Banner
Home      Log In      Contacts      FAQs      INSTICC Portal
 
Documents

Call for Papers

ICISSP is sponsored by INSTICC – Institute for Systems and Technologies of Information, Control and Communication

SCOPE

The International Conference on Information Systems Security and Privacy is an event where researchers and practitioners can meet and discuss state-of-the-art research about the technological, social, and regulatory challenges that regard the security, privacy, and trust of modern information systems. The conference welcomes papers of either practical or theoretical nature, and is interested in research or applications addressing all aspects of trust, security and privacy, and encompassing issues of concern for organizations, individuals and society at large.

CONFERENCE AREAS

Each of these topic areas is expanded below but the sub-topics list is not exhaustive. Papers may address one or more of the listed sub-topics, although authors should not feel limited by them. Unlisted but related sub-topics are also acceptable, provided they fit in one of the following main topic areas:

1. MANAGEMENT AND OPERATIONS
2. APPLICATIONS AND SERVICES
3. TECHNOLOGIES AND FOUNDATIONS


AREA 1: MANAGEMENT AND OPERATIONS


  • Accessible and Inclusive Security
  • Identity and Trust Management
  • Innovative Security Awareness and Education
  • Intrusion Detection and Response
  • Malware Detection
  • Mitigation of the Insider Threat
  • Regulatory and Technical Compliance Aspects of Security and Privacy
  • Risk and Reputation Management
  • Security and Privacy Metrics
  • Threat Awareness
  • Vulnerability Analysis and Countermeasures

AREA 2: APPLICATIONS AND SERVICES


  • AI and Machine Learning for Security
  • Distributed Ledgers and Blockchain Technologies and Applications
  • Mobile Security and Privacy
  • Privacy, Security and Trust in Social Media, Metaverse, and other Online Contexts
  • Security and Privacy in Cloud and Pervasive Computing
  • Security in IoT and Edge Computing
  • Security in Web Applications and Services
  • Systematization of Knowledge in Privacy and Security

AREA 3: TECHNOLOGIES AND FOUNDATIONS


  • Access and Usage Control
  • Cryptographic Algorithms
  • Data and Software Security
  • Innovation in Authentication, Biometrics, Identification
  • Privacy and Security Models
  • Privacy-Enhancing Models and Technologies
  • Security Architecture and Design Analysis
  • Security Frameworks, Architectures and Protocols
  • Security Testing
  • Trust Computing
  • Self Sovereign Identity

KEYNOTE SPEAKERS

Wenjing LouVirginia Tech, United States
Awais RashidUniversity of Bristol, United Kingdom
Ahmad-Reza SadeghiTechnical University of Darmstadt, Germany

PAPER SUBMISSION

Authors can submit their work in the form of a complete paper or an abstract, but please note that accepted abstracts are presented but not published in the proceedings of the conference. Complete papers can be submitted as a Regular Paper, representing completed and validated research, or as a Position Paper, portraying a short report of work in progress or an arguable opinion about an issue discussing ideas, facts, situations, methods, procedures or results of scientific research focused on one of the conference topic areas.

Authors should submit a paper in English, carefully checked for correct grammar and spelling, addressing one or several of the conference areas or topics. Each paper should clearly indicate the nature of its technical/scientific contribution, and the problems, domains or environments to which it is applicable. To facilitate the double-blind paper evaluation method, authors are kindly requested to produce and provide the paper WITHOUT any reference to any of the authors, including the authors’ personal details, the acknowledgments section of the paper and any other reference that may disclose the authors’ identity.

When submitting a complete paper please note that only original papers should be submitted. Authors are advised to read INSTICC's ethical norms regarding plagiarism and self-plagiarism thoroughly before submitting and must make sure that their submissions do not substantially overlap work which has been published elsewhere or simultaneously submitted to a journal or another conference with proceedings. Papers that contain any form of plagiarism will be rejected without reviews.

All papers must be submitted through the online submission platform PRIMORIS and should follow the instructions and templates that can be found under Guidelines and Templates. After the paper submission has been successfully completed, authors will receive an automatic confirmation e-mail.

PUBLICATIONS

All accepted complete papers will be published in the conference proceedings, under an ISBN reference, on paper and on digital support.
SCITEPRESS is a member of CrossRef (http://www.crossref.org/) and every paper on our digital library is given a DOI (Digital Object Identifier).
The proceedings will be submitted for indexation by SCOPUS, Google Scholar, DBLP, Semantic Scholar, EI and Web of Science / Conference Proceedings Citation Index.

IMPORTANT DATES

Conference Date: 20 - 22 February, 2025

Paper Submission: October 22, 2024 (extended) (extended)
Authors Notification:
December 4, 2024
Camera Ready and Registration:
December 20, 2024

Paper Submission: November 13, 2024
Authors Notification:
December 20, 2024
Camera Ready and Registration:
January 13, 2025

Workshops
Workshop Proposal: October 17, 2024

Special Sessions
Special Session Proposal: October 17, 2024

Tutorials
Tutorial Proposal: January 17, 2025

Demos
Demo Proposal: January 17, 2025

Panels
Panel Proposal: January 17, 2025

Abstracts
Abstract Submission: December 18, 2024
Authors Notification: January 14, 2025
Camera Ready and Registration: January 22, 2025

SECRETARIAT

ICISSP Secretariat
Address: Avenida de S. Francisco Xavier, Lote 7 Cv. C
             2900-616 Setúbal - Portugal
Tel.: +351 265 520 185
Fax: +351 265 520 186
e-mail: icissp.secretariat@insticc.org
Web: https://icissp.scitevents.org

VENUE

The conference will take place at the Vila Galé Porto hotel which is located in the beautiful and historical city of Porto in Portugal. Porto is considered to be one of the most beautiful historical towns in Portugal, with its remarkable architectural heritage shaped by history.

CONFERENCE CHAIR

Paolo MoriConsiglio Nazionale delle Ricerche, Italy

PROGRAM CO-CHAIRS

Roberto Di PietroKAUST, Saudi Arabia
Karen RenaudUniversity of Strathclyde, United Kingdom

PROGRAM COMMITTEE MEMBERS

Mohamed Abomhara, Norwegian University of Science and Technology (NTNU), Norway
Mo I. Adda, School of Computing, University of Portsmouth, United Kingdom
Asma Adnane, Loughborough University, United Kingdom
Isaac Agudo, University of Malaga, Spain
Mete Akgün, University of Tuebingen, Germany
Luiz P. Albini, Federal University of Parana, Brazil
Robson O. Albuquerque, Universidade de Brasília, Faculdade de Tecnologia, Brazil
Monther Aldwairi, Zayed University, United Arab Emirates
Mojtaba Alizadeh, Lorestan University, Iran, Islamic Republic of
Morteza Amini, Sharif University of Technology, Iran, Islamic Republic of
Emin Anarim, Bogazici University EE Department, Turkey
Mário Antunes, DEI, Polytechnic Institute of Leiria, Portugal
Abdullahi Arabo, University of the West of England, United Kingdom
Muhammad Asyraf Asbullah, Institute for Mathematical Research, Universiti Putra Malaysia, Malaysia
Yudistira Asnar, Institut Teknologi Bandung, Indonesia
Benjamin Aziz, Buckinghamshire New University, United Kingdom
Farag Azzedin, Independent Researcher, Saudi Arabia
Nasour Bagheri, Shahid Rajaee Teacher Training University, Iran, Islamic Republic of
Divya Bansal, Punjab Engineering College, India
Alessandro Barenghi, Politecnico di Milano, Italy
Rana Barua, Institute of Advancing Intelligence, India
Montserrat Batet, Universitat Rovira i Virgili, Spain
Hakem Beitollahi, Iran University of Science and Technology, Iran, Islamic Republic of
Sana Belguith, Independent Researcher, United Kingdom
Diana Berbecaru, Polytechnic University of Turin, Italy
Francesco Bergadano, University of Torino, Italy
Radhakrishna Bhat, Manipal Institute of Technology, Manipal Academy of Higher Education, India
Sajal Bhatia, Sacred Heart University, United States
Tarunpreet Bhatia, Thapar Institute of Engineering and Technology, India
Cătălin Bîrjoveanu, Department of Computer Science, “Al.I.Cuza” University of Iaşi, Iaşi, Romania, Romania
Chiara Bodei, Università di Pisa, Italy
Ravishankar Borgaonkar, Royal Institute of Technology, Sweden, Sweden
Francesco Buccafurri, University of Reggio Calabria, Italy
William J. Buchanan, Edinburgh Napier University, United Kingdom
Adriana Burlea-Schiopoiu, University of Craiova, Romania
Massimo Cafaro, University of Salento, Italy
Luigi Catuogno, University of Naples "Parthenope", Italy
Hervé Chabanne, Idemia & Télécom Paris, France
Sophie Chabridon, SAMOVAR, Télécom SudParis, Institut Polytechnique de Paris, France
Yacine Challal, College of Computing and IT, University of Doha for Science and Technology, Qatar
Thomas Chen, City University London, United Kingdom
Feng Cheng, Hasso-Plattner-Institute at University of Potsdam, Germany
Estelle Cherrier-Pawlowski, GREYC ENSICAEN, France
Aswani Kumar Cherukuri, Vellore Institute of Technology, Vellore, India
Hung-Yu Chien, National Chi Nan University, Taiwan, Republic of China
Stelvio Cimato, Department of Computer Science, Università degli Studi di Milano, Italy
Nathan Clarke, University of Plymouth, United Kingdom
Daniele Codetta-Raiteri, University of Piemonte Orientale, Italy
Gabriele Costa, IMT Lucca, Italy
Damien Couroussé, Independent Researcher, France
David Croasdell, University of Nevada, United States
Michel Cukier, University of Maryland, United States
Fisnik Dalipi, Linnaeus University, Sweden
Ernesto Damiani, EBTIC Laboratory, Khalifa University, United Arab Emirates
Bijoy Das, Indian Institute of Technology Kharagpur, India
Hervé Debar, Télécom SudParis, France
Yuri Demchenko, University of Amsterdam, Netherlands
Theo Dimitrakos, University of Kent, United Kingdom
Aolin Ding, Accenture Cyber Lab, United States
Marc J Dupuis, University of Washington, United States
Luca Durante, Consiglio Nazionale Delle Ricerche, Italy
Ashutosh Dhar Dwivedi, Department of Electronics (Cybersecurity Group), Aalborg University, Denmark
Petr Dzurenda, Brno University of Technology, Czech Republic
Carl R Elks, Virginia Commonwealth University, United States
Jan Eloff, Department of Computer Science, University of Pretoria, Lynwood Road, Pretoria, South Africa, South Africa
Claude Fachkha, University Of Dubai, United Arab Emirates
Franco Frattolillo, Department of Engineering, University of Sannio, Italy
Chrystel Gaber, Orange, France
Alban Gabillon, Laboratoire GePaSud - Université de la Polynésie Française, French Polynesia
Clemente Galdi, Università di Salerno, Italy
Letterio Galletta, IMT Institute for Advanced Studies Lucca, Italy
Luis Javier García Villalba, Universidad Complutense de Madrid, Spain
Dimitra Georgiou, Independent Researcher, Greece
Matthieu Giraud, Independent Researcher, France
Prosanta Gope, The University of Sheffield, United Kingdom
Johann Großschädl, University of Luxembourg, Luxembourg
Nils Gruschka, University of Oslo, Norway
Shay Gueron, University of Haifa, Israel
Gilles Guette, University of Rennes, France
Arash Habibi Lashkari, York University, Canada
Mohammad Hamad, TUM School of Computation, Technical University of Munich, Germany
Ligang He, Department of Computer Science, University of Warwick, United Kingdom
Andreas Heinemann, Darmstadt University of Applied Sciences, Germany
Swee-Huay Heng, Faculty of Information Science, Multimedia University, Malaysia
João Henriques, Faculty of Science and Technology, Universidade de Coimbra, Portugal
Yuxiang Hong, Hangzhou Dianzi University, China
Máté Horváth, University of Wuppertal, Germany
Fu-Hau Hsu, National Central University, Taiwan, Republic of China
Ladislav Huraj, University of Ss. Cyril and Methodius in Trnava, Slovak Republic
Dieter Hutter, German Research Centre for Artificial Intelligence, Germany
Tomasz Hyla, West Pomeranian University of Technology in Szczecin, Poland
M. Ilayaraja, Kalasalingam University, India
Asif Iqbal, Independent Researcher, United Arab Emirates
Rafiqul Islam, Charles Sturt University, Australia
Srinivas Jangirala, O.P. Jindal Global University, India
Ahmad Javaid, UNIVERSITY OF TOLEDO, United States
Mahabir P. Jhanwar, University of Calgary, Canada
Nesrine Kaaniche, Telecom SudParis, Institut Polytechnique de Paris, France
Georgios Kambourakis, University of the Aegean, Greece
Akira Kanaoka, Toho University, Japan
Shri Kant, Sharda University, India
Kallol K. Karmakar, University of Newcastle, Australia
Mohand-Tahar Kechadi, University College Dublin, Ireland
Ayesha Khalid, Queen's University Belfast, United Kingdom
Nour Eldeen Mahmoud Khalifa, cairo university, Egypt
Rida Khatoun, Institut Polytechnique de Paris, France
Sajad Khorsandroo, The University of Texas, United States
Peter Kieseberg, St. Poelten University of Applied Sciences, Austria
Hiroaki Kikuchi, Meiji University, Japan
Hyoungshick Kim, Sungkyunkwan University, Korea, Republic of
Tiffany Hyun-Jin Kim, Independent Researcher, United States
Nikos Komninos, City University London, United Kingdom
Zbigniew Kotulski, Warsaw University of Technology, Poland
Panayiotis Kotzanikolaou, University of Piraeus, Greece
Csaba Krasznay, Department of Cybersecurity, National University of Public Service, Hungary
Stephan Krenn, AIT Austrian Institute of Technology, Austria
Ioannis Krontiris, Huawei Technologies, GmbH, Germany
Piotrowski Krzysztof, Leibniz IHP, Germany
Gianluca Lax, University of Reggio Calabria, Italy
Phil Legg, University of the West of England, United Kingdom
Alexios Lekidis, Aristotle University of Thessaloniki, Greece
Yair Levy, Nova Southeastern University (NSU), United States
Fengjun Li, University of Kansas, United States
Jiguo Li, Fujian Normal University, China
Konstantinos Limniotis, Hellenic Data Protection Authority, Greece
Chu-Hsing Lin, Tunghai University, Taiwan, Republic of China
Antonio Lioy, Politecnico di Torino, Italy
Alexei Lisitsa, University of Liverpool, United Kingdom
Changwei Liu, Accenture Cyber Lab, United States
Thomas Loruenser, AIT Austrian Institute of Technology, Austria
Haibing Lu, Santa Clara University, United States
Flamina Luccio, Università Ca' Foscari Venezia, Italy
Suryadipta Majumdar, Concordia University, Canada
Yassine Maleh, Technical Committee on Computational Finance and Economics of the IEEE Computational Intelligence Society, United States
Ilaria Matteucci, Istituto di Informatica e Telematica, CNR, Italy
Kieran McLaughlin, CSIT, Queen's University Belfast, United Kingdom
Gianluigi Me, Luiss University, Italy
Weizhi Meng, Technical University of Denmark, Denmark
Francesco Mercaldo, National Research Council of Italy (CNR), Italy
Alessio Merlo, University of Genoa, Italy
Antonis Michalas, Tampere University, Finland
Ali Miri, Toronto Metropolitan University, Canada
David Naccache, Ecole Normale Superieure, France
Sashank Narain, University of Massachusetts Lowell, United States
Antonino Nocera, University of Pavia, Italy
Tetsushi Oki, Shizuoka University, Japan
Alma Oracevic, Georgia Tech, United States
Ghizlane Orhanou, Faculty of Sciences, LabMiA, Mohammed V University in Rabat, Morocco
Federica Paci, University of Verona, Italy
Frank Pallas, Paris Lodron University Salzburg, Austria
Esther Palomar, Birmingham City University, United Kingdom
Mauricio Papa, University of Tulsa, United States
Yuan Ping, Xuchang University, China
Nikolaos Pitropakis, Edinburgh Napier University, United Kingdom
Joachim Posegga, Institute of IT Security and Security Law, Germany
Ali Mustafa Qamar, Qassim University, Saudi Arabia
Bo Qin, Independent Researcher, China
Sk. Md. Mizanur Rahman, Centennial College, Canada
Rajendra Raj, Rochester Institute of Technology, United States
Michelle Ramim, Nova Southeastern University, Dr. Kiran Patel School of Osteopathic Medicine, United States
Silvio Ranise, Fondazione Bruno Kessler, Italy
Indrakshi Ray, Colorado State University, United States
Indrajit Ray, Colorado State University, United States
Neil Rowe, Naval Postgraduate School, United States
Dipanwita Roychowdhury, Indian Institute of Technology, Kharagpur, India
Antonio Ruiz-Martínez, University of Murcia, Spain
Christoph K. Ruland, University of Siegen, Germany
Peter Y A Ryan, University of Luxembourg, Luxembourg
Nader S. Safa, University of Wolverhampton, United Kingdom
Hossein Saiedian, University of Kansas, United States
Mattia Salnitri, Politecnico di Milano, Italy
Reza Samavi, Toronto Metropolitan University, United States
Paolo Santini, Università Politecnica delle Marche, Italy
Andre Scedrov, University of Pennsylvania, United States
Peter Schartner, Alpen-Adria-Universitat Klagenfurt, Austria
Christoph Schmittner, Austrian Institute of Technology, Austria
Nilanjan Sen, Western Illionis University, United States
Ahmed Serhrouchni, Ecole Nationale Supérieure des Télécommunications, GET - CNRS UMR 5141 – LTCI, France
Khaled Shuaib, UAE University, United Arab Emirates
Paulo Simoes, University of Coimbra, Portugal
Nicolas Sklavos, University of Patras, Greece
Florian Skopik, Austrian Institute of Technology, Austria
Goran Sladic, University of Novi Sad, Faculty of Technical Sciences, Serbia
Georgios Spathoulas, NTNU, Norway
Christoph Stach, University of Stuttgart, Germany
Yannis Stamatiou, University of Patras, Greece
Paul Stankovski Wagner, Lund University, Sweden
Christoph Striecks, AIT Austrian Institute of Technology, Austria
Alin Suciu, Technical University of Cluj Napoca, Romania
Mario Südholt, IMT Atlantique (Nantes campus), France
Iain Sutherland, Noroff University College, Norway
Samaneh Tajalizadehkhoob, Delft University of Technology, Netherlands
Shahab Tayeb, California State University, Fresno, United States
Cihangir Tezcan, Middle East Technical University, Turkey
George Theodoridis, University of Patras, Greece
Rafael T. Timoteo Timóteo de Sousa Jr, National Science and Technology Institute on Cyber Security, Electrical Engineering Department, University of Brasília (UnB), P.O. Box 4466, Brasília–DF, CEP 70910-900, Brazil
Jacques Traore, Independent Researcher, France
Somanath Tripathy, Indian Institute of Technology, Patna, India
Raylin Tso, National Chengchi University, Taiwan, Republic of China
Nur I. Udzir, Universiti Putra Malasyia, Malaysia
Faheem Ullah, The University of Adelaide, Australia
Shambhu J. Upadhyaya, University at Buffalo, United States
Adriano Valenzano, Consiglio Nazionale delle Ricerche, Italy
Karl van der Schyff, Division of Cybersecurity, Abertay University, United Kingdom
Umberto Villano, Università degli Studi del Sannio, Italy
Andrea Visconti, Università Degli Studi Di Milano, Italy
Hua Wang, Victoria University, Australia
Yongge Wang, Software And Information Systems, University of North Carolina, United States
Stephen G. Wells, Computer Science and Engineering, New Mexico Tech, United States
Carlos Becker Westphall, Federal University Santa Catarina Ufsc, Brazil
Huapeng Wu, University of Windsor, Canada
Markus Wurzenberger, AIT - Austrian Institute of Technology GmbH, Austria
Lei Xu, Kent State University, United States
Ching-Nung Yang, National Dong Hwa University, Taiwan, Republic of China
Li Yang, Xidian University, China
Wun-She Yap, Tunku Abdul Rahman University, Malaysia
Wei-Chuen Yau, Xiamen University, China
Habib Youssef, ISITCom Hammam Sousse, University of Sousse, Tunisia
Amr Youssef, Concordia University, Canada
Salman Yussof, Universiti Tenaga Nasional, Malaysia
Nicola Zannone, Eindhoven University of Technology, Netherlands
Bruno Bogaz Zarpelao, State University of Londrina, Brazil
Medien Zeghid, College of Engineering,Prince Sattam Bin Abdulaziz University, Saudi Arabia
Shengzhi Zhang, Boston University, United States
Taieb Znati, University of Pittsburgh, United States
André Zúquete, IEETA, IT, Universidade de Aveiro, Portugal

(list not yet complete)

footer