Conference

The field of information security is diverse, including technical, managerial, legal, social and even philosophical issues. Individuals alone cannot address these issues. Only the combined efforts of academia and industry can provide answers and solutions that will benefit all of society. Topics to be addressed by the conference include: research papers, case studies, lessons learned and current research. 


The proceedings of ISSA 2018 will be published in Springer CCIS (Communications in Computer and Information Science)CCIS is abstracted/indexed in DBLP, Google Scholar, EI-Compendex, Mathematical Reviews, SCImago, Scopus. CCIS volumes are also submitted for the inclusion in ISI Proceedings.

 

A downloadable Call for Papers can be found here

 

Topics include but are not limited to: 

  • Access control  
  • Applied cryptography    
  • Audit    
  • Big data forensics           
  • Cloud computing security            
  • Cyber-security 
  • Cyber-security & Big Data & Data Science             
  • Data and application security     
  • Digital forensics
  • Human aspects of information security 
  • Identification and authentication             
  • Identity management   
  • Information security awareness and training       
  • Information security governance             
  • Information security risk analysis              
  • Intrusion detection and fraud detection
  • Legal and ethical aspects of information security               
  • Mobile computing security         
  • Network security            
  • Phishing              
  • Privacy 
  • Security and usability     
  • Security of distributed architectures and infrastructures
  • Software security            
  • Standards, guidelines and certification   
  • Trust models and trust management     
  • Trusted computing