by 10 users: [display]

ISSA 2017 : 16th International Information Security for South Africa conference


Conference Series : Information Security for South Africa
When Aug 16, 2017 - Aug 17, 2017
Where Johannesburg, South Africa
Submission Deadline May 7, 2017
Notification Due Jun 30, 2017
Final Version Due Jul 10, 2017
Categories    security   network security   digital forensics   cyber security

Call For Papers

ISSA 2017

16th International Information Security for South Africa Conference
16 to 17 Aug 2017
Johannesburg, South Africa

ISSA 2017 is co-sponsored by the IEEE Systems, Man and Cybernetics Society (SMCS)
Chapter, a chapter of the IEEE South Africa Section, and is also supported by IFIP.

Accepted and registered papers will be published by IEEE Computer Society Press
as well as submitted to DBLP

The 16th international ISSA conference will be held from 16 to 17 Aug 2017
in Johannesburg, South Africa. As with the previous ISSA conferences, the
forthcoming ISSA 2017 will again present the latest developments in
information security, and bring together national and international
researchers and practitioners.

We solicit previously unpublished papers offering novel research contributions
in any aspect of information security.

Visit for more details on the topics, guidelines
and other information.‚Äč

Full papers: extended to 7 May 2017
Notification of acceptance: 30 June 2017
Camera-ready papers: 10 July 2017
Conference: 16 - 17 Aug 2017

Authors are invited to submit original papers not previously published nor
submitted in parallel for publication to any other conference, workshop or journal.

Topics include, but are not limited to:
Access control
Applied cryptography
Big data forensics
Cloud computing security
Cyber-security & Big Data & Data Science
Data and application security
Digital forensics
Human aspects of information security
Identification and authentication
Identity management
Information security awareness and training
Information security governance
Information security risk analysis
Intrusion detection and fraud detection
Legal and ethical aspects of information security
Mobile computing security
Network security
Security and usability
Security of distributed architectures and infrastructures
Software security
Standards, guidelines and certification
Trust models and trust management
Trusted computing

Hein Venter (, Department of Computer Science, University of Pretoria
Marijke Coetzee (, Academy of Computer Science and Software Engineering,
University of Johannesburg
Marianne Loock (, School of Computing, University of South Africa
Mariki Eloff (, Institute for Corporate Citizenship, University of South Africa
Jan Eloff (, Department of Computer Science, University of Pretoria‚Äč

Related Resources

ISSA 2020   19th International Information Security South Africa Conference
IEEE COINS 2020   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems | Circuit and Systems | WSN | 5G
ISEEIE 2021   2021 International Symposium on Electrical, Electronics and Information Engineering(ISEEIE 2021)
AVC 2020   Advances in Vision Computing: An International Journal
FUSION 2020   2020 23rd International Conference on Information Fusion
BIoT 2020   International Conference on Blockchain and Internet of Things
IEEE Wireless Africa 2020   IEEE Wireless Africa 2020
ICDIS 2020   The 3rd International Conference on Data Intelligence and Security
CSW 2021   2021 International Workshop on Cyber Security (CSW 2021)
NCWMC 2020   5th International Conference on Networks, Communications, Wireless and Mobile Computing