Sign for Notice Everyday    Sign Up| Sign In| Link| English|

Our Sponsors

    Receive Latest News

    Feedburner
    Share Us


    INFOSEC 2017 - The Third International Conference on Information Security and Cyber Forensics

    View: 943

    Website http://sdiwc.net/conferences/3rd-international-conference-information-security-cyber-forensics/ | Want to Edit it Edit Freely

    Category computer;information security;cyber forensics;cyber security

    Deadline: May 28, 2017 | Date: June 29, 2017-July 01, 2017

    Venue/Country: Faculty of Management, Comenius University, Bratis, Slovakia

    Updated: 2016-05-29 08:13:58 (GMT+9)

    Call For Papers - CFP

    The Third International Conference on Information Security and Cyber Forensics (INFOSEC2017)

    You are invited to participate in The Third International Conference on Information Security and Cyber Forensics (INFOSEC2017) that will be held in Slovakia on June 29-July 1, 2017. The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures.

    Website: http://sdiwc.net/conferences/3rd-international-conference-information-security-cyber-forensics/

    Venue: Faculty of Management, Comenius University in Bratislava, Slovakia

    Date: June 29-July 1, 2017

    Contact email: infosec17atsdiwc.net

    Submission Deadline Open from now until May 01, 2017

    Notification of Acceptance May 20, 2017 or 4-7 weeks from the submission date

    Camera Ready Submission Open from now until May 28, 2017

    Registration Deadline Open from now until May 28, 2017

    Conference Dates June 29-July 1, 2017

    All registered papers will be published in SDIWC Digital Library, and in the proceedings of the conference.

    The conference welcomes papers on the following (but not limited to) research topics:

    *Cyber Security:

    *Distributed and Pervasive Systems Security

    *Enterprise Systems Security

    *Formal Methods Application in Security

    *Hardware-Based security

    *Incident Handling and Penetration Testing

    *Legal Issues Multimedia and Document Security

    *Operating Systems and Database Security Privacy Issues

    *SCADA and Embedded systems security

    *Secure Software Development, Architecture and Outsourcing

    *Security for Future Networks

    *Security in Cloud Computing

    *Security in Social Networks

    *Security of Web-based Applications and Services

    *Security protocols

    *VOIP, Wireless and Telecommunications Network Security

    Digital Forensic:

    *Anti-Forensics and Anti-Forensics Techniques

    *Cyber-Crimes

    *Data leakage, Data protection and Database forensics

    *Evidentiary Aspects of Digital Forensics

    *Executable Content and Content Filtering

    *File System and Memory Analysis Multimedia Forensic

    *Forensics of Virtual and Cloud Environments

    *Information Hiding Investigation of Insider Attacks

    *Large-Scale Investigations Malware Forensics and Anti-Malware techniques

    *Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics

    *New threats and Non-Traditional Approaches

    *Information Assurance and Security Management:

    *Business Continuity & Disaster Recovery Planning Corporate Governance

    *Critical Infrastructure Protection Decidability and Complexity

    *Digital Rights Management and Intellectual Property Protection

    *Economics of Security Fraud Management

    *Identity Management Laws and Regulations

    *Security Policies and Trust Management

    *Threats, Vulnerabilities, and Risk Management

    *Cyber Peacefare and Physical Security:

    *Authentication and Access Control Systems

    *Biometrics Applications

    *Biometrics standards and standardization

    *Cyber Peacefare Trends and Approaches

    *Electronic Passports, National ID and Smart Card Security

    *New theories and algorithms in biometrics

    *Social Engineering

    *Surveillance Systems

    *Template Protection and Liveliness Detection

    In addition, BEST registered papers will be published in one of the following special issues provided that the author do major improvements and extension

    within the time frame that will be set by the conference and his/her paper is approved by the chief editor:

    * International Journal of New Computer Architectures and their Applications (IJNCAA)

    * International Journal of Digital Information and Wireless Communications (IJDIWC)

    * International Journal of Cyber-Security and Digital Forensics (IJCSDF)


    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.