Sign for Notice Everyday    Sign Up| Sign In| Link| English|

Our Sponsors


    ICIW 2012 - 7th International Conference on Information Warfare and Security ICIW-2012

    View: 1652

    Website academic-conferences.org/iciw/iciw2012 | Want to Edit it Edit Freely

    Category ICIW 2012

    Deadline: September 12, 2011 | Date: March 22, 2012-March 23, 2012

    Venue/Country: Seattle, U.S.A

    Updated: 2011-07-09 14:09:43 (GMT+9)

    Call For Papers - CFP

    ICIW provides an opportunity for academics, practitioners and consultants from around the world who are involved in the study, management, development and implementation of systems and concepts to combat information warfare or to improve information systems security to come together and exchange ideas. There are several strong strands of research and interest that are developing in the area including the understanding of threats and risks to information systems, the development of a strong security culture, as well as incident detection and post incident investigation. This conference is continuing to establish itself as a key event for individuals working in the field from around the world.

    Publication opportunity

    Papers accepted for the conference will be published in the conference proceedings, subject to author registration and payment.

    Selected papers from the Conference will be considered for publication in a special issue of the Journal of Information Warfare: http://www.jinfowar.com. Additionally, selected papers from the conference will be considered for publication in the International Journal of Electronic Security and Digital Forensics published by Inderscience UK (ISSN:1751-1911X).

    The advisory group for the conference invites submissions of both academic and practitioner papers on a wide range of topics and a wide range of scholarly approaches including theoretical and empirical papers employing qualitative, quantitative and critical methods. Academic research papers, case studies and work-in-progress/posters are welcomed approaches. PhD Research, proposals for roundtable discussions, non-academic contributions and product demonstrations based on the main themes are also invited. You can find full details in the submission types document (.pdf format).

    In addition to the main conference topics, the advisory group invite suggestions for mini tracks. If you would be interested in preparing and chairing a mini track, please contact the Conference Director, Sue Nugus.

    Submission details are given below. Topics for submissions may include, but are not limited to:

    Cyberwarfare practice and theory

    The politics of cyberwarfare, including conceptual cyberarms agreements

    Cyber-exploitation execution and detection

    Information security practice

    Information security management

    Dual-use technologies

    Cyber conflict - Neural linguistic techniques in cyberwarfare

    Patriotic hackers as an extension of state power

    Potential military uses of cyber attacks

    Case studies of cyber attacks in modern conflicts

    Theoretical cyber conflict scenarios

    Cyber conflict frameworks

    Human Factors

    Cyber-terrorism

    Principles of i-Warfare

    Physical security

    Counter-terrorism security policies, procedures and legislation

    Information warfare policy

    SMEs - Small-to-medium Size Enterprises Security model

    Critical national infrastructure protection

    Information warfare theory

    Security implications of “virtualised machines and services

    e-Health systems as part of a national critical infrastructure

    Information warfare techniques

    The Resilience and Susceptibility of "Service Oriented Architectures" (SOAs)

    Information security governance and management

    Information warfare and security education

    Hacking

    Biometrics

    e-Intelligence/counter-intelligence

    Information Assurance

    Cryptography

    Networked Centric War

    Malware

    Wireless Treats

    Reflector attacks

    UCE

    Threat Agents ? Insider threats

    Art of war

    Cyber-fraud

    Particle swarm data mining

    Computers-as-weapons

    Risk Management

    Virtual Intrusion Detection

    Electro-magnetic pulse weapons

    Collaborative decision making

    National security policy

    Information operations

    Security policy

    Acute situational awareness

    Strategic leadership

    Firewalls

    Aircraft Environment

    Influence campaigns

    Phishing and spam

    Digital forensics

    Psychological warfare

    Current Anti Virus Technologies

    Network anomaly detection models

    PSYOP - PSYOPS

    Mobile Virus

    Corporate defence mechanisms

    Perception management

    RFID Virus

    Security for small to medium enterprises

    Infra-structure warfare

    SQL Infections

    Information, computer and network security

    Military Culture Topography

    Data Loss

    Security of the virtual worlds

    Modern conflict

    Data Integration

    SIMAD what can/should be done to protect against this threat?

    Military approaches

    ISO 27001

    Unidirectional linguistic steganography

    Compromise path analysis

    Gaussian empirical rule

    IT auditing and compliance

    Defence steganography

    Natural computing

    Information Security Architecture

    Data and service integration

    Random numbers approximation sequence

    Artificial immune recognition system security infrastructure

    Legal issues concerned with information warfare and e-Crime

    Traffic classification

    Public Key Infrastructure

    Non-traditional enemies

    Subliminal Channel

    Network Address Translator

    Ethical, political and social issues relating to information warfare

    Machine Learning Risk

    Mathematical-filtering

    Association of Religions with Warfare

    Context free grammers

    SecureMDA

    Image-processing

    Participants will be asked to vote for the best poster and a prize will be given for the poster receiving the highest number of votes. Additionally a prize will be awarded to the best PhD paper presented at the conference.

    If you would be interested in preparing and chairing a mini track, please contact the Conference Director, Sue Nugus outlining your suggested topic.

    Submission details

    Abstract details:

    All submission types require an abstract in the first instance. The Abstract should be a minimum of 300 and no more than 500 words including keywords to be received by 12 September 2011 Please read the Abstract Guidelines section of the website before submitting.

    Submission:

    Online via the submission form. Please ensure that you complete all relevant sections of the form, including the conference track the abstract is intended for, the proposed title for the paper, the full names (first name and surname, not initials) and email addresses of all authors and a postal address and telephone number for at least one contact author. Please indicate clearly if the contact author is not the lead author.

    Full paper:

    Only required when the abstract has been selected and not to be more than 5,000 words including abstract, keywords and references (the Harvard referencing rules need to be followed). Submission date will be no later than 20 October 2012. Authors are advised that this is a final date. Earlier submission of the full paper helps us to manage the review process in a timely manner. Papers should be submitted as .doc or .rtf file attachments by email to Charlotte Hall with the paper submission checklist and copyright form.

    Due to the large number of papers expected for this conference, the committee prefers that an author presents only one paper. However, if multiple papers are accepted for publication and presentation, each paper requires a separate registration fee. Author registration and payment must be completed by 16 February 2012 and there are special discounts available for earlybird registration and group bookings, including a special reduced rate for supervisors and students attending together

    Important information

    § The selection panel of the conference committee will consider all abstracts received by the submission deadline to ensure that the proposed paper is relevant to the Conference.

    § The authors of abstracts that describe a relevant paper will receive a notification of abstract selection.

    § All full papers will be double-blind reviewed by members of the conference committee to ensure an adequate standard, that the proposed subject of their abstract has been followed, that the paper is of a suitable length, the standard of English is adequate and the paper is appropriately referenced.

    § For authors whose first language is not English we request that you have your work proof read prior to submission by a native English speaker (or at least a fluent English speaker). Papers can be rejected due to a poor standard of English. We do offer proof-reading services.

    § Papers that are accepted will be published in the conference proceedings providing at least one author registers and presents the work at the Conference (see the registration section of the conference website for more information about registration). Author registration must be completed by 16 February 2012.

    § Due to the large number of papers expected for this conference, the committee only allows an author to present one paper. However, if multiple papers are accepted for publication and presentation, each paper requires a separate registration fee.

    Proceedings for previous ICIW conferences can be purchased from our bookshop by clicking on the Purchase proceedings button.

    Important Dates

    Abstract submission deadline:

    12 September 2011

    Notification of abstract acceptance:

    16 September 2011

    Full paper due for review:

    20 October 2011

    Notification of paper acceptance(with any requested changes):

    29 December 2011

    Earlybird registration closes

    12 January 2012

    Final paper due:

    26 January 2012

    Final author registration date

    16 February 2012


    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.