Conference Information
EICC 2024: European Interdisciplinary Cybersecurity Conference
Please Login to view website of conference
Submission Date: |
2024-01-26 Extended |
Notification Date: |
2024-03-01 |
Conference Date: |
2024-06-05 |
Location: |
Xanthi, Greece |
Years: |
8 |
Viewed: 12938 Tracked: 0 Attend: 0
Call For Papers
Scope
The conference is devoted to exploring and presenting original innovative applications, scientific and technological advancements in the field of cybersecurity. Topics for this conference include, but are not limited to:
Cybersecurity and cyber resilience
Cyber insurance
Digital privacy
Digital currency, blockchains and cybercrime
Law, investigation, internet jurisdiction and ethics
Child safety in the cyberspace
Cyber forensics
Surveillance, interception, blocking and sovereignty
Cyber warfare
Network security
Critical infrastructure security
Embedded systems security
Business continuity and disaster recovery
Information security governance
Security management
Cloud security
Internet of things security
Big data and cybersecurity
Healthcare information security
Software development security
Cyber-physical systems security
Adversarial machine learning
Trust management
The conference is devoted to exploring and presenting original innovative applications, scientific and technological advancements in the field of cybersecurity. Topics for this conference include, but are not limited to:
Cybersecurity and cyber resilience
Cyber insurance
Digital privacy
Digital currency, blockchains and cybercrime
Law, investigation, internet jurisdiction and ethics
Child safety in the cyberspace
Cyber forensics
Surveillance, interception, blocking and sovereignty
Cyber warfare
Network security
Critical infrastructure security
Embedded systems security
Business continuity and disaster recovery
Information security governance
Security management
Cloud security
Internet of things security
Big data and cybersecurity
Healthcare information security
Software development security
Cyber-physical systems security
Adversarial machine learning
Trust management
Last updated by Lu Jing in 2024-01-21
Related Conferences
| CCF | CORE | QUALIS | Short | Full Name | Submission | Notification | Conference |
|---|---|---|---|---|---|---|---|
| b | b | b1 | ECSCW | European Conferences on Computer-Supported Cooperative Work | 2026-03-06 | 2026-04-24 | 2026-06-29 |
| b | a | a1 | ECCV | European Conference on Computer Vision | 2026-03-06 | 2026-05-09 | 2026-09-08 |
| c | EuroS&P | IEEE European Symposium on Security and Privacy | 2025-11-13 | 2026-03-05 | 2026-07-06 | ||
| b | ETAPS | European Joint Conferences on Theory and Practice of Software | 2025-10-30 | 2025-12-22 | 2026-04-11 | ||
| a | a | a2 | EuroSys | European Conference on Computer Systems | 2025-09-18 | 2026-01-30 | 2026-04-13 |
| b | a | a2 | ECAI | European Conference on Artificial Intelligence | 2025-04-29 | 2025-07-10 | 2025-10-25 |
| b | a | a2 | ESORICS | European Symposium on Research in Computer Security | 2025-04-22 | 2025-06-13 | 2025-09-22 |
| c | b3 | CIS | International Conference on Computational Intelligence and Security | 2020-08-05 | 2020-08-31 | 2020-11-27 | |
| b2 | CICC | IEEE Custom Integrated Circuits Conference | 2015-05-04 | 2015-09-28 | |||
| b4 | MINES | International Conference on Multimedia Information Networking and Security | 2013-07-20 | 2013-07-25 | 2013-11-01 |
Related Journals
| CCF | Full Name | Impact Factor | Publisher | ISSN |
|---|---|---|---|---|
| a | IEEE Transactions on Information Forensics and Security | 8.0 | IEEE | 1556-6013 |
| European Journal of Operational Research | 6.0 | Elsevier | 0377-2217 | |
| b | Computers & Security | 5.4 | Elsevier | 0167-4048 |
| IEEE Open Journal of the Industrial Electronics Society | 4.3 | IEEE | 2644-1284 | |
| Structural and Multidisciplinary Optimization | 4.0 | Springer | 1615-147X | |
| Future Internet | 3.6 | MDPI | 1999-5903 | |
| c | Journal of Cybersecurity | 3.2 | Oxford University Press | 2057-2093 |
| a | IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems | 2.9 | IEEE | 0278-0070 |
| ACM Transactions on Privacy and Security | 2.8 | ACM | 2471-2566 | |
| c | EURASIP Journal on Information Security | 2.1 | Springer | 1687-417X |