Banner
Home      Log In      Contacts      FAQs      INSTICC Portal
 

Call for Papers

ICISSP is sponsored by INSTICC – Institute for Systems and Technologies of Information, Control and Communication

SCOPE

The International Conference on Information Systems Security and Privacy is an event where researchers and practitioners can meet and discuss state-of-the-art research about the technological, social, and regulatory challenges that regard the security, privacy, and trust of modern information systems. The conference welcomes papers of either practical or theoretical nature, and is interested in research or applications addressing all aspects of trust, security and privacy, and encompassing issues of concern for organizations, individuals and society at large.


CONFERENCE AREAS

Each of these topic areas is expanded below but the sub-topics list is not exhaustive. Papers may address one or more of the listed sub-topics, although authors should not feel limited by them. Unlisted but related sub-topics are also acceptable, provided they fit in one of the following main topic areas:

1. MANAGEMENT AND OPERATIONS
2. APPLICATIONS AND SERVICES
3. TECHNOLOGIES AND FOUNDATIONS


AREA 1: MANAGEMENT AND OPERATIONS


  • Legal and Regulatory Issues
  • Risk and Reputation Management
  • Identity and Trust Management
  • Threat Awareness
  • Intrusion Detection and Response
  • Security Awareness and Education
  • Malware Detection
  • Vulnerability Analysis and Countermeasures
  • Security and Privacy Metrics

AREA 2: APPLICATIONS AND SERVICES


  • Web Applications and Services
  • Distributed Ledgers and Blockchain Technologies and Applications
  • Security and Privacy in Cloud and Pervasive Computing
  • Privacy, Security and Trust in Social Media
  • Data Mining and Knowledge Discovery
  • AI and Machine Learning for Security
  • Security in IoT and Edge Computing
  • Mobile Security

AREA 3: TECHNOLOGIES AND FOUNDATIONS


  • Trusted Computing
  • Access and Usage Control
  • Security Testing
  • Data and Software Security
  • Privacy-Enhancing Models and Technologies
  • Privacy and Security Models
  • Cryptographic Algorithms
  • Security Frameworks, Architectures and Protocols
  • Authentication, Biometrics, Identification
  • Security Architecture and Design Analysis

KEYNOTE SPEAKERS

Melanie VolkamerKarlsruhe Institute of Technology, Germany
Luca ViganòDepartment of Informatics, King's College London, United Kingdom

PAPER SUBMISSION

Authors can submit their work in the form of a complete paper or an abstract, but please note that accepted abstracts are presented but not published in the proceedings of the conference. Complete papers can be submitted as a Regular Paper, representing completed and validated research, or as a Position Paper, portraying a short report of work in progress or an arguable opinion about an issue discussing ideas, facts, situations, methods, procedures or results of scientific research focused on one of the conference topic areas.

Authors should submit a paper in English, carefully checked for correct grammar and spelling, addressing one or several of the conference areas or topics. Each paper should clearly indicate the nature of its technical/scientific contribution, and the problems, domains or environments to which it is applicable. To facilitate the double-blind paper evaluation method, authors are kindly requested to produce and provide the paper WITHOUT any reference to any of the authors, including the authors’ personal details, the acknowledgments section of the paper and any other reference that may disclose the authors’ identity.

When submitting a complete paper please note that only original papers should be submitted. Authors are advised to read INSTICC's ethical norms regarding plagiarism and self-plagiarism thoroughly before submitting and must make sure that their submissions do not substantially overlap work which has been published elsewhere or simultaneously submitted to a journal or another conference with proceedings. Papers that contain any form of plagiarism will be rejected without reviews.

All papers must be submitted through the online submission platform PRIMORIS and should follow the instructions and templates that can be found under Guidelines and Templates. After the paper submission has been successfully completed, authors will receive an automatic confirmation e-mail.

PUBLICATIONS

All accepted complete papers will be published in the conference proceedings, under an ISBN reference, on paper and on digital support.
SCITEPRESS is a member of CrossRef (http://www.crossref.org/) and every paper on our digital library is given a DOI (Digital Object Identifier).
The proceedings will be submitted for indexation by SCOPUS, Google Scholar, DBLP, Semantic Scholar, EI and Web of Science / Conference Proceedings Citation Index.

IMPORTANT DATES

Conference Date: 22 - 24 February, 2023

Paper Submission: November 1, 2022 (expired)
Authors Notification:
December 6, 2022 (expired)
Camera Ready and Registration:
December 20, 2022 (expired)

Paper Submission: November 24, 2022 (expired)
Authors Notification:
December 22, 2022 (expired)
Camera Ready and Registration:
January 9, 2023 (expired)

Late-Breaking

Paper Submission: December 15, 2022 (expired)
Authors Notification:
January 4, 2023 (expired)
Camera Ready and Registration:
January 11, 2023 (expired)

Tutorials
Tutorial Proposal: January 13, 2023 (expired)

Demos
Demo Proposal: January 13, 2023 (expired)

Panels
Panel Proposal: January 13, 2023 (expired)

Abstracts
Abstract Submission: January 2, 2023 (expired)
Authors Notification: January 13, 2023 (expired)
Camera Ready and Registration: January 23, 2023 (expired)

Post Publicationss
Authors Notification: March 7, 2023 (expired)
Camera Ready and Registration: May 30, 2023 (expired)

SECRETARIAT

ICISSP Secretariat
Address: Avenida de S. Francisco Xavier, Lote 7 Cv. C
             2900-616 Setúbal - Portugal
Tel.: +351 265 520 185
Fax: +351 265 520 186
e-mail: icissp.secretariat@insticc.org
Web: https://icissp.scitevents.org

VENUE

Our conference will take place at the Lisbon Marriott Hotel, this 4 star Venue was considered Portugal’s leading conference hotel.

CONFERENCE CHAIR

Steven FurnellSchool of Computer Science, University of Nottingham, United Kingdom

PROGRAM CO-CHAIRS

Paolo MoriIstituto di Informatica e Telematica, Consiglio Nazionale delle Ricerche, Italy
Gabriele LenziniInterdisciplinary Center for Security, Reliability and Trust (SnT), University of Luxembourg, Luxembourg

PROGRAM COMMITTEE MEMBERS

Alexander O. Akande, Capella University, United States
Morteza Amini, Computer Engineering, Sharif University of Technology, Iran, Islamic Republic of
Hugo Barbosa, Lusofona University, Portugal
Alessandro Barenghi, Dipartimento di Elettronica, Informazione e Bioingegneria, Politecnico di Milano, Italy
Rana Barua, Cryptology, Institute of Advancing Intelligence, India
Montserrat Batet, Universitat Rovira i Virgili, Spain
Francesco Bergadano, Computer Science, University of Torino, Italy
Cătălin Bîrjoveanu, Department of Computer Science, Department of Computer Science, “Al.I.Cuza” University of Iaşi, Iaşi, Romania, Romania
Paul E. Black, National Institute of Standards and Technology, United States
Chiara Bodei, Computer Science, Università di Pisa, Italy
Christos Bouras, Computer Engineering and Informatics Department, University of Patras, Greece
Achim D. Brucker, The University of Exeter, United Kingdom
Francesco Buccafurri, DIIES, University of Reggio Calabria, Italy
Ismail Butun, Department of Computer Science and Engineering; Networks and Systems Division, KTH Royal Institute of Technology, Sweden
Fidel Cacheda, Department of Information and Communication Technologies, University of A Coruña, Spain
Massimo Cafaro, Dipartimento di Ingegneria dell'Innovazione, University of Salento, Italy
Luigi Catuogno, Dipartimento di Informatica, Università degli Studi di Salerno, Italy
Hervé Chabanne, Idemia & Télécom Paris, France
Feng Cheng, Hasso-Plattner-Institute at University of Potsdam, Germany
Estelle Cherrier-Pawlowski, Computer science, GREYC ENSICAEN, France
Hung-Yu Chien, information management, National Chi Nan University, Taiwan, Republic of China
Stelvio Cimato, Department of Computer Science, Università degli Studi di Milano, Italy
Gianpiero Costantino, Istituto di Informatica e Telematica, Consiglio Nazionale delle Ricerche, Italy
Lynne Coventry, Psychology, Northumbria University, United Kingdom
Marco Cremonini, University of Milan, Italy
David Croasdell, Information Systems, University of Nevada, United States
Paolo D'Arco, Dipartimento Di Informatica Ed Applicazioni, University of Salerno, Italy
Hervé Debar, Télécom SudParis, France
Pierpaolo Degano, Informatica, Università di Pisa, Italy
Luca Durante, Consiglio Nazionale Delle Ricerche, Italy
Anna Lisa Ferrara, University of Molise, Italy
Mathias Fischer, IT-Security and Security Management Group, University Hamburg, Germany
Alban Gabillon, Laboratoire GePaSud - Université de la Polynésie Française, French Polynesia
Clemente Galdi, Università di Salerno, Italy
Letterio Galletta, IMT Institute for Advanced Studies Lucca, Italy
Bok-Min Goi, Lee Kong Chian Faculty of Engineering and Science, Universiti Tunku Abdul Rahman, Malaysia
Mark Gondree, Sonoma State University, United States
Giulio Di Gravio, Sapienza University of Rome, Italy
Gilles Guette, University of Rennes, France
Swee-Huay Heng, Multimedia University, Malaysia
Yuxiang Hong, Hangzhou Dianzi University, China
Fu-Hau Hsu, Computer Science and Information Engineering, National Central University, Taiwan, Republic of China
Dieter Hutter, German Research Centre for Artificial Intelligence, Germany
Mariusz Jakubowski, Microsoft Research alum, United States
Guy-Vincent Jourdan, University of Ottawa, Canada
Kallol K. Karmakar, School of Electrical Engineering and Computing, University of Newcastle, Australia
Zbigniew Kotulski, Faculty of Electronics and Information Technology, Warsaw University of Technology, Poland
Kwok-Yan Lam, Nanyang Technological University, Singapore
Gianluca Lax, DIIES, University of Reggio Calabria, Italy
Byoungcheon Lee, Department of Information Security, Joongbu University, Korea, Republic of
Konstantinos Limniotis, Hellenic Data Protection Authority, Greece
Chu-Hsing Lin, Computer Science, Tunghai University, Taiwan, Republic of China
Haibing Lu, Information Systems and Analytics, Santa Clara University, United States
Flamina Luccio, DAIS, Università Ca' Foscari Venezia, Italy
Ilaria Matteucci, Istituto di Informatica e Telematica, CNR, Italy
Weizhi Meng, Computer Science, Technical University of Denmark, Denmark
Francesco Mercaldo, National Research Council of Italy (CNR), Italy
Alessio Merlo, DIBRIS, University of Genoa, Italy
Ali Miri, Computer Science, Toronto Metropolitan University, Canada
Antonino Nocera, DIII, University of Pavia, Italy
Federica Paci, Department of Computer Science, University of Verona, Italy
Yin Pan, Computing Security, Rochester Institute of Technology, United States
Günther Pernul, University of Regensburg, Germany
Hiep C. Pham, RMIT University Vietnam, Vietnam
Stjepan Picek, TU Delft, Netherlands
Pedro Pinto, Instituto Politécnico de Viana do Castelo and INESC TEC, Portugal
Nikolaos Pitropakis, School of Computing, Edinburgh Napier University, United Kingdom
Bo Qin, Independent Researcher, China
Wolfgang Reif, Institute for Software & Systems Engineering, University of Augsburg, Germany
Neil Rowe, Computer Science, Naval Postgraduate School, United States
Antonio Ruiz-Martínez, Departament of Information and Communications Engineering, University of Murcia, Spain
Christoph K. Ruland, Electrical Engineering and Computer Science, University of Siegen, Germany
Nader S. Safa, Wolverhampton Cyber Research Institute, University of Wolverhampton, United Kingdom
Hossein Saiedian, EECS, University of Kansas, United States
Andre Scedrov, University of Pennsylvania, United States
Ali Aydin Selcuk, TOBB University of Economics and Technology, Turkey
Nilanjan Sen, Computer Science, Western Illionis University, United States
Nicolas Sklavos, Computer Engineering and Informatics, University of Patras, Greece
Florian Skopik, Digital Safety and Security, Austrian Institute of Technology, Austria
Daniel Slamanig, AIT Austrian Institute of Technology, Austria
Gautam Srivastava, Computer Science, Brandon University, Canada
Mario Südholt, IMT Atlantique (Nantes campus), France
Cihangir Tezcan, Cyber Security, Middle East Technical University, Turkey
Shambhu J. Upadhyaya, Computer Science and Engineering, University at Buffalo, United States
Adriano Valenzano, CNR-IEIIT, Consiglio Nazionale delle Ricerche, Italy
Rakesh M. Verma, 4800 Calhoun Road, 501 PGH, University of Houston, United States
Yongge Wang, Software And Information Systems, University of North Carolina, United States
Alec F. Yasinsac, Independent Researcher, United States
Nicola Zannone, Department of Mathematics and Computer Science , Eindhoven University of Technology, Netherlands

(list not yet complete)

footer