<br>Conference Scope and Topics<br>Track 1: Information Security<br>– Access Control<br>– Anti–Malware<br>– Accounting and Audit<br>– Applied Cryptography<br>– Authentication and Authorization<br>– Biometrics<br>– Block and Stream Ciphers<br>– Cryptanalysis<br>– Cryptographic Protocol<br>– Cloud Computing Security<br>– Database Security<br>– Digital Forensics<br>– Distributed System Security<br>– Electronic Commerce<br>– Embedded Systems Security<br>– Hardware Security<br>– Homomorphic Encryption<br>– ID–Based Cryptography<br>– Intrusion Detection and Prevention<br>– Key Management<br>– Mobile and Wireless Security<br>– Network Security<br>– Operating System Security<br>– Privacy–Enhancing Technology<br>– Public Key Cryptography<br>– Security Architectures<br>– Security Policy<br>– Software Security<br>– Usable Security and Privacy<br>– Web Security<br>Track 2: Information and Computer Science<br>– Artificial Intelligence<br>– Cloud Computing<br>– Communication<br>– Computer Hardware<br>– Computer Vision<br>– Data Mining<br>– Digital Information<br>– E–learning<br>– Graphics and Visualization<br>– Hardware–Software Integration<br>– Human–Computer Interaction & Interactive Multimedia<br>– Image Processing<br>– Internet Technology<br>– Machine Learning<br>– Pattern Recognition<br>– Modeling and Simulation<br>– Multimedia Computing<br>– Networks<br>– Operating Systems<br>– Optimization<br>– Robotics<br>– Simulators<br>– Soft Computing<br>– Software Engineering<br>–Wearable Computing<br>
Abbrevation
ICISS
City
Seoul
Country
North Korea
Deadline Paper
Start Date
End Date
Abstract