Conference Information
CSIA 2020: International Conference on Communications Security & Information Assurance
Submission Date:
Notification Date:
Conference Date:
Sydney, Australia
Viewed: 4112   Tracked: 1   Attend: 0

Conference Location
Call For Papers

11th International Conference on Communications Security & Information Assurance (CSIA 2020) focuses on all technical and practical aspects of communications security & information assurance for wired and wireless networks. The goal of this conference is to bring together researchers and practitioners from academia and industry to focus on understanding modern security threats and countermeasures, and establishing new collaborations in these areas

Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to.

Topics of Interest

    Access Control, Anonymity, Audit and Audit Reduction & Authentication and Authorization
    Applied Cryptography, Cryptanalysis, Digital Signatures
    Biometric Security
    Boundary Control Devices
    Certification and Accreditation
    Cross-Layer Design for Security
    Data and System Integrity, Database Security
    Defensive Information Warfare
    Denial of Service Protection, Intrusion Detection, Anti-Malware
    Distributed Systems Security
    Electronic Commerce
    Performance Evaluations of Protocols & Security Application
    Privacy and Data Protection
    Product Evaluation Criteria and Compliance
    Risk Evaluation and Security Certification
    Risk/Vulnerability Assessment
    E-mail Security, Spam, Phishing, E-mail Fraud, Virus, Worms, Trojan Protection
    Grid Security
    Information Hiding and Watermarking & Information Survivability
    Insider Threat Protection, Integrity
    Intellectual Property Protection
    Internet/Intranet Security
    Key Management and Key Recovery
    Language-based Security
    Mobile and Wireless Security
    Mobile, Ad Hoc and Sensor Network Security
    Monitoring and Surveillance
    Multimedia Security ,Operating System Security, Peer-to-Peer Security
    Security & Network Management
    Security Threats Like DDoS, MiM, Session Hijacking, Replay Attack etc & Countermeasures
    Trusted Computing
    Ubiquitous Computing Security
    Virtualization Security, VoIP Security, Web 2.0 Security
Last updated by Dou Sun in 2020-03-26
Related Conferences
Related Journals
CCFFull NameImpact FactorPublisherISSN
Scalable Computing Springer2194-6876
IEEE Transactions on Automatic Control5.093IEEE0018-9286
AI EDAMCambridge University Press0890-0604
bJournal of the American Society for Information Science and Technology2.137John Wiley & Sons, Ltd.1532-2890
cInternational Journal of Cooperative Information Systems1.433World Scientific0218-8430
International Journal of Computer Science & Information Technology AIRCC0975-4660
Journal of Documentation1.573Emerald0022-0418
Computing and Informatics Institute of Informatics, Slovakia1335-9150
International Journal of Computer Science Applications & Information Technologies AR Publication2347-453X
cInternational Journal on Semantic Web and Information Systems0.621IGI Global1552-6283