Conference Information
ICISS 2026: International Conference on Information Systems Security
Please Login to view website of conference
Submission Date: |
2026-07-10 |
Notification Date: |
2026-09-10 |
Conference Date: |
2026-12-16 |
Location: |
Chennai, India |
Years: |
22 |
CORE: b QUALIS: b3 Viewed: 32216 Tracked: 6 Attend: 1
Call For Papers
A broad but non-exhaustive list of areas of interest is as below:
Systems Security
OS, VM, containers, cloud
Network: SDN, NFV, SD-WAN
IoT, RFID, SCADA systems
IDS, IPS, Honeypot, Botnet
Access control
Authentication, Authorization
PKI & Trust management
Zero Trust
Application Security
Vulnerabilities, Malware
Ransomware, APTs, MITRE
Information flow control
Threat Modelling, Attack graphs
Security in AI/ML
Adversarial learning/inputs
Prompt injection, RLHF strategies
Model stealing, Model poisoning
Formal Methods for Security
Verification of Security Protocols
FM for AI/ML Models & Apps
Hardware Security
Remote attestation, PUFs
Trojans, Backdoors, FPGA
TEE, TRNG, SGX
Privacy
PETs, anonymization tech
De-identification attacks
Surveillance & Censorship
Inference, correlation attacks
Blockchain
Cryptocurrency, stablecoins
Interoperability, scalability
Smart contracts, concurrency
DIDs, NFTs, CBDCs, AML
Emerging Tech/Standards
ChatGPT, LaMDA, Dall-E 2, etc
Security-by-design, SBOM
STIX/TAXII
Use Cases
e-voting, e-gov, smart cities
Healthcare, UPI payments
Systems Security
OS, VM, containers, cloud
Network: SDN, NFV, SD-WAN
IoT, RFID, SCADA systems
IDS, IPS, Honeypot, Botnet
Access control
Authentication, Authorization
PKI & Trust management
Zero Trust
Application Security
Vulnerabilities, Malware
Ransomware, APTs, MITRE
Information flow control
Threat Modelling, Attack graphs
Security in AI/ML
Adversarial learning/inputs
Prompt injection, RLHF strategies
Model stealing, Model poisoning
Formal Methods for Security
Verification of Security Protocols
FM for AI/ML Models & Apps
Hardware Security
Remote attestation, PUFs
Trojans, Backdoors, FPGA
TEE, TRNG, SGX
Privacy
PETs, anonymization tech
De-identification attacks
Surveillance & Censorship
Inference, correlation attacks
Blockchain
Cryptocurrency, stablecoins
Interoperability, scalability
Smart contracts, concurrency
DIDs, NFTs, CBDCs, AML
Emerging Tech/Standards
ChatGPT, LaMDA, Dall-E 2, etc
Security-by-design, SBOM
STIX/TAXII
Use Cases
e-voting, e-gov, smart cities
Healthcare, UPI payments
Last updated by Dou Sun in 2026-03-11
Related Conferences
Related Journals
| CCF | Full Name | Impact Factor | Publisher | ISSN |
|---|---|---|---|---|
| a | ACM Transactions on Information Systems | 9.1 | ACM | 1046-8188 |
| Information Systems Frontiers | 8.3 | Springer | 1387-3326 | |
| a | IEEE Transactions on Information Forensics and Security | 8.0 | IEEE | 1556-6013 |
| Information Systems Journal | 6.3 | Wiley-Blackwell | 1350-1917 | |
| Information Systems Research | 5.1 | INFORMS | 1047-7047 | |
| Information Systems Management | 3.9 | Taylor & Francis | 1058-0530 | |
| b | Information Systems | 3.4 | Elsevier | 0306-4379 |
| International Journal of Information Security | 3.2 | Springer | 1615-5262 | |
| c | EURASIP Journal on Information Security | 2.1 | Springer | 1687-417X |
| c | IET Information Security | 1.300 | IET | 1751-8709 |