The International Research Conference Aims and Objectives
The International Research Conference is a federated organization dedicated to bringing together a significant number of diverse scholarly events for presentation
within the conference program. Events will run over a span of time during the conference depending on the number and length of the presentations.
With its high quality, it provides an exceptional value for students, academics and industry researchers.
ICISSP 2021: 15. International Conference on Information Systems Security and Privacy
aims to bring together leading academic scientists, researchers and research scholars to exchange and share their experiences and research results on all aspects of
Information Systems Security and Privacy.
It also provides a premier interdisciplinary platform for researchers, practitioners and educators to present and discuss the most recent innovations,
trends, and concerns as well as practical challenges encountered and solutions adopted in the fields of Information Systems Security and Privacy
Call for Contributions
Prospective authors are kindly encouraged to contribute to and help shape the conference through submissions of their research abstracts, papers and e-posters.
Also, high quality research contributions describing original and unpublished results of conceptual, constructive, empirical, experimental, or
theoretical work in all areas of Information Systems Security and Privacy are cordially invited for presentation at the conference.
The conference solicits contributions of abstracts, papers and e-posters that address themes and topics of the conference, including figures, tables and references of
novel research materials.
Guidelines for Authors
Please ensure your submission meets the conference's strict guidelines for accepting scholarly papers.
Downloadable versions of the check list for
Full-Text Papers and
Abstract Papers.
Please refer to the
Paper Submission Guideline,
Abstract Submission Guideline and
Author Information
before submitting your paper.
Conference Proceedings
All submitted conference papers will be blind peer reviewed by three competent reviewers.
The peer-reviewed conference proceedings are indexed in the Open Science Index,
Google Scholar,
Semantic Scholar,
Zenedo,
OpenAIRE,
BASE,
WorldCAT,
Sherpa/RoMEO,
and other index databases. Impact Factor Indicators.
Special Journal Issues
ICISSP 2021 has teamed up with the Special Journal Issue on
Information Systems Security and Privacy.
A number of selected high-impact full text papers will also be considered for the special journal issues.
All submitted papers will have the opportunity to be considered for this Special Journal Issue.
The paper selection will be carried out during the peer review process as well as at the conference presentation stage.
Submitted papers must not be under consideration by any other journal or publication.
The final decision for paper selection will be made based on peer review reports by the Guest Editors and the Editor-in-Chief jointly.
Selected full-text papers will be published online free of charge.
Conference Sponsor and Exhibitor Opportunities
The Conference offers the opportunity to become a conference sponsor or exhibitor.
To participate as a sponsor or exhibitor, please download and complete the
Conference Sponsorship Request Form.
Selected Papers
-
Exploring the Need to Study the Efficacy of VR Training Compared to Traditional Cybersecurity Training
Shaila Rana, Wasim Alhamdani
-
The Effects of Cross-Border Use of Drones in Nigerian National Security
H. P. Kerry
-
A Review in Recent Development of Network Threats and Security Measures
Roza Dastres, Mohsen Soori
-
Trusting Smart Speakers: Analysing the Different Levels of Trust between Technologies
Alec Wells, Aminu Bello Usman, Justin McKeown
-
Model of Optimal Centroids Approach for Multivariate Data Classification
Pham Van Nha, Le Cam Binh
-
Predicting the Success of Bank Telemarketing Using Artificial Neural Network
Mokrane Selma
-
A Socio-Technical Approach to Cyber-Risk Assessment
Kitty Kioskli, Nineta Polemi
-
Malicious Vehicle Detection Using Monitoring Algorithm in Vehicular Adhoc Networks
S. Padmapriya
-
Keyloggers Prevention with Time-Sensitive Obfuscation
Chien-Wei Hung, Fu-Hau Hsu, Chuan-Sheng Wang, Chia-Hao Lee
-
Computational Approaches for Ballistic Impact Response of Stainless Steel 304
A. Mostafa
-
Artificial Intelligence-Based Chest X-Ray Test of COVID-19 Patients
Dhurgham Al-Karawi, Nisreen Polus, Shakir Al-Zaidi, Sabah Jassim
-
Data Integrity: Challenges in Health Information Systems in South Africa
T. Thulare, M. Herselman, A. Botha
-
Influence of Security on Fan Attendance during Nigeria Professional Football League Matches
B. O. Diyaolu
-
Authentication of Physical Objects with Dot-Based 2D Code
Michał Glet, Kamil Kaczyński
-
AI Tutor: A Computer Science Domain Knowledge Graph-Based QA System on JADE platform
Yingqi Cui, Changran Huang, Raymond Lee
Digital Program consists of the e-proceedings book which is available online-only
and includes the conference communications (proceedings abstracts and papers).
Registered participants can access the digitally available conference
proceedings ( and certificates ) by visiting their profile pages.
DATA AND SOFTWARE SECURITY
Security Frameworks, Architectures and Protocols
Cryptographic Algorithms
Artificial Intelligence and Security
Information Hiding and Anonymity
Vulnerability Analysis and Countermeasures
Data Integrity
Database Security
Content Protection and Digital Rights Management
Data Mining
Software Security Assurance
Security Architecture and Design Analysis
Security Testing
Middleware Security
Data Fraud and Data Fabrication
TRUST
Computational Models of Trust
Risk and Reputation Management
Phishing
Security and Trust in Pervasive Information Systems
E-Commerce and Contract Management Tools
Trusted Platforms
P2P Transactions and Scenarios
Common Practice, Legal and Regulatory Issues
Trust in Social Networks
Identity and Trust Management
Intrusion Detection
Smartcard Technology
Trustworthy Embedded Devices
Electronic Payment Fraud
PRIVACY AND CONFIDENTIALITY
Privacy-Enhancing Models and Technologies
Network Deployment and Management
Web Applications and Services
Privacy In Cloud and Pervasive Computing
Authentication, Privacy and Security Models
Privacy Compliance in Organizations
Social Media Privacy
User Profiling in E-Commerce Systems
E-Voting and Privacy
Privacy Metrics and Control
Malware Detection
Electronic Abuse Protection
Ethics
MOBILE SYSTEMS SECURITY
Location-based Services
GPS-based security
Mobile Sensing and Sensor Networks
Bluetooth and RFID Security
Privacy in Wireless Communications
Mobile Applications Control
Privacy-Preserving Protocols
Vehicular Systems and Networks
Secure Routing
Software Vulnerabilities
Access Control
Threat Awareness
Abstracts/Full-Text Paper Submission Deadline |
|
April 15, 2021 |
Notification of Acceptance/Rejection |
|
April 30, 2021 |
Final Paper (Camera Ready) Submission & Early Bird Registration Deadline |
|
May 06, 2021 |
Conference Dates |
|
June 07-08, 2021 |
Matteo Calabrese |
Accenture SpA, IT |
Antonio Capodieci |
University of Salento, IT |
Riccardo Martoglia |
University of Modena and Reggio Emilia, IT |
Francesco Flammini |
Ansaldo STS, IT |
Filippo Neri |
University of Naples, IT |
Yashar Mehdad |
University of Trento, FBK - Irst, IT |
Giuseppina Gini |
Politecnico di Milano, IT |
Ignazio Infantino |
Consiglio Nazionale delle Ricerche - CNR, IT |
Ezendu Ariwa |
University of Bedfordshire, UK |
Ali Al-Sherbaz |
The University of Northampton, UK |
Elhadj Benkhelifa |
Staffordshire University, UK |
C. Suheyl Ozveren |
University of Abertay Dundee, UK |
Vishal Barot |
Loughborough University, UK |
Mohammed Rezaul Karim |
Guildhall College, UK |
Zaigham Mahmood |
University of Derby, UK |
Djamila Ouelhadj |
University of Nottingham, UK |
Catherine Fang |
Carnegie Mellon University, US |
Elaine Crable |
Xavier University, US |
Ceci Morales |
Carnegie Mellon University, US |
Poonam Dharam |
Saginaw Valley State University, US |
Rajasekhar Chaganti |
University of Texas at San Antonio, US |
Sue Feldman |
University of Alabama, US |
Douglas Kelly |
Johns Hopkins University Applied Physics Laboratory, US |
Vahid Heydari |
Rowan University, US |
Akilesh Rajavenkatanarayanan |
The University of Texas at Arlington, US |
Lekshmy Sankar |
University of Denver, US |
Dennis Jjuuko |
University of Massachusetts Boston, US |
Pat Nelson |
Minnesota State University Mankato, US |
Jessy Abouarab |
Florida International University, US |
Faezehossadat Khademi |
Illinois Institute of Technology, US |
Participation Type |
Early Registration Ticket Fees |
Registration Ticket Fees |
Non-Student Oral/Poster Presenter Registration |
€ 450 |
€ 500 |
Student Oral/Poster Presenter Registration |
€ 350 |
€ 400 |
Listener Registration |
€ 250 |
€ 300 |
Additional Paper Publication |
€ 100 |
All conference materials and services will be delivered digitally to the participant with the online conference management system.
Conference registration includes the following digital materials and services:
- e-certificates [for Authors: Certificate of Attendance and Presentation; for Listeners: Certificate of Attendance; for Chairs: Certificate of Attendance and Appreciation; for Presenters: Certificate of Best Presentation (if conferred based appraisal)]
- e-program
- e-book
- e-name badge
- e-receipt
- e-presentation
Presentation Types:
-
Physical presentation is an oral conferencing presentation that is made using digital technology including embedded digital elements ( texts, tables, graphs, or videos ) for PowerPoint sharing.
-
Digital presentation is a digital conferencing presentation that is made using digital technology including embedded digital elements ( texts, tables, graphs, or videos ) for PowerPoint sharing.
Early Bird Registration
Early Bird registration is valid until 2021-05-06 23:59:59
Online Credit Card Processing
Online payment option available for author
and listener delegates.
Conference participants can make online credit card payments for conference registration fees.