ICISS 2024 - The 20th International Conference on Information Systems Security
Date2024-12-16 - 2024-12-19
Deadline2024-07-31
VenueLNMIIT Jaipur, India
Keywords
Websitehttps://iciss.isrdc.in
Topics/Call fo Papers
SYSTEMS SECURITY
OS, VM, containers, cloud
Network: SDN, NFV, SD-WAN
IoT, RFID, SCADA systems
Communication Protocols
IDS, IPS, SIEM, XDR, etc
Honeypot, Botnet, etc
ACCESS CONTROL
Authentication, MFA
Authorization model/policy
PKI & Trust management
Information flow control
APPLICATION SECURITY
Vulnerabilities, DevSecOps
API security, WAF, OWASP
Static/Binary analysis, Zero trust
Malware, Ransomware, APTs
HARDWARE SECURITY
Remote attestation, PUFs
Trojans, Backdoors, FPGA
TEE, TRNG, 2FA, payment wallets
PRIVACY
PETs, anonymization tech
Deidentification attacks
Surveillance & Censorship
Inference, correlation attacks
BLOCKCHAIN
Cryptocurrency, stablecoins
Interoperability, scalability
Smart contracts, concurrency
DIDs, NFTs, CBDCs, AML
SECURITY IN AI/ML
Adversarial learning/inputs
Prompt injection, RLHF strategies
Model stealing, poisoning
EMERGING TECH/STANDARDS
ChatGPT, LaMDA, Dall-E 2, et al
Security-by-design, SBOM
Privacy-by-design, STIX/TAXII
S&P USE CASES
e-voting, e-gov, smart cities
COVID-19 contact tracing
OS, VM, containers, cloud
Network: SDN, NFV, SD-WAN
IoT, RFID, SCADA systems
Communication Protocols
IDS, IPS, SIEM, XDR, etc
Honeypot, Botnet, etc
ACCESS CONTROL
Authentication, MFA
Authorization model/policy
PKI & Trust management
Information flow control
APPLICATION SECURITY
Vulnerabilities, DevSecOps
API security, WAF, OWASP
Static/Binary analysis, Zero trust
Malware, Ransomware, APTs
HARDWARE SECURITY
Remote attestation, PUFs
Trojans, Backdoors, FPGA
TEE, TRNG, 2FA, payment wallets
PRIVACY
PETs, anonymization tech
Deidentification attacks
Surveillance & Censorship
Inference, correlation attacks
BLOCKCHAIN
Cryptocurrency, stablecoins
Interoperability, scalability
Smart contracts, concurrency
DIDs, NFTs, CBDCs, AML
SECURITY IN AI/ML
Adversarial learning/inputs
Prompt injection, RLHF strategies
Model stealing, poisoning
EMERGING TECH/STANDARDS
ChatGPT, LaMDA, Dall-E 2, et al
Security-by-design, SBOM
Privacy-by-design, STIX/TAXII
S&P USE CASES
e-voting, e-gov, smart cities
COVID-19 contact tracing
Other CFPs
Last modified: 2024-07-26 00:09:24