Call for Papers
International Conference on Applications and Techniques in Information Security (ATIS 2019) 22-24/11/2019, Tamil Nadu, India.
Accepted papers in ATIS 2019 will appear in the proceedings to be published by Springer CCIS Series. ATIS 2019 CCIS Volume will be systematically submitted by Springer to various indexing services, including EI-Compendex, Scopus, SCImago, DBLP, Google Scholar, etc.
Top quality papers accepted and presented in ATIS 2019 will be invited to be extended for the possible inclusion in SCI/SCI-E Journals
Conference Scope
The 2019 International Conference on Applications and Technologies in Information Security (ATIS 2019), will be the tenth event in the ATIS series, which started in 2010.
As academic research in information security has developed over the last twenty or so years, applications and techniques are being developed to be of specific use in this area. These include wavelets and their applications in digital forensics, classification algorithms for use in malicious software detection, and genetic algorithms custom-made for the cryptographic community, etc.
ATIS 2019 focuses on all aspects on techniques and applications in information security. The purpose of ATIS is to provide a forum for presentation and discussion of innovative ideas, research results, applications and experience from around the world. The annual ATIS conference highlights new results in the design and analysis of digital security hardware and software implementations. ATIS provides a valuable connection between the theoretical and implementation communities and attracts participants from industry, academia, and government organisations.
Topics
Papers are invited in the areas below, but do not exclude research in the general areas of the topic headings.
Theme: Advanced Persistent ThreatsTheme Subtopics: Prediction of APTs; Detection of APTs; Economic impact of APTs; Analysis of APTs; Response to APTs, Prevention of APTs.
Submissions on topics in the areas below are also welcome:
- Digital Forensics
- Key Recovery
- Hacking
- Reverse Engineering
- Evaluation of Security
- Evaluation of Security Tools
- Development of Security Tools
- Digital Forensics
- Intrusion Detection
- Machine & Deep Learning for Cyber Security
- Malicious software