注册已开启

查看我的门票

已截止
活动简介

####  WISA 2024 Call for Papers  ####
  The 25th World Conference on Information Security Applications
  August 21 -- August 23, 2023
  Maison Glad Hotel, Jeju Island, South Korea 
  Web page: https://wisa.or.kr
  E-mail contact: kiisc[at]kiisc.or.kr

** Important Dates **
    Paper submission deadline:        June 15th, 2024 (GMT+9)
    Paper acceptance notification:    July 20th, 2024 (GMT+9)
    Poster submission deadline:       July 27th, 2024 (GMT+9)
    Poster acceptance notification:   August 3rd, 2024 (GMT+9)
    Pre-proceeding file submission deadline: August 9th, 2024 (GMT+9)
    WISA2024 conference:      August 21st -- August 23rd, 2024

** Committees **
GeneralCo-Chairs: Jaecheol Ha (HoseoUniversity), Seung Chan Bang (Electronics and Telecommunications Research Institute)
Program Committee Co-Chairs: Jong-Hyouk Lee (Sejong University), Sokjoon Lee (Gachon University), Keita Emura (KanazawaUniversity) 
OrganizingCommitteeCo-Chairs: ManheeLee(HannamUniversity), YousungKang (Electronics and Telecommunications Research Institute)

OVERVIEW
WISA is the premier security research venue co-hosted by the Korea Institute of Information Security and Cryptology (KIISC) and the Electronics & Telecommunications Research Institute (ETRI) and co-sponsored by the Ministry of Science and ICT (MSIT), the Korea Internet & Security Agency (KISA), and the National Security Research Institute (NSR). This year, WISA will be exploring the innovative possibilities of various technologies in enhancing (and threatening) cyber security: artificial intelligence (AI) and blockchain-driven security, hardware cryptography, and all other technical and practical aspects of security applications. We invite participants from a diverse group of researchers and practitioners who are passionate about advancing the state of the art, as well as addressing fundamental security challenges. Join us at WISA 2024 and be part of the conversion that shapes the future of information security.

The areas of interest include, but are not limited to the following:

• Analysis of network and security protocols
• Anonymity and censorship-resistant technologies
• Applications of cryptographic techniques
• Authentication and authorization
• Automated tools for source code/binary analysis
• Automobile security
• AI security
• Botnet defense
• Blockchain security
• Critical infrastructure security
• Denial-of-service attacks and countermeasures
• Digital Forensics
• Embedded systems security
• Exploit techniques and automation
• Hardware and physical security
• HCI security and privacy
• Intrusion detection and prevention
• Malware analysis
• Mobile/wireless/cellular system security
• Network-based attacks
• Network infrastructure security
• Operating system security
• Practical cryptanalysis (hardware, DRM, etc.)
• Security policy
• Side channel attacks and countermeasures
• Storage and file systems security
• Techniques for developing secure systems
• Trustworthy computing
• Trusted execution environments
• Unmanned System Security for Vehicle/Drone/Ship Systems
• Vulnerability research
• Web security

INSTRUCTIONS FOR AUTHORS
Authors are invited to submit original papers: they must not substantially duplicate work that any of the authors have published elsewhere or have submitted in parallel to journals or any other conferences that have proceedings. The submission must be anonymous, with no author names, affiliations, acknowledgements, or obvious references. The paper should be limited to at most 12 pages in total and prepared according to the "Authors Instruction for LNCS" (http://www.springer.de/comp/lncs/authors.html).
The submission of contributions to WISA 2024 must occur through the following submission system: https://easychair.org/conferences/?conf=wisa2024

SCIE JOURNAL RECOMMENDATION OF SELECTED PAPERS
Expanded versions of more than half of accepted papers will be invited to the SCIE or Scopus indexed journals. Later, WISA 2024 special issues and fast tracks will be announced at the conference website.

组委会

General Co-Chairs

Jaecheol Ha (Hoseo University, Korea)

Seung Chan Bang (ETRI, Korea)

 

Advisory Committee

Dong-Hoon Lee (Korea University, Korea)

Heekuck Oh (Hanyang University, Korea)

Jaecheol Ryou (Chungnam National University, Korea)

Kyung-Hyune Rhee (Pukyong National University, Korea)

Okyeon Yi (Kookmin University, Korea)

Souhwan Jung (Soongsil University, Korea)

Yoojae Won (Chungnam National University, Korea)

 

Steering Committee

Dooho Choi (Korea University, Korea)

Ho-Won Kim (Pusan National Universiy, Korea)

Ilsun You (Kookmin University, Korea)

Jeong-Nyeo Kim (ETRI, Korea)

Jin Kwak (Ajou University, Korea)

 

Program Committee Co-Chairs

Jong-Hyouk Lee (Sejong University, Korea)

Keita Emura (Kanazawa University, Japan)

Sokjoon Lee (Gachon University, Korea)

 

Program Committee

Byoungyoung Lee (Seoul National University, Korea)

Cheng-Chi Lee (Fu Jen Catholic University, Taiwan)

Chun-Wei Tsai (National Sun Yat-sen University, Taiwan)

Daiki Miyahara (The University of Electro-Communications, Japan)

Hikaru Tsuchida (Saitama Institute of Technology, Japan)

Hiroaki Kikuchi (Meiji University, Japan)

Hyoungshick Kim (Sungkyunkwan University, Korea)

Hyung Chan Kim (National Security Research Institute, Korea)

Ijaz Ahmad (VTT - Technical Research Centre of Finland, Finland)

Il-Gu Lee (Sungshin Women's University, Korea)

JaeSeung Song (Sejong University, Korea)

Ji Sun Shin (Sejong University, Korea)

Jong Hwan Park (Sangmyung University, Korea)

Jongsung Kim (Kookmin University, Korea)

Joobeom Yun (Sejong University, Korea)

Jun Lee (Korea Institute of Science and Technology Information, Korea)

Kaisei Kajita (Japan Broadcasting Corporation, Japan)

Kamal Singh (University St-Etienne, France)

Ki-Woong Park (Sejong University, Korea)

Kouichi Sakurai (Kyushu University, Japan)

Kwangsu Lee (Sejong University, Korea)

Kyosuke Yamashita (Osaka University, Japan)

Madhusanka Liyanage (University College Dublin, Ireland)

Manabu Tsukada (University of Tokyo, Japan)

Masayuki Fukumitsu (University of Nagasaki, Japan)

Mika Ylianttila (University of Oulu, Finland)

Mun-Kyu Lee (Inha University, Korea)

Naveen Chilamkurti (La Trobe University, Australia)

Neeraj Kumar (Thapar Institute of Engineering and Technology, India)

Nobuyuki Sugio (Hokkaido University of Science, Japan)

Pawani Porambage (VTT - Technical Research Centre of Finland, Finland)

Pham Van Huy (Ton Duc Thang University, Vietnam)

SeogChung Seo (Kookmin University, Korea)

Shingo Sato (Yokohama National University, Japan)

Taisei Takahashi (Tsukuba University, Japan)

Tetsushi Ohki (Shizuoka University, Japan)

Young-Gab Kim (Sejong University, Korea)

Yuseok Jeon (Ulsan National Institute of Science and Technology, Korea)

 

Organizing Committee Co-Chairs

Manhee Lee (Hannam University, Korea)

Yousung Kang (ETRI, Korea)

 

Organizing Committee

Changhoon Kim (Daegu University, Korea)

Daesun Choi (Soongsil University, Korea)

Dongho Kang (ETRI, Korea)

Eunjoong Kim (Igloo Security, Korea)

Haehyun Cho (Soongsil University, Korea)

Jaedeok Lim (ETRI, Korea)

Jinyoung Oh (KISA, Korea)

Jonghee Youn (Yeungnam University, Korea)

Jungtaek Seo (Gachon University, Korea)

Junghee Kim (KISA, Korea)

Junghoon Lee (Somansa, Korea)

Jungseok Song (KISTI, Korea)

Jungsoo Park (Kangnam University, Korea)

Myoungho Kim (Coontec, Korea)

Wonho Kim (NSR, Korea)

Wonhyouk Lee (KISTI, Korea)

Woonyeon Kim (NSR, Korea)

Youngcheol Cho (Piolink, Korea)

征稿信息

重要日期

2024-06-15
初稿截稿日期
2024-07-20
初稿录用日期
2024-07-27
终稿截稿日期

The areas of interest include, but are not limited to the following:

• Analysis of network and security protocols
• Anonymity and censorship-resistant technologies
• Applications of cryptographic techniques
• Authentication and authorization
• Automated tools for source code/binary analysis
• Automobile security
• AI security
• Botnet defense
• Blockchain security
• Critical infrastructure security
• Denial-of-service attacks and countermeasures
• Digital Forensics
• Embedded systems security
• Exploit techniques and automation
• Hardware and physical security
• HCI security and privacy
• Intrusion detection and prevention
• Malware analysis
• Mobile/wireless/cellular system security
• Network-based attacks
• Network infrastructure security
• Operating system security
• Practical cryptanalysis (hardware, DRM, etc.)
• Security policy
• Side channel attacks and countermeasures
• Storage and file systems security
• Techniques for developing secure systems
• Trustworthy computing
• Trusted execution environments
• Unmanned System Security for Vehicle/Drone/Ship Systems
• Vulnerability research
• Web security
 

留言
验证码 看不清楚,更换一张
全部留言
重要日期
  • 会议日期

    08月21日

    2024

    08月23日

    2024

  • 06月15日 2024

    初稿截稿日期

  • 07月20日 2024

    初稿录用通知日期

  • 07月27日 2024

    终稿截稿日期

主办单位
Ministry of Science and ICT (MSIT)
Korea Internet & Security Agency (KISA)
National Security Research Institute (NSR)
承办单位
Korea Institute of Information Security and Cryptology (KIISC)
Electronics & Telecommunications Research Institute (ETRI)
联系方式
移动端
在手机上打开
小程序
打开微信小程序
客服
扫码或点此咨询