Welcome to the 3rd International Conference on Information Science and Security. ICISS2016 will be held on December 19th – 22nd in Pattaya, Thailand
ICISS 2016 is being held by iCatse focused on the area of Information Science and Security. The 1st and 2nd ICISS Proceedings were published in IEEE Xplore which was indexed in EI, ISI, and Scopus.
ICISS seeks contributions presenting novel research results in all aspects of Information Science and Security. Submitted papers will be peer-reviewed by our committee and the accepted papers will be published in ICISS proceedings which will be submitted to EI, ISI and Scopus to be indexed. Furthermore, the selected papers will be published in the special issues of prestigious international journals after further revision.
Prospective authors are invited to submit high-quality original technical papers reporting original research of theoretical or applied nature for presentation at the conference and publication in the ICISS2016 Proceedings. All submitted papers will be peer-reviewed. The manuscripts must be prepared in English, following the Manuscript Templates for Conference Proceedings with a maximum length of five (5) printed pages without incurring additional page charges (maximum 2 additional pages are allowed with over length page charge of USD100 for each page if accepted). Papers exceeding 7 pages will not be accepted. Accepted, registered and presented papers will be published in IEEE Xplore. Only pdf files are accepted.
Track 1: Information Security
•Access Control
•Anti-Malware
•Accounting and Audit
•Applied Cryptography
•Authentication and Authorization
•Biometrics
•Block and Stream Ciphers
•Cryptanalysis
•Cryptographic Protocol
•Cloud Computing Security
•Database Security
•Digital Forensics
•Distributed System Security
•Electronic Commerce
•Embedded Systems Security
•Hardware Security
•Homomorphic Encryption
•ID-Based Cryptography
•Intrusion Detection and Prevention
•Key Management
•Mobile and Wireless Security
•Network Security
•Operating System Security
•Privacy-Enhancing Technology
•Public Key Cryptography
•Security Architectures
•Security Policy
•Software Security
•Usable Security and Privacy
•Web Security
Track 2: Information and Computer Science
•Artificial Intelligence
•Cloud Computing
•Communication
•Computer Hardware
•Computer Vision
•Data Mining
•Digital Information
•E-learning
•Graphics and Visualization
•Hardware-Software Integration
•Human-Computer Interaction & Interactive Multimedia
•Image Processing
•Internet Technology
•Machine Learning
•Pattern Recognition
•Modeling and Simulation
•Multimedia Computing
•Networks
•Operating Systems
•Optimization
•Robotics
•Simulators
•Soft Computing
•Software Engineering
•Wearable Computing
12月19日
2016
12月22日
2016
初稿截稿日期
初稿录用通知日期
终稿截稿日期
注册截止日期
留言