Conference Information
ICISS 2016: International Conference on Information Systems Security
Submission Date:
Notification Date:
Conference Date:
Jaipur, India
CORE: b   QUALIS: b3   Viewed: 8924   Tracked: 4   Attend: 1

Conference Location
Call For Papers
The conference series ICISS (International Conference on Information Systems Security), held annually, provides a forum for disseminating the latest research results in information and systems security. The acceptance ratio of the last nine conferences has averaged less than 30%, and the proceedings have been published as part of the Springer Verlag series of Lecture Notes in Computer Science. ICISS 2016 encourages submissions from the academia, industry and government addressing theoretical and practical problems in information and systems security and related areas. Topics of interest include, but not limited to:

    Access Control
    Application Security
    Attacks and Defenses
    Auditing and Accountablility
    Banking/Finance and Security
    Biometric Security
    Cyber-physical Systems Security
    Digital Forensics
    Distributed Systems Security
    Embedded Systems Security
    Hardware Security
    Intrusion Detection and Recovery
    Language-based Security
    Mobile Devices and Security
    Network Security
    Operating Systems Security
    Privacy and Anonymity
    Secure Information Flow
    Security Modeling and Analysis
    Security Testing
    Usability and Security
    Web Security

ICISS is interested in all aspects of information systems security. Papers without a clear application to security of information systems, however, will be considered out of scope and may be rejected without a full review.

Submission Instructions

Submitted full papers must not exceed 20 LNCS pages. The page limit includes title, abstract, figures and references. Additional details may be included in a clearly-marked appendix that will be read at the discretion of the program committee.

All papers must use at least 10-point Times Roman font and be formatted as per the "LNCS style". Submissions deviating from these guidelines will not be reviewed.

At least one author of each accepted paper must register for the conference and present the paper.

Papers should be submitted via the EasyChair submission management System at: 
Last updated by Xin Yao in 2016-07-24
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
BDCIEEE/ACM International Symposium on Big Data Computing2015-07-032015-08-212015-12-07
SCOMInternational Conference on Soft Computing2020-08-162020-09-102020-12-12
AKBCConference on Automated Knowledge Base Construction2020-02-132020-04-202020-06-22
cIFIPTMIFIP WG 11.11 International Conference on Trust Management2019-04-092019-05-122019-07-17
WoTBDInternational Symposium on Web of Things and Big Data2015-08-302015-09-152015-10-06
ICACARInternational Conference on Advanced Control, Automation and Robotics2020-09-252020-11-102021-03-25
EBISSInternational Conference on e-Business and Information System Security 2011-02-252011-02-262011-05-28
ICSIPInternational Conference on Signal and Image Processing2020-02-202020-03-102020-07-03
ICRCCInternational Conference on Radar, Communication and Computing2016-09-152016-09-202016-08-13
b4MINESInternational Conference on Multimedia Information Networking and Security2013-07-202013-07-252013-11-01
Related Journals
CCFFull NameImpact FactorPublisherISSN
International Journal of Information Security1.822Springer1615-5262
cIET Information Security0.862IET1751-8709
bInformation Systems2.066Elsevier0306-4379
aACM Transactions on Information Systems ACM1046-8188
cBehaviour & Information Technology1.388Taylor & Francis0144-929X
Information Systems Journal3.286Wiley-Blackwell1350-1917
aIEEE Transactions on Information Forensics and Security6.211IEEE1556-6013
Information Systems Research2.457INFORMS1047-7047
Information Systems and e-Business Management0.791Springer1617-9846
Information Systems Management2.042Taylor & Francis1058-0530