Home      Log In      Contacts      FAQs      INSTICC Portal

Call for Papers

ICISSP is sponsored by INSTICC – Institute for Systems and Technologies of Information, Control and Communication


The International Conference on Information Systems Security and Privacy is an event where researchers and practitioners can meet and discuss state-of-the-art research about the technological, social, and regulatory challenges that regard the security, privacy, and trust of modern information systems. The conference welcomes papers of either practical or theoretical nature, and is interested in research or applications addressing all aspects of trust, security and privacy, and encompassing issues of concern for organizations, individuals and society at large.


Each of these topic areas is expanded below but the sub-topics list is not exhaustive. Papers may address one or more of the listed sub-topics, although authors should not feel limited by them. Unlisted but related sub-topics are also acceptable, provided they fit in one of the following main topic areas:



  • Accessible and Inclusive Security
  • Identity and Trust Management
  • Innovative Security Awareness and Education
  • Intrusion Detection and Response
  • Malware Detection
  • Mitigation of the Insider Threat
  • Regulatory and Technical Compliance Aspects of Security and Privacy
  • Risk and Reputation Management
  • Security and Privacy Metrics
  • Threat Awareness
  • Vulnerability Analysis and Countermeasures


  • AI and Machine Learning for Security
  • Distributed Ledgers and Blockchain Technologies and Applications
  • Mobile Security and Privacy
  • Privacy, Security and Trust in Social Media, Metaverse, and other Online Contexts
  • Security and Privacy in Cloud and Pervasive Computing
  • Security in IoT and Edge Computing
  • Security in Web Applications and Services
  • Systematization of Knowledge in Privacy and Security


  • Access and Usage Control
  • Cryptographic Algorithms
  • Data and Software Security
  • Innovation in Authentication, Biometrics, Identification
  • Privacy and Security Models
  • Privacy-Enhancing Models and Technologies
  • Security Architecture and Design Analysis
  • Security Frameworks, Architectures and Protocols
  • Security Testing
  • Trust Computing
  • Self Sovereign Identity


ICISSP 2025 will have several invited keynote speakers, who are internationally recognized experts in their areas. Their names are not yet confirmed.


Authors can submit their work in the form of a complete paper or an abstract, but please note that accepted abstracts are presented but not published in the proceedings of the conference. Complete papers can be submitted as a Regular Paper, representing completed and validated research, or as a Position Paper, portraying a short report of work in progress or an arguable opinion about an issue discussing ideas, facts, situations, methods, procedures or results of scientific research focused on one of the conference topic areas.

Authors should submit a paper in English, carefully checked for correct grammar and spelling, addressing one or several of the conference areas or topics. Each paper should clearly indicate the nature of its technical/scientific contribution, and the problems, domains or environments to which it is applicable. To facilitate the double-blind paper evaluation method, authors are kindly requested to produce and provide the paper WITHOUT any reference to any of the authors, including the authors’ personal details, the acknowledgments section of the paper and any other reference that may disclose the authors’ identity.

When submitting a complete paper please note that only original papers should be submitted. Authors are advised to read INSTICC's ethical norms regarding plagiarism and self-plagiarism thoroughly before submitting and must make sure that their submissions do not substantially overlap work which has been published elsewhere or simultaneously submitted to a journal or another conference with proceedings. Papers that contain any form of plagiarism will be rejected without reviews.

All papers must be submitted through the online submission platform PRIMORIS and should follow the instructions and templates that can be found under Guidelines and Templates. After the paper submission has been successfully completed, authors will receive an automatic confirmation e-mail.


All accepted complete papers will be published in the conference proceedings, under an ISBN reference, on paper and on digital support.
SCITEPRESS is a member of CrossRef ( and every paper on our digital library is given a DOI (Digital Object Identifier).
The proceedings will be submitted for indexation by SCOPUS, Google Scholar, DBLP, Semantic Scholar, EI and Web of Science / Conference Proceedings Citation Index.


Conference Date: 20 - 22 February, 2025

Paper Submission: October 2, 2024
Authors Notification:
December 4, 2024
Camera Ready and Registration:
December 20, 2024

Paper Submission: November 13, 2024
Authors Notification:
December 20, 2024
Camera Ready and Registration:
January 13, 2025

Workshop Proposal: October 17, 2024

Doctoral Consortium
Paper Submission: December 18, 2024
Authors Notification: January 14, 2025
Camera Ready and Registration: January 22, 2025

Special Sessions
Special Session Proposal: October 17, 2024

Tutorial Proposal: January 17, 2025

Demo Proposal: January 17, 2025

Panel Proposal: January 17, 2025

Abstract Submission: December 18, 2024
Authors Notification: January 14, 2025
Camera Ready and Registration: January 22, 2025


ICISSP Secretariat
Address: Avenida de S. Francisco Xavier, Lote 7 Cv. C
             2900-616 Setúbal - Portugal
Tel.: +351 265 520 185
Fax: +351 265 520 186


Available soon.


Paolo MoriIstituto di Informatica e Telematica, Consiglio Nazionale delle Ricerche, Italy


Roberto Di PietroKAUST, Saudi Arabia
Karen RenaudUniversity of Strathclyde, United Kingdom


Asma Adnane, Loughborough University, United Kingdom
Luiz P. Albini, Informatics Depto, Federal University of Parana, Brazil
Robson O. Albuquerque, Depto de Engenharia Elétrica e Redes de Comunicação, Universidade de Brasília, Faculdade de Tecnologia, Brazil
Mojtaba Alizadeh, Lorestan University, Iran, Islamic Republic of
Morteza Amini, Computer Engineering, Sharif University of Technology, Iran, Islamic Republic of
Benjamin Aziz, Creative and Digital Industries, Buckinghamshire New University, United Kingdom
Divya Bansal, Punjab Engineering College, India
Alessandro Barenghi, Dipartimento di Elettronica, Informazione e Bioingegneria, Politecnico di Milano, Italy
Rana Barua, Cryptology, Institute of Advancing Intelligence, India
Montserrat Batet, Universitat Rovira i Virgili, Spain
Hakem Beitollahi, computer engineering, Iran University of Science and Technology, Iran, Islamic Republic of
Francesco Bergadano, Computer Science, University of Torino, Italy
Radhakrishna Bhat, Manipal Institute of Technology, Manipal Academy of Higher Education, India
Cătălin Bîrjoveanu, Department of Computer Science, Department of Computer Science, “Al.I.Cuza” University of Iaşi, Iaşi, Romania, Romania
Chiara Bodei, Computer Science, Università di Pisa, Italy
Francesco Buccafurri, DIIES, University of Reggio Calabria, Italy
William J. Buchanan, Computing, Edinburgh Napier University, United Kingdom
Massimo Cafaro, Dipartimento di Ingegneria dell'Innovazione, University of Salento, Italy
Luigi Catuogno, Dipartimento di Informatica, Università degli Studi di Salerno, Italy
Hervé Chabanne, Idemia & Télécom Paris, France
Yacine Challal, College of Computing and IT, University of Doha for Science and Technology, Qatar
Feng Cheng, Hasso-Plattner-Institute at University of Potsdam, Germany
Estelle Cherrier-Pawlowski, Computer science, GREYC ENSICAEN, France
Aswani Kumar Cherukuri, Vellore Institute of Technology, Vellore, India
Hung-Yu Chien, information management, National Chi Nan University, Taiwan, Republic of China
Stelvio Cimato, Department of Computer Science, Università degli Studi di Milano, Italy
Nathan Clarke, University of Plymouth, United Kingdom
Hervé Debar, Télécom SudParis, France
Aolin Ding, Accenture Cyber Lab, United States
Luca Durante, Consiglio Nazionale Delle Ricerche, Italy
Petr Dzurenda, Brno University of Technology, Czech Republic
Jan Eloff, Department Computer Science, Department of Computer Science, University of Pretoria, Lynwood Road, Pretoria, South Africa, South Africa
Alban Gabillon, Laboratoire GePaSud - Université de la Polynésie Française, French Polynesia
Clemente Galdi, Università di Salerno, Italy
Letterio Galletta, IMT Institute for Advanced Studies Lucca, Italy
Nils Gruschka, University of Oslo, Norway
Gilles Guette, University of Rennes, France
Arash Habibi Lashkari, School of Information Technology, York University, Canada
Mohammad Hamad, TUM School of Computation, Technical University of Munich, Germany
Swee-Huay Heng, Multimedia University, Malaysia
Yuxiang Hong, Hangzhou Dianzi University, China
Fu-Hau Hsu, Computer Science and Information Engineering, National Central University, Taiwan, Republic of China
Dieter Hutter, German Research Centre for Artificial Intelligence, Germany
Rafiqul Islam, School of Computing, Charles Sturt University, Australia
Srinivas Jangirala, O.P. Jindal Global University, India
Nesrine Kaaniche, Telecom SudParis, Institut Polytechnique de Paris, France
Georgios Kambourakis, Department of Information and Communication Systems Engineering , University of the Aegean, Greece
Akira Kanaoka, Toho University, Japan
Kallol K. Karmakar, School of Electrical Engineering and Computing, University of Newcastle, Australia
Peter Kieseberg, St. Poelten University of Applied Sciences, Austria
Hiroaki Kikuchi, School of Interdisciplinary Mathematical Sciences, Meiji University, Japan
Zbigniew Kotulski, Faculty of Electronics and Information Technology, Warsaw University of Technology, Poland
Stephan Krenn, Center for Digital Safety & Security, AIT Austrian Institute of Technology, Austria
Ioannis Krontiris, Huawei Technologies, GmbH, Germany
Piotrowski Krzysztof, Wireless Systems, Leibniz IHP, Germany
Gianluca Lax, DIIES, University of Reggio Calabria, Italy
Phil Legg, Department of Computer Science and Creative Technologies, University of the West of England, United Kingdom
Yair Levy, College of Computing and Engineering (CCE), Nova Southeastern University (NSU), United States
Konstantinos Limniotis, Hellenic Data Protection Authority, Greece
Chu-Hsing Lin, Computer Science, Tunghai University, Taiwan, Republic of China
Changwei Liu, Accenture Cyber Lab, United States
Thomas Loruenser, AIT Austrian Institute of Technology, Austria
Haibing Lu, Information Systems and Analytics, Santa Clara University, United States
Flamina Luccio, DAIS, Università Ca' Foscari Venezia, Italy
Ilaria Matteucci, Istituto di Informatica e Telematica, CNR, Italy
Gianluigi Me, Economics and FInance, Luiss University, Italy
Weizhi Meng, Computer Science, Technical University of Denmark, Denmark
Francesco Mercaldo, National Research Council of Italy (CNR), Italy
Alessio Merlo, DIBRIS, University of Genoa, Italy
Ali Miri, Computer Science, Toronto Metropolitan University, Canada
Sashank Narain, University of Massachusetts Lowell, United States
Antonino Nocera, DIII, University of Pavia, Italy
Ghizlane Orhanou, Faculty of Sciences, LabMiA, Mohammed V University in Rabat, Morocco
Federica Paci, Department of Computer Science, University of Verona, Italy
Mauricio Papa, Computer Science, University of Tulsa, United States
Yuan Ping, Xuchang University, China
Nikolaos Pitropakis, School of Computing, Edinburgh Napier University, United Kingdom
Bo Qin, Independent Researcher, China
Michelle Ramim, Health Informatics, Nova Southeastern University, Dr. Kiran Patel School of Osteopathic Medicine, United States
Silvio Ranise, CIT, Fondazione Bruno Kessler, Italy
Indrakshi Ray, Computer Science, Colorado State University, United States
Neil Rowe, Computer Science, Naval Postgraduate School, United States
Antonio Ruiz-Martínez, Departament of Information and Communications Engineering, University of Murcia, Spain
Christoph K. Ruland, Electrical Engineering and Computer Science, University of Siegen, Germany
Nader S. Safa, Wolverhampton Cyber Research Institute, University of Wolverhampton, United Kingdom
Hossein Saiedian, EECS, University of Kansas, United States
Andre Scedrov, University of Pennsylvania, United States
Nilanjan Sen, Computer Science, Western Illionis University, United States
Nicolas Sklavos, Computer Engineering and Informatics, University of Patras, Greece
Florian Skopik, Digital Safety and Security, Austrian Institute of Technology, Austria
Georgios Spathoulas, NTNU, Norway
Christoph Stach, Applications of Parallel and Distributed Systems, University of Stuttgart, Germany
Yannis Stamatiou, Business Administration, University of Patras, Greece
Christoph Striecks, AIT Austrian Institute of Technology, Austria
Alin Suciu, Computer Science, Technical University of Cluj Napoca, Romania
Mario Südholt, IMT Atlantique (Nantes campus), France
Iain Sutherland, Computing, Noroff University College, Norway
Cihangir Tezcan, Cyber Security, Middle East Technical University, Turkey
Somanath Tripathy, Indian Institute of Technology, Patna, India
Raylin Tso, Computer Science, National Chengchi University, Taiwan, Republic of China
Nur I. Udzir, Universiti Putra Malasyia, Malaysia
Adriano Valenzano, CNR-IEIIT, Consiglio Nazionale delle Ricerche, Italy
Umberto Villano, Università degli Studi del Sannio, Italy
Yongge Wang, Software And Information Systems, University of North Carolina, United States
Lei Xu, Kent State University, United States
Nicola Zannone, Department of Mathematics and Computer Science , Eindhoven University of Technology, Netherlands
Bruno Bogaz Zarpelao, State University of Londrina, Brazil
Shengzhi Zhang, Boston University, Metropolitan College, United States

(list not yet complete)