posted by user: jaidhar || 8686 views || tracked by 11 users: [display]

ISSA 2013 : 12th International Information Security for South Africa Conference

FacebookTwitterLinkedInGoogle


Conference Series : Information Security for South Africa
 
Link: http://www.infosecsa.co.za
 
When Aug 14, 2013 - Aug 16, 2013
Where Johannesburg, South Africa
Abstract Registration Due Apr 7, 2013
Submission Deadline Apr 21, 2013
Notification Due Jul 1, 2013
Final Version Due Jul 9, 2013
Categories    information security   digital forensics   trust management   network security
 

Call For Papers

ISSA 2013 is co-sponsored by the IEEE Systems, Man and Cybernetics Society (SMCS) Chapter, a chapter of the IEEE South Africa Section.
All accepted papers will be published in IEEE Xplore.

The objectives of the 12th ISSA 2013 conference is to bring together national and international researchers and practitioners in Information Security to provide a platform to present latest developments. We solicit previously unpublished papers offering novel research contributions in all aspects of information security. The conference will also include invited presentations by experts from academia and industry, a tutorial session, workshops and special sessions.

Topics include, but are not limited to:
Access Control, Architectures and infrastructures, Audit, Authentication, Anti-Virus, Awareness and training in Security, Backup, Storage, Recovery, Biometrics, Business Continuity Planning and Management, Challenges and solutions of managing security, Communications / network security, Content Security, Corporate governance / Enterprise security, Digital forensics, Digital Identification and Authentication, Economy and philosophy of information security, Evaluation of Information Security in companies and information security surveys, Future visions for Information Security Management, Hacking / cracking, Information right management, Information security project management, Legal, ethical and social issues related to Information Security, Managing Information Security, Mobile Computing Security, Mobile phone security, Phishing, Practical industry presentations on managing information security, Privacy, Information Security Risk Analysis, Security Policy and Procedures, Small distribution applications, Smart Cards, Standards - Local & International, Strategic Information Security, Trust, Usability issues in information security, Vulnerability Assessments

IMPORTANT DATES
---------------------------
Abstracts: 7 April 2013 (1 page)
Full papers: 21 April 2013
Conference: 14-16 August 2013


SUBMISSION DETAILS
--------------------------
Authors are invited to submit original papers not previously published nor submitted in parallel for publication to any other conference, workshop or journal.

Please visit http://www.infosecsa.co.za for more details on the topics, guidelines and other information.


ORGANISING COMMITTEE
Hein Venter (hventer@cs.up.ac.za) Department of Computer Science, University of Pretoria
Marijke Coetzee (marijkec@uj.ac.za) Academy of Computer Science and Software Engineering, University of Johannesburg
Marianne Loock (loockm@unisa.ac.za) School of Computing, University of South Africa

Related Resources

RAID 2026   The 29th International Symposium on Research in Attacks, Intrusions, and Defenses (RAID 2026)
ISPPAI 2026   2026 International Conference on Information Security, Privacy Protection and Artificial Intelligence-EI/Scopus
SESBC 2026   7th International Conference on Software Engineering, Security and Blockchain
EDUR 2026   4th International Conference on Educational Research
NeurIPS 2026   The Fortieth Annual Conference on Neural Information Processing Systems
CTADS 2026   2026 2nd International Conference on Communication Technology and Data Security-EI/Scopus
IJMA 2026   International Journal of Multimedia & Its Applications -- ERA Indexed, H index - 24
CIOS 2026   4th International Conference on Cloud, IoT and Security
AI & FL 2026   14th International Conference of Artificial Intelligence and Fuzzy Logic
IJCIS 2026   International Journal on Cryptography and Information Security