Call for Papers

The 2020 International Conference on Applications and Techniques in Information Security (ATIS 2020) 12-13/11/2020, Brisbane, Australia.

Accepted papers in ATIS 2020 will appear in the proceedings to be published by Springer CCIS Series. ATIS 2020 CCIS Volume will be systematically submitted by Springer to various indexing services, including EI-Compendex, DBLP, Google Scholar, etc.

Top quality papers accepted and presented in ATIS 2020 will be invited to be extended for the possible inclusion of special issues of journals including Information Discovery and Delivery, Intelligent Data Analytics, and Chinese Academy of Science's Journal of Cyber Security (信息安全学报). 

Conference Scope

The 2020 International Conference on Applications and Technologies in Information Security (ATIS 2020), will be the eleventh event in the ATIS series, which started in 2010.

As academic research in information security has developed over the last twenty or so years, applications and techniques are being developed to be of specific use in this area. These include wavelets and their applications in digital forensics, classification algorithms for use in malicious software detection, and genetic algorithms custom-made for the cryptographic community, etc.

ATIS 2020 focuses on all aspects on techniques and applications in information security. The purpose of ATIS is to provide a forum for presentation and discussion of innovative ideas, research results, applications and experience from around the world. The annual ATIS conference highlights new results in the design and analysis of digital security hardware and software implementations. ATIS provides a valuable connection between the theoretical and implementation communities and attracts participants from industry, academia, and government organisations.


Papers are invited in the areas below, but do not exclude research in the general areas of the topic headings.

Attacks against Implementations

  • Side Channel Attacks
  • Digital Forensics
  • Key Recovery
Tools and Methodologies

  • Evaluation of Security
  • Evaluation of Security Tools

  • Robocalling
  • Intrusion Detection
  • Malicious software

Security Implementations

  • Access Control
  • Authentication and Authorization
  • Data and System Integrity
  • Database Security
  • Distributed Systems Security
  • Cryptography
  • Information Hiding and Watermarking
  • Intellectual Property Protection
  • Operating System Security
  • Key Management
Data Privacy

  • Privacy Protection
  • Smart device information leaks
  • Trusted and Trustworthy Computing
  • Privacy Preservation in Data Release

  • Electronic Commerce Security
  • Cloud Security
  • Digital Forensics
  • Smartphone Security
  • Smart Home Resilience
  • Language-based Security
  • Sustainable Practice
  • Numerical Modelling for security engineering
Evaluation, standards and protocols

  • Domain name server security
  • Transport Layer Security
  • Risk Evaluation and Security Certification
  • Security Management
Curbing Cyber Crimes

  • Cyber-Gossip Spread Models
  • Robocalling
  • Identity authentication
  • Datasets for cyber-gossips detection
  • Collusive crime/piracy detection