ICCWS- 2015 - 10th International Conference on Cyber Warfare and Security
View: 825
Website http://academic-conferences.org/iccws/iccws2015/iccws15-home.htm |
Edit Freely
Category Cyber Warfare; Security; academic; military; defense; information warfare; ICIW
Deadline: September 02, 2014 | Date: March 24, 2015-March 25, 2015
Venue/Country: University of Venda and The Council for Scientific, South Africa
Updated: 2014-04-29 17:18:24 (GMT+9)
Call For Papers - CFP
ICCWS 2014 is an opportunity for academics, practitioners and consultants from around the world who are involved in the study, management, development and implementation of systems and concepts to combat information warfare or to improve information systems security to come together and exchange ideas. There are several strong strands of research and interest that are developing in the area including the understanding of threats and risks to information systems, the development of a strong security culture, as well as incident detection and post incident investigation. This conference is continuing to establish itself as a key event for individuals working in the field from around the world.Please consider submitting to this conference. We are interested in the entire range of concepts from theory to practice, including case studies, works-in-progress, and conceptual explorations. Publication opportunityPapers accepted for the conference will be published in the conference proceedings, subject to author registration and payment.Selected papers that have been presented at the Conference will be considered for publication in:A special issue of the Journal of Information Warfare: http://www.jinfowar.comThe International Journal of Cyber Warfare and Terrorism (IJCWT) published by Information Resources Management Association, USA.( DOI: 10.4018/IJCWT, ISSN: 1947-3435, EISSN: 1947-3443).The International Journal of Electronic Security and Digital Forensics published by Inderscience UK (ISSN:1751-1911X).he advisory group for the conference invites submissions of both academic and practitioner papers on a wide range of topics and a wide range of scholarly approaches including theoretical and empirical papers employing qualitative, quantitative and critical methods. Academic research papers, case studies and work-in-progress/posters are welcomed approaches. PhD Research, proposals for roundtable discussions, non-academic contributions and product demonstrations based on the main themes are also invited. .Topics for submissions may include, but are not limited to:Cyberwarfare practice and theoryThe politics of cyberwarfare, including conceptual cyberarms agreementsCyber-exploitation execution and detectionInformation security practiceInformation security managementDual-use technologiesCyber conflict - Neural linguistic techniques in cyberwarfarePatriotic hackers as an extension of state powerPotential military uses of cyber attacksCase studies of cyber attacks in modern conflicts
Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.