会议信息
ICISS 2026: International Conference on Information Systems Security
请登录查看会议网址
截稿日期: |
2026-07-10 |
通知日期: |
2026-09-10 |
会议日期: |
2026-12-16 |
会议地点: |
Chennai, India |
届数: |
22 |
CORE: b QUALIS: b3 浏览: 32224 关注: 6 参加: 1
征稿
A broad but non-exhaustive list of areas of interest is as below:
Systems Security
OS, VM, containers, cloud
Network: SDN, NFV, SD-WAN
IoT, RFID, SCADA systems
IDS, IPS, Honeypot, Botnet
Access control
Authentication, Authorization
PKI & Trust management
Zero Trust
Application Security
Vulnerabilities, Malware
Ransomware, APTs, MITRE
Information flow control
Threat Modelling, Attack graphs
Security in AI/ML
Adversarial learning/inputs
Prompt injection, RLHF strategies
Model stealing, Model poisoning
Formal Methods for Security
Verification of Security Protocols
FM for AI/ML Models & Apps
Hardware Security
Remote attestation, PUFs
Trojans, Backdoors, FPGA
TEE, TRNG, SGX
Privacy
PETs, anonymization tech
De-identification attacks
Surveillance & Censorship
Inference, correlation attacks
Blockchain
Cryptocurrency, stablecoins
Interoperability, scalability
Smart contracts, concurrency
DIDs, NFTs, CBDCs, AML
Emerging Tech/Standards
ChatGPT, LaMDA, Dall-E 2, etc
Security-by-design, SBOM
STIX/TAXII
Use Cases
e-voting, e-gov, smart cities
Healthcare, UPI payments
Systems Security
OS, VM, containers, cloud
Network: SDN, NFV, SD-WAN
IoT, RFID, SCADA systems
IDS, IPS, Honeypot, Botnet
Access control
Authentication, Authorization
PKI & Trust management
Zero Trust
Application Security
Vulnerabilities, Malware
Ransomware, APTs, MITRE
Information flow control
Threat Modelling, Attack graphs
Security in AI/ML
Adversarial learning/inputs
Prompt injection, RLHF strategies
Model stealing, Model poisoning
Formal Methods for Security
Verification of Security Protocols
FM for AI/ML Models & Apps
Hardware Security
Remote attestation, PUFs
Trojans, Backdoors, FPGA
TEE, TRNG, SGX
Privacy
PETs, anonymization tech
De-identification attacks
Surveillance & Censorship
Inference, correlation attacks
Blockchain
Cryptocurrency, stablecoins
Interoperability, scalability
Smart contracts, concurrency
DIDs, NFTs, CBDCs, AML
Emerging Tech/Standards
ChatGPT, LaMDA, Dall-E 2, etc
Security-by-design, SBOM
STIX/TAXII
Use Cases
e-voting, e-gov, smart cities
Healthcare, UPI payments
最后更新 Dou Sun 在 2026-03-11
相关会议
| CCF | CORE | QUALIS | 简称 | 全称 | 截稿日期 | 通知日期 | 会议日期 |
|---|---|---|---|---|---|---|---|
| b | b3 | ICISS | International Conference on Information Systems Security | 2026-07-10 | 2026-09-10 | 2026-12-16 | |
| c | b3 | WEBIST | International Conference on Web Information Systems and Technologies | 2026-05-19 | 2026-07-17 | 2026-10-27 | |
| c | a | b1 | WISE | International Conference on Web Information System Engineering | 2025-07-17 | 2025-08-30 | 2025-12-15 |
| c | b | a2 | ISC | Information Security Conference | 2025-06-04 | 2025-07-29 | 2025-10-20 |
| c | b | b1 | ICICS | International Conference on Information and Communications Security | 2025-05-23 | 2025-07-21 | 2025-10-29 |
| a | ISD | International Conference on Information Systems Development | 2024-04-16 | 2024-06-04 | 2024-08-26 | ||
| b | NSS | International Conference on Network and System Security | 2023-03-03 | 2023-05-05 | 2023-08-14 | ||
| a* | ICIS | International Conference on Information Systems | 2017-05-05 | 2017-08-07 | 2017-12-10 | ||
| c | IAS | International Conference on Information Assurance and Security | 2015-10-21 | 2015-11-10 | 2015-12-07 | ||
| b4 | WISM | International Conference on Web Information Systems and Mining | 2013-04-20 | 2013-04-20 | 2013-08-13 |
相关期刊
| CCF | 全称 | 影响因子 | 出版商 | ISSN |
|---|---|---|---|---|
| a | ACM Transactions on Information Systems | 9.1 | ACM | 1046-8188 |
| Information Systems Frontiers | 8.3 | Springer | 1387-3326 | |
| a | IEEE Transactions on Information Forensics and Security | 8.0 | IEEE | 1556-6013 |
| Information Systems Journal | 6.3 | Wiley-Blackwell | 1350-1917 | |
| Information Systems Research | 5.1 | INFORMS | 1047-7047 | |
| Information Systems Management | 3.9 | Taylor & Francis | 1058-0530 | |
| b | Information Systems | 3.4 | Elsevier | 0306-4379 |
| International Journal of Information Security | 3.2 | Springer | 1615-5262 | |
| c | EURASIP Journal on Information Security | 2.1 | Springer | 1687-417X |
| c | IET Information Security | 1.300 | IET | 1751-8709 |