posted by user: Tabisa || 14348 views || tracked by 4 users: [display]

ISSA 2020 : 19th International Information Security South Africa Conference


Conference Series : Information Security for South Africa
When Aug 25, 2020 - Aug 26, 2020
Where Pretoria
Submission Deadline May 27, 2020
Notification Due Jul 6, 2020
Final Version Due Jun 25, 2020
Categories    security   network security   cyber security   privacy

Call For Papers

Call for Papers ISSA 2020 - (see

The 2020 Information Security for South Africa conference will take place on 25 – 26 Aug 2020- n Pretoria, South Africa.

ISSA 2020 proceedings are to be published by Springer CCIS (Communications in Computer and Information Science) (pending). CCIS is abstracted/indexed in DBLP, Google Scholar, EI-Compendex, Mathematical Reviews, SCImago, Scopus. CCIS volumes are also submitted for the inclusion in ISI Proceedings.

The 19th international ISSA conference will be held from 25 - 26 Aug 2020 in Pretoria, South Africa. As with the previous ISSA conferences, the forthcoming ISSA 2020 will again present the latest developments in information security and bring together national and international researchers and practitioners.

We solicit previously unpublished papers offering novel research contributions in any aspect of information security.

Important dates:
Full papers submission: 27 May 2020
Notification of acceptance: 06 July 2020
Camera-ready papers: 12 July 2020
Conference: 25 - 26 Aug 2020

Topics include but are not limited to:

Access control
Applied cryptography
Big data forensics
Cloud computing security
Cyber-security & Big Data & Data Science
Data and application security
Digital Forensics
Human aspects of information security
Identification & authentication
Identity Management
Information security awareness training
Information security governance
Information security risk analysis
Intrusion detection and fraud detection
Legal and ethical aspects of information security
Mobile computing security
Network security
Security and usability
Security of distributed architectures and infrastructures
Software security
Standards guidelines and certification
Trust models and trust management
Trusted computing

Visit for more details on the topics, guidelines and other information.

Reinhardt Botha (, Information Technology Department, Nelson Mandela University
Mariki Eloff (, Institute for Corporate Citizenship, University of South Africa
Hein Venter (, Department of Computer Science, University of Pretoria
Marijke Coetzee (, Academy of Computer Science and Software Engineering, University of Johannesburg
Marianne Loock (, School of Computing, University of South Africa
Jan Eloff (, Department of Computer Science, University of Pretoria

Related Resources

ICII--EI Compendex, Scopus 2022   2022 8th International Conference on Information Management and Industrial Engineering (ICII 2022)--Ei Compendex, Scopus
CyberHunt 2021   IEEE Workshop on Cyber Threat Intelligence and Hunting with AI
ICII--EI, Scopus 2022   2022 8th International Conference on Information Management and Industrial Engineering (ICII 2022)--Ei Compendex, Scopus
IJCCMS 2021   International Journal of Chaos, Control, Modelling and Simulation
NISecurity 2022   2022 International Conference on Network and Information Security (NISecurity 2022)
S&P 2022   IEEE Symposium on Security and Privacy (Third deadline)
CODASPY 2022   The 12th ACM Conference on Data and Application Security and Privacy
SI on ATD&IS 2021   Special Issue on Advanced Technologies in Data and Information Security, Applied Sciences, MDPI
SACAIR 2021   South African Conference for Artificial Intelligence Research
CSW 2022   2022 International Workshop on Cyber Security (CSW 2022)