Difference between revisions of "ICISS 2017"
m (1 revision imported) |
|||
(One intermediate revision by the same user not shown) | |||
Line 6: | Line 6: | ||
|Start date=2017/12/16T12:00:00 | |Start date=2017/12/16T12:00:00 | ||
|End date=2017/12/20T12:00:00 | |End date=2017/12/20T12:00:00 | ||
− | |City= | + | |City=Bombay |
|Country= India | |Country= India | ||
|Homepage=http://www.iciss.org.in | |Homepage=http://www.iciss.org.in |
Latest revision as of 11:02, 3 September 2017
ICISS 2017 | |
---|---|
ICISS 2017 : International Conference on Information Systems Security
| |
Dates | 2017/12/16T12:00:00 (iCal) - 2017/12/20T12:00:00 |
Homepage: | http://www.iciss.org.in |
Location | |
Location: | Bombay, India |
Loading map... | |
Important dates | |
Submissions: | 2017/08/07T12:00:00 |
Table of Contents | |
The conference series ICISS (International Conference on Information Systems
Security), held annually, provides a forum for disseminating latest research
results in information and systems security. ICISS 2017, the thirteenth
conference in this series, will be held under the aegis of the Society for
Research in Information Security and Privacy (SRISP). The acceptance ratio of
the first twelve conferences has averaged less than 30%. Like previous years,
proceedings of the conference will be published as part of the Springer Verlag
series of Lecture Notes in Computer Science. Submissions are encouraged from
academia, industry and government, addressing theoretical and practical problems
in information and systems security and related areas. Topics of interest
include but are not limited to:
• Access and Usage Control • Application Security • Authentication and Audit • Biometric Security • Cloud Security • Cryptographic Protocols • Cyber-physical Systems Security • Data Security and Privacy • Digital Forensics • Digital Rights Management • Distributed Systems Security • Formal Models in Security • Identity Management • Intrusion Detection and Prevention • Intrusion Tolerance and Recovery • Key Management • Language-based Security • Malware Analysis and Mitigation • Network Security • Operating Systems Security • Privacy and Anonymity • Security and Usability • Sensor and Ad Hoc Network Security • Software Security • Secure Data Streams • Security Testing • Smartphone Security • Usable Security • Web Security • Vulnerability Detection and Mitigation
Paper Submission
Papers should be formatted as they would appear in the final LNCS proceedings. Papers should be at most 20 pages in length, including the bibliography. Detailed submission instructions can be found at the conference web site. One of the authors of an accepted paper must attend the conference to present the paper. ICISS accepts only electronic submissions in PDF format. Camera-Ready manuscripts must be submitted in LaTeX. PDF version of the paper should be submitted via the EasyChair submission site - https://easychair.org/conferences/?conf=iciss17
Best Paper Award
Springer has funded best paper prizes to the tune of 1000 Euros.
Dual Submission Policy
Submitted papers must not substantially overlap with papers published or currently submitted to a journal or a conference with proceedings.
IMPORTANT DATES
Manuscript Submission: 07 August 2017 Tutorial Proposal Submission: 31 August 2017 Notification of Acceptance: 18 September 2017 Camera-Ready Manuscript: 28 September 2017
General Chairs: R. K. Shyamasundar, IIT Bombay, India
Program Chairs: Jaideep Vaidya, Rutgers U., USA Virendra Singh, IIT Bombay, India
Publicity Chairs: Yuan Hong, SUNY Albany, USA
TPC Members: Cong Wang City University of HongKong Vikram Goyal IIIT-Delhi Vijay Atluri Rutgers University Sandeep Shukla IIT Kanpur Aditya Bagchi Ramakrishna Mission Vivekananda University Anirban Basu KDDI Research, Wenliang Du Syracuse University Manoj Gaur MNIT Basit Shafiq Lahore University of Management Sciences Sushil Jajodia George Mason University Anoop Singhal NIST Edoardo Serra Boise State University Meng Yu University of San Antonio Peng Liu The Pennsylvania State University Lingyu Wang Concordia University Shamik Sural IIT Kharagpur Wei Jiang Missouri University of Science & Technology Samrat Mondal IIT Patna Anirban Sengupta CDC-JU Pierangela Samarati University of Milan Sabrina De Capitani di Vimercati University of Milan Chandan Mazumdar Jadavpur University Mauro Conti University of Padua Claudio Ardagna University of Milan Rajat Subhra IIT Kharagpur Sanjit Chatterjee IISC Manik Lal Das DA-IICT Frédéric Cuppens TELECOM Bretagne of Institut Mines-TELECOM Yuan Hong University at Albany Mahesh Tripunitara University of Waterloo Ashish Kundu IBM TJ Watson Research Bogdan Carbunar Florida International University Somitra Sanadhya IIIT-Delhi Bharath Kumar Samanthula Montclair State University Chester Rebeiro IIT Madras Nora Cuppens TELECOM Bretagne of Institut Mines-TELECOM Prateek Mittal Princeton University Wendy Hui Wang Stevens Institute of Technology Barsha Mitra BITS Hyderabad Ram Krishnan University of San Antonio Sara Foresti University of Milan Murat Kantarcioglu University of Texas at Dallas Atul Prakash University of Michigan Sukumar Nandi IIT Guwahati
Acronym | ICISS 2017 + |
End date | 12:00:00, 20 December 2017 + |
Event type | Conference + |
Has coordinates | 19° 4' 54", 72° 53' 12"Latitude: 19.081577777778 Longitude: 72.886627777778 + |
Has location city | Bombay + |
Has location country | Category:India + |
Homepage | http://www.iciss.org.in + |
IsA | Event + |
Start date | 12:00:00, 16 December 2017 + |
Submission deadline | 12:00:00, 7 August 2017 + |
Title | ICISS 2017 : International Conference on Information Systems Security + |