posted by user: Tabisa || 14835 views || tracked by 4 users: [display]

ISSA 2020 : 19th International Information Security South Africa Conference


Conference Series : Information Security for South Africa
When Aug 25, 2020 - Aug 26, 2020
Where Pretoria
Submission Deadline May 27, 2020
Notification Due Jul 6, 2020
Final Version Due Jun 25, 2020
Categories    security   network security   cyber security   privacy

Call For Papers

Call for Papers ISSA 2020 - (see

The 2020 Information Security for South Africa conference will take place on 25 – 26 Aug 2020- n Pretoria, South Africa.

ISSA 2020 proceedings are to be published by Springer CCIS (Communications in Computer and Information Science) (pending). CCIS is abstracted/indexed in DBLP, Google Scholar, EI-Compendex, Mathematical Reviews, SCImago, Scopus. CCIS volumes are also submitted for the inclusion in ISI Proceedings.

The 19th international ISSA conference will be held from 25 - 26 Aug 2020 in Pretoria, South Africa. As with the previous ISSA conferences, the forthcoming ISSA 2020 will again present the latest developments in information security and bring together national and international researchers and practitioners.

We solicit previously unpublished papers offering novel research contributions in any aspect of information security.

Important dates:
Full papers submission: 27 May 2020
Notification of acceptance: 06 July 2020
Camera-ready papers: 12 July 2020
Conference: 25 - 26 Aug 2020

Topics include but are not limited to:

Access control
Applied cryptography
Big data forensics
Cloud computing security
Cyber-security & Big Data & Data Science
Data and application security
Digital Forensics
Human aspects of information security
Identification & authentication
Identity Management
Information security awareness training
Information security governance
Information security risk analysis
Intrusion detection and fraud detection
Legal and ethical aspects of information security
Mobile computing security
Network security
Security and usability
Security of distributed architectures and infrastructures
Software security
Standards guidelines and certification
Trust models and trust management
Trusted computing

Visit for more details on the topics, guidelines and other information.

Reinhardt Botha (, Information Technology Department, Nelson Mandela University
Mariki Eloff (, Institute for Corporate Citizenship, University of South Africa
Hein Venter (, Department of Computer Science, University of Pretoria
Marijke Coetzee (, Academy of Computer Science and Software Engineering, University of Johannesburg
Marianne Loock (, School of Computing, University of South Africa
Jan Eloff (, Department of Computer Science, University of Pretoria

Related Resources

ENTER 2023   ENTER23 e-Tourism Conference
IJPLA 2022   International Journal of Programming Languages and Applications
FCSIT 2022   2022 4th Euro-Asia Conference on Frontiers of Computer Science and Information Technology (FCSIT 2022)
CSW 2022   2022 International Workshop on Cyber Security (CSW 2022)
CEVVE 2022   2022 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2022)
EI/Scopus--SPISCS 2022   2022 International Conference on Signal Processing, Information System and Cyber Security (SPISCS 2022)
ICMIMT--IEEE, Ei and Scopus 2022   2022 IEEE 13th International Conference on Mechanical and Intelligent Manufacturing Technologies (ICMIMT 2022)--Ei Compendex, Scopus
IEEE--ICMIMT--Ei, Scopus 2022   2022 IEEE 13th International Conference on Mechanical and Intelligent Manufacturing Technologies (ICMIMT 2022)--Ei Compendex, Scopus
CSP--Scopus, Ei 2023   2023 7th International Conference on Cryptography, Security and Privacy (CSP 2023)--Ei Compendex, Scopus