Conference

The field of information security is diverse, including technical, managerial, legal, social and even philosophical issues. Individuals alone cannot address these issues. Only the combined efforts of academia and industry can provide answers and solutions that will benefit all of society. Topics to be addressed by the conference include: research papers, case studies, lessons learned, current research, short tutorials and research in progress (student papers).

 

A downloadable Call for Papers can be found here

 

Topics include but are not limited to: 

  • Access control  
  • Applied cryptography    
  • Audit    
  • Big data forensics           
  • Cloud computing security            
  • Cyber-security 
  • Cyber-security & Big Data & Data Science             
  • Data and application security     
  • Digital forensics
  • Human aspects of information security 
  • Identification and authentication             
  • Identity management   
  • Information security awareness and training       
  • Information security governance             
  • Information security risk analysis              
  • Intrusion detection and fraud detection
  • Legal and ethical aspects of information security               
  • Mobile computing security         
  • Network security            
  • Phishing              
  • Privacy 
  • Security and usability     
  • Security of distributed architectures and infrastructures
  • Software security            
  • Standards, guidelines and certification   
  • Trust models and trust management     
  • Trusted computing