Conference Information
WISA 2023: World Conference on Information Security Applications
Please Login to view website of conference
Submission Date: |
2023-06-16 Extended |
Notification Date: |
2023-07-04 |
Conference Date: |
2023-08-23 |
Location: |
Jeju Island, Korea |
Years: |
24 |
Viewed: 16305 Tracked: 2 Attend: 1
Call For Papers
The areas of interest include, but are not limited to:
● AI Security
● Analysis of network and security protocols
● Anonymity and censorship-resistant technologies
● Applications of cryptographic techniques
● Authentication and authorization
● Automated tools for source code/binary analysis
● Automobile security
● Botnet defense
● Blockchain security
● Critical infrastructure security
● DoS attacks and countermeasures
● Digital Forensics
● Embedded systems security
● Exploit techniques and automation
● Hardware and physical security
● HCI security and privacy
● Intrusion detection and prevention
● Malware analysis
● Mobile/wireless/cellular system security
● Network-based attacks
● Network infrastructure security
● Operating system security
● Practical cryptanalysis (hardware, DRM, etc.)
● Quantum cryptanalysis
● Security policy
● Side channel attacks and countermeasures
● Storage and file systems security
● Techniques for developing secure systems
● Trustworthy computing
● Trusted execution environments (Intel SGX, ARM Trustzone, etc.)
● Unmanned System Security for Vehicle/Drone/Ship Systems
● Vulnerability research
● Web security
● AI Security
● Analysis of network and security protocols
● Anonymity and censorship-resistant technologies
● Applications of cryptographic techniques
● Authentication and authorization
● Automated tools for source code/binary analysis
● Automobile security
● Botnet defense
● Blockchain security
● Critical infrastructure security
● DoS attacks and countermeasures
● Digital Forensics
● Embedded systems security
● Exploit techniques and automation
● Hardware and physical security
● HCI security and privacy
● Intrusion detection and prevention
● Malware analysis
● Mobile/wireless/cellular system security
● Network-based attacks
● Network infrastructure security
● Operating system security
● Practical cryptanalysis (hardware, DRM, etc.)
● Quantum cryptanalysis
● Security policy
● Side channel attacks and countermeasures
● Storage and file systems security
● Techniques for developing secure systems
● Trustworthy computing
● Trusted execution environments (Intel SGX, ARM Trustzone, etc.)
● Unmanned System Security for Vehicle/Drone/Ship Systems
● Vulnerability research
● Web security
Last updated by Dou Sun in 2023-06-11
Related Conferences
Related Journals
| CCF | Full Name | Impact Factor | Publisher | ISSN |
|---|---|---|---|---|
| a | IEEE Transactions on Information Forensics and Security | 8.0 | IEEE | 1556-6013 |
| Information and Organization | 4.7 | Elsevier | 1471-7727 | |
| c | Journal of Information Security and Applications | 3.7 | Elsevier | 2214-2126 |
| International Journal of Information Security | 3.2 | Springer | 1615-5262 | |
| c | EURASIP Journal on Information Security | 2.1 | Springer | 1687-417X |
| Computational Optimization and Applications | 2.0 | Springer | 0926-6003 | |
| Journal of Optimization Theory and Applications | 1.5 | Springer | 0022-3239 | |
| c | IET Information Security | 1.300 | IET | 1751-8709 |
| a | Information and Computation | 1.0 | Elsevier | 0890-5401 |
| c | International Journal of Information Security and Privacy | 0.800 | Idea Group Inc | 1930-1650 |