Latest news
08/09/20: Welcome submitting your work to EISA 2020.
28/08/20: ICICS 2020 has been successfully ended. Thanks for all participants.
26/08/20: ICICS 2020 completed all keynote talks and paper sessions. Thanks for all attendance and speakers.
24/08/20: ICICS 2020 has been started from 8.30am today.
08/08/20: ICICS 2020 is collaborated with IEEE Young Professionals in Denmark.
05/08/20: The registration is free for student, please send a copy of student card to icics2020-1@easychair.org for registration.
05/07/20: We are happy to annource our keynote speakers: Prof. Feng Hao and Prof, Aditya Mathur. More info at here.
23/06/20: The notification letters have been sent out. up to 33 papers out of 139 submissions have been accepted (with an acceptance rate of 23.7%).
08/06/20: We are closely monitoring the ongoing COVID-19 situation, and we have decided to run ICICS 2020 fully online, after evaluating the current situation worldwide.
The conference dates will still remain the same, and the LNCS proceedings will be published as planned.
08/05/20: The submission portal has been closed.
03/05/20: The submission deadline extended to 8 May (Firm!)
19/03/20:
Due to COVID-19, ICICS 2020 has postponed the submission deadline to 3 May 2020. We are monitoring the situation and will take a safe option so authors do not need to worry about a trip for the conference if their paper is accepted.
5/11/19: ICICS 2020 webpage and CFP is online
The manuscripts should be submitted via (EasyChair system).
Collaborated conference:
EISA 2020.
Important Dates:
- Paper submission deadline:
3 May, 2020 8 May 2020 (23:59 AOE - Firm!)
- Notification of acceptance:
22 June 2020 (extended!)
- Camera-ready due:
30 June 2020 13 July 2020
- Conference dates: 24 -27 August 2020
Previous Conferences:
The 2020 International Conference on Information and Communications Security (ICICS 2020) will be the 22nd event in the ICICS conference series.
The proceedings were released as the LNCS series of Springer.
ICICS 2019 |
Beijing, China |
LNCS11999 |
ICICS 2018 |
Lille, France |
LNCS11149 |
ICICS 2017 |
Beijing, China |
LNCS10631 |
ICICS 2016 |
Singapore |
LNCS9977 |
ICICS 2015 |
Beijing, China |
LNCS9543 |
ICICS 2014 |
Hong Kong, China |
LNCS8958 |
ICICS 2013 |
Beijing, China |
LNCS8233 |
ICICS 2012 |
Hong Kong, China |
LNCS7618 |
ICICS 2011 |
Beijing, China |
LNCS7043 |
ICICS 2010 |
Barcelona, Spain |
LNCS6476 |
ICICS 2009 |
Beijing, China |
LNCS5927 |
ICICS 2008 |
Birmingham, UK |
LNCS5308 |
ICICS 2007 |
Zhengzhou, China |
LNCS4861 |
ICICS 2006 |
Raleigh, USA |
LNCS4307 |
ICICS 2005 |
Beijing, China |
LNCS3783 |
ICICS 2004 |
Malaga, Spain |
LNCS3269 |
ICICS 2003 |
Hohhot, China |
LNCS2836 |
ICICS 2002 |
Singapore |
LNCS2513 |
ICICS 2001 |
Xi'an, China |
LNCS2229 |
ICICS 1999 |
Sydney, Australia |
LNCS1726 |
ICICS 1997 |
Beijing, China |
LNCS1334 |
Program Topics:
Original papers offering novel research contributions on all aspects of information and communications security are solicited for submission to ICICS 2020. Areas of interest include, but are not limited to:
Access control |
Social networks security, privacy and trust |
Key management and key recovery |
Software defined networking security |
Anonymity |
Embedded systems security |
Language-based security |
Security management |
Applied cryptography |
Security models, metrics, and policies |
Malware and anti-malware |
Fraud and cyber-crime |
Authentication and authorization |
Security and privacy of Big Data |
Mobile computing security and privacy |
Hardware security |
Biometrics security |
Security of critical Infrastructures |
Network security |
Identity access management |
Blockchain security and privacy |
Trust and reputation systems |
Cloud and edge computing security |
Trusted and trustworthy computing technologies |
Operating systems security |
Usable security and privacy |
Computer and digital forensics |
Insider threat detection |
Cyber-physical systems security |
Underground economy |
Privacy protection |
Intellectual property protection |
Data and system integrity |
Verification of security protocols |
Privacy-preserving data mining |
Intrusion detection |
Database security |
Web security |
Risk assessment |
IoT security and privacy |
Distributed systems security |
Wireless security |
If there is any question, please contact us at:
icics2020-1@easychair.org.