posted by user: Tabisa || 15375 views || tracked by 4 users: [display]

ISSA 2020 : 19th International Information Security South Africa Conference


Conference Series : Information Security for South Africa
When Aug 25, 2020 - Aug 26, 2020
Where Pretoria
Submission Deadline May 27, 2020
Notification Due Jul 6, 2020
Final Version Due Jun 25, 2020
Categories    security   network security   cyber security   privacy

Call For Papers

Call for Papers ISSA 2020 - (see

The 2020 Information Security for South Africa conference will take place on 25 – 26 Aug 2020- n Pretoria, South Africa.

ISSA 2020 proceedings are to be published by Springer CCIS (Communications in Computer and Information Science) (pending). CCIS is abstracted/indexed in DBLP, Google Scholar, EI-Compendex, Mathematical Reviews, SCImago, Scopus. CCIS volumes are also submitted for the inclusion in ISI Proceedings.

The 19th international ISSA conference will be held from 25 - 26 Aug 2020 in Pretoria, South Africa. As with the previous ISSA conferences, the forthcoming ISSA 2020 will again present the latest developments in information security and bring together national and international researchers and practitioners.

We solicit previously unpublished papers offering novel research contributions in any aspect of information security.

Important dates:
Full papers submission: 27 May 2020
Notification of acceptance: 06 July 2020
Camera-ready papers: 12 July 2020
Conference: 25 - 26 Aug 2020

Topics include but are not limited to:

Access control
Applied cryptography
Big data forensics
Cloud computing security
Cyber-security & Big Data & Data Science
Data and application security
Digital Forensics
Human aspects of information security
Identification & authentication
Identity Management
Information security awareness training
Information security governance
Information security risk analysis
Intrusion detection and fraud detection
Legal and ethical aspects of information security
Mobile computing security
Network security
Security and usability
Security of distributed architectures and infrastructures
Software security
Standards guidelines and certification
Trust models and trust management
Trusted computing

Visit for more details on the topics, guidelines and other information.

Reinhardt Botha (, Information Technology Department, Nelson Mandela University
Mariki Eloff (, Institute for Corporate Citizenship, University of South Africa
Hein Venter (, Department of Computer Science, University of Pretoria
Marijke Coetzee (, Academy of Computer Science and Software Engineering, University of Johannesburg
Marianne Loock (, School of Computing, University of South Africa
Jan Eloff (, Department of Computer Science, University of Pretoria

Related Resources

SI on ATD&IS III 2024   Special Issue on Advanced Technologies in Data and Information Security III, Applied Sciences, MDPI
CODASPY 2024   The 14th ACM Conference on Data and Application Security and Privacy
ISEEIE 2024   2024 4th International Symposium on Electrical, Electronics and Information Engineering (ISEEIE 2024)
IJASUC 2023   International Journal of Ad hoc, Sensor & Ubiquitous Computing
ICIIP 2024   2024 13th International Conference on Intelligent Information Processing (ICIIP 2024)
NCOM 2024   10th International Conference on Networks & Communications
IWIP 2024   2024 4th International Workshop on Image Processing (IWIP 2024)
IEEE ISNCC 2024   2024 International Symposium on Networks, Computers and Communications
NLPAI 2024   2nd International Conference on NLP & AI