Dear users, the OCS will cease operation by the end of the year 2022. PC chairs of unfinished conferences should contact ocs_support@springer.com for further guidance.


Welcome to the conference service of CRISIS2020

Info Icon

This is the main page of the conference. You are presented with a quick overview of the conference facts, as well as the current phases, if logged in. Furthermore you have direct access to actions relevant to the conference.

Your current actions

View papers View papers

With this action an overview of the currently submitted papers is presented to you. Furthermore you can see phase specific information and your possible paper-related actions.

Contact PC Chair Contact PC Chair

With this action you can contact the PC Chair via the internal message system.

Open the overview of your actions in a new page.


Furthermore you can consult the Howtos.


Name:15th International Conference on Risks and Security of Internet and Systems (CRISIS 2020)
Description:The topics addressed by CRiSIS range from the analysis of risks, attacks to networks and system survivability, security models, security mechanisms, and privacy-enhancing technologies. The authors are invited to submit research results as well as practical experiments or deployment reports. Industrial papers about applications or case studies are also welcomed in different domains (e.g., industrial control systems, digital manufacturing, intelligent transportation systems, connected vehicles, critical infrastructures, telemedicine, banking, e-government, e-learning, e-commerce, mobile networks, embedded applications, etc.). The list of topics includes but is not limited to: * AI and machine learning-based security approaches * Analysis and management of risk * Attacks and defenses * Attack data acquisition and network monitoring * Authorization, Authentication and Identity Management * Cryptography, biometrics, watermarking * Dependability and fault tolerance of Internet applications * Distributed systems security and safety * Embedded system security and safety * Empirical methods for security and risk evaluation * Hardware-based security and physical security * Intrusion detection and prevention systems * Organizational, ethical and legal issues * Privacy protection and anonymization * Risk-aware access and usage control * Security and risk assessment * Security and risks metrics * Security and dependability of operating systems * Security and safety of critical infrastructures * Security and privacy of the peer-to-peer system * Security and privacy of wireless networks * Security in Cloud/Edge/Fog computing * Security models and security policies * Security of big data * Security of industrial control systems * Security of intelligent transportation systems * Security of e-commerce, electronic voting and database systems * Security of new generation networks * Security of smart cities * Security of smart grid * Security of social networks * Security of the IoT and IIoT * Security of VoIP and multimedia * Smartphone security and privacy * Traceability, metrology, and forensics * Trust management * Ubiquitous computing security * Use of smart cards and personal devices for Internet applications * Virtualization security * Web and Web-service security
PC Chairs:Joaquin Garcia-Alfaro
Conference flow: Abstract Submission: July 31, 2020 23:59 CEST,
Paper Upload: July 31, 2020 23:59 CEST,
Assignment of Reviewers: August 1, 2020 23:59 CEST,
Review: September 1, 2020 23:59 CEST,
Decision: September 14, 2020 23:59 CEST,
Final: November 30, 2020 23:59 CET

  • View papers
    arrow

    View papers

  • Contact PC Chair
    arrow

    Contact PC Chair