Welcome to ATIS2014
26-28/11/2014, Melbourne, Australia

International Conference on Applications and Techniques in Information Security

Conference Photos


Invited Speakers

Important Dates

  • Paper Submission Due24/08/2014 extended to 01/09/2014 (11:59pm, Pacific Time)
  • ATIS-Cup Competition Due: 30/09/2014
  • Author Notification Due: 16/09/2014
  • Camera Ready Due: 18/09/2014 (11:59pm Pacific Time)
  • ATIS-2014 Registration Open: 08/10/2014 - 20/11/2014

Conference Scope

The 2014 International Conference on Applications and Technologies in Information Security (ATIS), will be the fifth event in the ATIS series, which started in 2010.

As academic research in information security has developed over the last twenty or so years, applications and techniques are being developed to be of specific use in this area. These include wavelets and their applications in digital forensics, classification algorithms for use in malicious software detection, and genetic algorithms custom-made for the cryptographic community, etc.

ATIS 2014 focuses on all aspects on techniques and applications in information security research. The purpose of ATIS is to provide a forum for presentation and discussion of innovative ideas, research results, applications and experience from around the world as well as highlight activities in the related areas. The annual ATIS conference highlights new results in the design and analysis of digital security hardware and software implementations. ATIS provides a valuable connection between the theoretical and implementation communities and attracts participants from industry, academia, and government organizations. 

As well as a single track of high-quality presentations, ATIS 2014 will offer invited talks, hands-on training in a computer lab, digital competitions and a special school for PhD and Master students. 

CTC 2014 Conference

ATIS 2014 conference will be held just one week after the Cybercrime and Trustworthy Computing Conference (CTC 2014), held in Massey University, 20-21 November 2014. 

International visitors may wish to plan to visit both conferences, as they both contain a great scope in cybercrime and information security, with strong views to applications in the field.

    Further Information

    For all inquiries, please contact the Conference Secretary, Ms Judy Chow:
    • Telephone: +613 925 17477
    • Email:  judy.chow@deakin.edu.au  or jchow@deakin.edu.au