Conference Information
ISAICS 2026: International Symposium on AI and Cybersecurity
Please Login to view website of conference
Submission Date: |
2026-09-18 |
Notification Date: |
2026-10-28 |
Conference Date: |
2026-11-20 |
Location: |
Rizhao, China |
Years: |
3 |
Viewed: 9725 Tracked: 4 Attend: 0
Call For Papers
Track 1
Artificial Intelligence
AI and Creativity
Deep Learning
Evolutionary Computing
Fuzzy Systems
Hybrid Intelligent Systems
Industrial Applications of AI
Intelligence and Cybersecurity
Intelligent User Interfaces
Knowledge Representation and Reasoning
Knowledge-Based Systems
Ambient Intelligence
Machine Learning
Model-Based Reasoning
Natural Language Processing
Social Network Analysis
Uncertainty in AI
Vision and Perception
Big Data
Cognitive Systems
Explainable Artificial Intelligence
Track 2
Cybersecurity
Communication Privacy and Anonymity
Distributed denial of service
Web security
Security & Privacy in Pervasive and Ubiquitous Computing
Security & Privacy for emerging technologies: VoIP, peer-to-peer and overlay network systems
Information leakage
Information theft
Data tampering
Data deletion
Security breach
Attack monitoring
Encrypted communication
Information dissemination safety
Network isolation
Application security
Network segmentation
Application security
Behavioral analytics
Cloud security
Mobile device security
Security information and event management
Wireless security
Artificial Intelligence
AI and Creativity
Deep Learning
Evolutionary Computing
Fuzzy Systems
Hybrid Intelligent Systems
Industrial Applications of AI
Intelligence and Cybersecurity
Intelligent User Interfaces
Knowledge Representation and Reasoning
Knowledge-Based Systems
Ambient Intelligence
Machine Learning
Model-Based Reasoning
Natural Language Processing
Social Network Analysis
Uncertainty in AI
Vision and Perception
Big Data
Cognitive Systems
Explainable Artificial Intelligence
Track 2
Cybersecurity
Communication Privacy and Anonymity
Distributed denial of service
Web security
Security & Privacy in Pervasive and Ubiquitous Computing
Security & Privacy for emerging technologies: VoIP, peer-to-peer and overlay network systems
Information leakage
Information theft
Data tampering
Data deletion
Security breach
Attack monitoring
Encrypted communication
Information dissemination safety
Network isolation
Application security
Network segmentation
Application security
Behavioral analytics
Cloud security
Mobile device security
Security information and event management
Wireless security
Last updated by Dou Sun in 2026-02-26
Related Conferences
| CCF | CORE | QUALIS | Short | Full Name | Submission | Notification | Conference |
|---|---|---|---|---|---|---|---|
| b | b3 | ICISS | International Conference on Information Systems Security | 2026-07-10 | 2026-09-10 | 2026-12-16 | |
| c | b | b1 | SOUPS | International Symposium On Usable Privacy and Security | 2026-02-12 | 2026-05-19 | 2026-08-23 |
| b | a | CSF | IEEE Computer Security Foundations Symposium | 2026-01-29 | 2026-04-01 | 2026-07-26 | |
| a | a* | a1 | Security | USENIX Security Symposium | 2026-01-29 | 2026-08-12 | |
| c | b | b1 | ACNS | International Conference on Applied Cryptography and Network Security | 2026-01-23 | 2026-03-19 | 2026-06-22 |
| c | b | b1 | AsiaCCS | ACM ASIA Conference on Computer and Communications Security | 2025-12-12 | 2026-03-10 | 2026-06-01 |
| c | b | a2 | ISC | Information Security Conference | 2025-06-04 | 2025-07-29 | 2025-10-20 |
| b | NSS | International Conference on Network and System Security | 2023-03-03 | 2023-05-05 | 2023-08-14 | ||
| c | HotSec | USENIX Workshop on Hot Topics in Security | 2020-06-04 | 2020-06-15 | 2020-08-11 | ||
| b | IWSEC | International Workshop on Security | 2019-04-02 | 2019-05-27 | 2019-08-28 |
Related Journals
| CCF | Full Name | Impact Factor | Publisher | ISSN |
|---|---|---|---|---|
| b | IEEE Transactions on Cybernetics | 10.5 | IEEE | 2168-2267 |
| a | IEEE Transactions on Information Forensics and Security | 8.0 | IEEE | 1556-6013 |
| b | Computers & Security | 5.4 | Elsevier | 0167-4048 |
| c | Journal of Cybersecurity | 3.2 | Oxford University Press | 2057-2093 |
| International Journal of Information Security | 3.2 | Springer | 1615-5262 | |
| Computer Law & Security Review | 3.2 | Elsevier | 0267-3649 | |
| c | Computer Law and Security Review | 3.2 | Elsevier | 0267-3649 |
| ACM Transactions on Privacy and Security | 2.8 | ACM | 2471-2566 | |
| c | EURASIP Journal on Information Security | 2.1 | Springer | 1687-417X |
| c | IET Information Security | 1.300 | IET | 1751-8709 |