ATIS 2019

International Conference on Applications and Techniques in Information Security
SASTRA Deemed University, Tamil Nadu, India

November 22-24, 2019

Call for Papers

International Conference on Applications and Techniques in Information Security (ATIS 2019) 22-24/11/2019, Tamil Nadu, India.

Accepted papers in ATIS 2019 will appear in the proceedings to be published by Springer CCIS Series. ATIS 2019 CCIS Volume will be systematically submitted by Springer to various indexing services, including EI-Compendex, Scopus, SCImago, DBLP, Google Scholar, etc.

Top quality papers accepted and presented in ATIS 2019 will be invited to be extended for the possible inclusion in SCI/SCI-E Journals

Conference Scope

The 2019 International Conference on Applications and Technologies in Information Security (ATIS 2019), will be the tenth event in the ATIS series, which started in 2010.

As academic research in information security has developed over the last twenty or so years, applications and techniques are being developed to be of specific use in this area. These include wavelets and their applications in digital forensics, classification algorithms for use in malicious software detection, and genetic algorithms custom-made for the cryptographic community, etc.

ATIS 2019 focuses on all aspects on techniques and applications in information security. The purpose of ATIS is to provide a forum for presentation and discussion of innovative ideas, research results, applications and experience from around the world. The annual ATIS conference highlights new results in the design and analysis of digital security hardware and software implementations. ATIS provides a valuable connection between the theoretical and implementation communities and attracts participants from industry, academia, and government organisations.


Papers are invited in the areas below, but do not exclude research in the general areas of the topic headings.

Theme: Advanced Persistent Threats
Theme Subtopics: Prediction of APTs; Detection of APTs; Economic impact of APTs; Analysis of APTs; Response to APTs, Prevention of APTs.
Submissions on topics in the areas below are also welcome:
Attacks against Implementations
  • Digital Forensics
  • Key Recovery
  • Hacking
  • Reverse Engineering
Tools and Methodologies
  • Evaluation of Security
  • Evaluation of Security Tools
  • Development of Security Tools
  • Digital Forensics
  • Intrusion Detection
  • Machine & Deep Learning for Cyber Security
  • Malicious software
Topics in other areas dealing with vulnerability prevention are welcome.