Conference Information
ICICS 2020: International Conference on Information and Communications Security
http://icics2020.compute.dtu.dk/
Submission Date:
2020-05-03 Extended
Notification Date:
2020-06-05
Conference Date:
2020-08-24
Location:
Copenhagen, Denmark
Years:
22
CCF: c   CORE: b   QUALIS: b1   Viewed: 19844   Tracked: 77   Attend: 16

Conference Location
Call For Papers
ICICS 2020 (the 22nd International Conference on Information and Communications Security) will be held in Copenhagen, Denmark, during 24-27 August 2020. It will be organized by Technical University of Denmark (DTU).

The conference started in 1997 and aims at bringing together leading researchers and practitioners from both academia and industry to discuss and exchange their experiences, lessons learned, and insights related to computer and communications security. More info about the previous conferences can be found at here.

Program Topics:

Original papers offering novel research contributions on all aspects of information and communications security are solicited for submission to ICICS 2019. There will be a Best Paper Award and a Best Student Paper Award. Areas of interest include, but are not limited to:

Access control
Social networks security, privacy and trust
Key management and key recovery
Software defined networking security
Anonymity
Embedded systems security
Language-based security
Security management
Applied cryptography
Security models, metrics, and policies
Malware and anti-malware
Fraud and cyber-crime
Authentication and authorization
Security and privacy of Big Data
Mobile computing security and privacy
Hardware security
Biometrics security
Security of critical Infrastructures
Network security
Identity access management
Blockchain security and privacy
Trust and reputation systems
Cloud and edge computing security
Trusted and trustworthy computing technologies
Operating systems security
Usable security and privacy
Computer and digital forensics
Insider threat detection
Cyber-physical systems security
Underground economy
Privacy protection
Intellectual property protection
Data and system integrity
Verification of security protocols
Privacy-preserving data mining
Intrusion detection
Database security
Web security
Risk assessment
IoT security and privacy
Distributed systems security
Wireless security
Last updated by Dou Sun in 2020-04-01
Acceptance Ratio
YearSubmittedAcceptedAccepted(%)
20131132925.7%
20121014948.5%
20111413323.4%
20101353123%
20091623722.8%
20081252721.6%
20072223817.1%
20061192218.5%
20052354017%
20042454217.1%
20031763721%
20021614125.5%
20011345641.8%
1999622438.7%
Related Conferences
Recommendation