Call for papers
Authors are invited to submit original papers not previously published nor submitted in parallel for publication to any other conference, workshop or journal. All submitted papers must be anonymous, with no author names, affiliations, acknowledgements, or obvious references, for double blind reviews.
Submissions are to be made to the submission web site on the EasyChair platform. Only pdf files will be accepted. Submissions should follow the LNCS style. Authors should consult Springer’s Instructions for Authors of Proceedings and use either the LaTeX or the Word templates provided on the authors’ page for the preparation of their papers. Springer’s proceedings LaTeX templates are also available in Overleaf. Springer
encourages authors to include their ORCIDs in their papers. Submitted papers may risk being rejected directly without consideration of their merits if they do not follow all the above submission instructions.
The page limits for the camera-ready papers are 20 pages, including the bibliography and well-marked appendices. Selected accepted papers will be invited to submit extended versions to a special issue of the International Journal of Information Security
Important Dates
This year’s edition of the conference will have two review cycles. All submissions must be received by 11:59p.m. anywhere-on-earth time on the day of the corresponding deadline.
First cycle | Second cycle | |
Full paper submission: | 16 February 2024 | 03 May 2024 |
Notification to authors: | 08 April 2024 | 24 June 2024 |
Camera ready due: | 09 August 2024 | 09 August 2024 |
Accepted papers will be included in the conference’s proceedings. The Proceedings will be published by Springer in its Lecture Notes in Computer Science (LNCS) series, as post-proceedings. Pre-proceedings will be made available shortly before and during the event. Please note that at least one author of each accepted paper must register to the conference and give a presentation at the conference. Failure to register or absence from the presentation will eventually make your paper NOT being included in the conference proceedings.
Awards
The TPC and the Steering Committee will select one paper to receive a Best Paper Award, and another paper whose first co-author is a student to receive a Best Student Paper Award. Recipients of both awards will receive a certificate from the Conference. Springer will sponsor the best paper and best student paper awards with cash prize.
How to Submit
Submissions and reviews will be organized on the EasyChair platform and the link for submission is https://easychair.org/conferences/?conf=icics2024.
Topics of Interest
Topics of Interest include but are not limited to:
• Access control and authorization | •Anonymity |
• AI-based security and privacy | • Applied cryptography |
• Threat scenarios, attack models and security analysis | • Intrusion detection and prevention |
• Attestation | • Malware and unwanted software |
• Biometrics security and privacy | • Misinformation, disinformation, and fake news |
• Blockchain and cryptocurrencies | • Mobile security and privacy |
• Cloud computing and virtualization security | • Online safety and child protection |
• Cybercrime | • Online social media security, privacy, and trust |
• Cyber deception and fraud | • Operating systems security |
• Cyber incident response and recovery | • Network security |
• Critical infrastructure protection | • Privacy enhancing technologies and mechanisms |
• Cyber physical systems security | • Risk management |
• Cyber resilience | • Security of communication protocols |
• Cyber security education, training, and awareness | • Secure information flow |
• Cyber threat intelligence | • Security management |
• Data security and privacy | • Security and privacy for the (Industrial) Internet of Things |
• Digital forensics | • Security and privacy of AI (e.g., adversarial machine learning and federated learning) |
• Digital rights management | • Security and privacy metrics and policies |
• Digital watermarking | • Security operations and incident management |
• Distributed systems security | • Security visualization |
• Economics of security and privacy | • Secure systems design and architectures |
• Edge and fog computing security | • Side channel attacks |
• Embedded systems security | • Software and application security |
• Emergency response and recovery | • Steganography and steganalysis |
• Formal methods for security | • Trusted computing |
• Hardware security | • Trust management and reputation |
• Identity management | • Usable security and privacy |
• Information security management | • Vulnerability detection and prevention |
• Internet censorship and defense | • Web security and privacy |