[Om-announce] CFP - ICISS 2012
Shamik Sural
shamik.sural at gmail.com
Sat May 5 14:12:27 CEST 2012
Hi,
Could you please post the Call for Papers (pasted below) for ICISS
2012 conference on your mailing list?
Thanks in advance.
Best regards,
Shamik.
--
=====================================
Dr. Shamik Sural
Professor
School of Information Technology
Indian Institute of Technology, Kharagpur 721302 India
91-3222-282330 (W)
91-3222-282331 (R)
91-3222-220259 (R)
shamik at cse.iitkgp.ernet.in
shamik.sural at gmail.com
http://www.facweb.iitkgp.ernet.in/~shamik/
=====================================
ICISS 2012 International Conference on Information Systems Security,
Guwahati, India, December 15-19, 2012.
(Submissions due 13 July 2012)
(http://www.iitg.ernet.in/iciss2012/)
The conference series ICISS (International Conference on Information
Systems Security), held annually, provides a forum for disseminating
latest research results in information and systems security. ICISS
2012, the eighth conference in this series, will be held under the aegis
of the newly formed Society for Research in Information Security and
Privacy (SRISP). The acceptance ratio of the first seven conferences
has averaged less than 30%, and the proceedings have been published as
part of the Springer Verlag series of Lecture Notes in Computer Science.
Submissions are encouraged from academia, industry and government
addressing theoretical and practical problems in information and systems
security and related areas.
Research community and academics are invited to submit theoretical and
application oriented full and short papers making a significant research
contribution on Information Systems Security. Papers with original research
and unpublished work are to be submitted.
Topics of interest include (but not limited to)
* Application Security
* Formal Methods in Security
* Operating System Security
* Authentication and Access Control
* Intrusion Detection, Prevention & Response
* Privacy and Anonymity
* Biometric Security
* Intrusion Tolerance and Recovery
* Security in P2P, Sensor and Ad Hoc Networks
* Data Security
* Key Management and Cryptographic Protocols
* Software Security
* Digital Forensics and Diagnostics
* Language-based Security
* Vulnerability Detection and Mitigation
* Digital Rights Management
* Malware Analysis and Mitigation
* Web Security
* Distributed System Security
* Network Security
For more information, please see http://www.iitg.ernet.in/iciss2012/
More information about the Om-announce
mailing list