Conference Information
ICISS'' 2016: International Conference on Information Science and Security
http://icatse.org/iciss/
Submission Date:
2016-08-20 Extended
Notification Date:
2016-09-13
Conference Date:
2016-12-19
Location:
Pattaya, Thailand
Years:
3
Viewed: 8129   Tracked: 4   Attend: 0

Call For Papers
Conference Scope and Topics

Track 1: Information Security 
•Access Control
•Anti-Malware
•Accounting and Audit
•Applied Cryptography
•Authentication and Authorization
•Biometrics
•Block and Stream Ciphers
•Cryptanalysis
•Cryptographic Protocol
•Cloud Computing Security
•Database Security
•Digital Forensics
•Distributed System Security
•Electronic Commerce
•Embedded Systems Security
•Hardware Security
•Homomorphic Encryption
•ID-Based Cryptography
•Intrusion Detection and Prevention
•Key Management
•Mobile and Wireless Security
•Network Security
•Operating System Security
•Privacy-Enhancing Technology
•Public Key Cryptography
•Security Architectures
•Security Policy
•Software Security
•Usable Security and Privacy
•Web Security 		

Track 2: Information and Computer Science
•Artificial Intelligence
•Cloud Computing
•Communication
•Computer Hardware
•Computer Vision
•Data Mining
•Digital Information
•E-learning
•Graphics and Visualization
•Hardware-Software Integration
•Human-Computer Interaction & Interactive Multimedia
•Image Processing
•Internet Technology
•Machine Learning
•Pattern Recognition
•Modeling and Simulation
•Multimedia Computing
•Networks
•Operating Systems
•Optimization
•Robotics
•Simulators
•Soft Computing
•Software Engineering
•Wearable Computing

Submitted papers will subject to stringent peer review by at least three experts and carefully evaluated based on originality, significance and clarity of exposition. Accepted papers will appear in the conference proceedings that will be indexed in EI, ISI, and Scopus. The authors of a selected number of top quality papers will be requested to extend their paper in order to be published as special issues in highly recognized international journals.
Last updated by Dou Sun in 2016-08-17
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
cIFIPTMIFIP WG 11.11 International Conference on Trust Management2019-04-092019-05-122019-07-17
ICSIPInternational Conference on Signal and Image Processing2022-05-102022-05-302022-07-20
MSE'International Conference on Materials Science and Engineering2023-04-292023-05-012023-05-13
cba1ICIPInternational Conference on Image Processing2024-01-312024-06-062024-10-27
b4MINESInternational Conference on Multimedia Information Networking and Security2013-07-202013-07-252013-11-01
CPSComInternational Conferences on Cyber, Physical and Social Computing2024-05-012024-06-012024-08-19
SLEInternational Conference on Software Language Engineering2022-07-082022-09-192022-12-05
MASInternational Conference on Modeling and Simulation2015-06-302015-07-152015-11-25
ITCCMAInternational Conference on Information Technology, Control, Chaos, Modeling and Applications2023-09-022023-09-102023-09-16
ICCTICTInternational Conference on Computational Techniques in Information and Communication Technologies2015-10-312015-12-152016-03-11
Related Journals
CCFFull NameImpact FactorPublisherISSN
cIET Information Security0.862IET1751-8709
International Journal of Information Security1.988Springer1615-5262
aIEEE Transactions on Information Forensics and Security6.211IEEE1556-6013
Journal of Information ScienceSAGE0165-5515
bInformation Sciences6.795Elsevier0020-0255
Journal of Information Science and Engineering0.414Institute of Information Science0000-0000
International Journal of Information Sciences and Techniques AIRCC2319-409X
cBehaviour & Information Technology1.388Taylor & Francis0144-929X
The Information Society1.860Taylor & Francis0197-2243
Journal of Cyber Security and MobilityRiver Publishers2245-1439
Recommendation