CYBERSEC 2015 - The Fourth International Conference on Cyber Security, Cyber Welfare, and Digital Forensic (CyberSec2015)
View: 1022
Website http://sdiwc.net/conferences/cybersec2015/ |
Edit Freely
Category Cyber Security; Digital Forensic; Information Assurance and Security Management;, Cyber Peacefare and Physical Security
Deadline: September 29, 2015 | Date: October 29, 2015-October 31, 2015
Venue/Country: Jakarta, Indonesia
Updated: 2015-02-20 03:42:07 (GMT+9)
Call For Papers - CFP
The Fourth International Conference on Cyber Security, Cyber Welfare, and Digital Forensic (CyberSec2015)http://sdiwc.net/conferences/cybersec2015/
Universitas Siswa Bangsa Internasional, Jakarta, Indonesia29- 31, October 2015The conference aims to enable researchers build connections between different digital applications. The conference welcome papers on the following (but not limited to) research topics:***Cyber Security- Distributed and Pervasive Systems Security - Enterprise Systems Security- Formal Methods Application in Security - Hardware-Based security- Incident Handling and Penetration Testing - Legal Issues- Multimedia and Document Security - Operating Systems and Database Security- Privacy issues - SCADA and Embedded systems security- Secure Software Development, Architecture and Outsourcing - Security for Future Networks- Security in Cloud Computing - Security in Social Networks- Security of Web-based Applications and Services - Security protocols- VOIP, Wireless and Telecommunications Network Security ***Digital Forensic- Anti-Forensics and Anti-Anti-Forensics Techniques - Cyber-Crimes- Data leakage, Data protection and Database forensics - Evidentiary Aspects of Digital Forensics- Executable Content and Content Filtering - File System and Memory Analysis Multimedia Forensic- Forensics of Virtual and Cloud Environments - Information Hiding- Investigation of Insider Attacks - Large-Scale Investigations- Malware forensics and Anti-Malware techniques - Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics- New threats and Non-Traditional approaches ***Information Assurance and Security Management- Business Continuity & Disaster Recovery Planning - Corporate Governance- Critical Infrastructure Protection - Decidability and Complexity- Digital Rights Management and Intellectual Property Protection - Economics of Security- Fraud Management - Identity Management- Laws and Regulations - Security Policies and Trust Management- Threats, Vulnerabilities, and Risk Management ***Cyber Peacefare and Physical Security- Authentication and Access Control Systems - Biometrics Applications- Biometrics standards and standardization - Cyber Peacefare Trends and Approaches- Electronic Passports, National ID and Smart Card Security - New theories and algorithms in biometrics- Social engineering - Surveillance Systems- Template Protection and Liveliness detection Important DatesSubmission Date: Open from now until September 19, 2015Notification of Acceptance: 2-4 weeks from the submission dateCamera Ready Submission: October 19, 2015Registration Deadline: October 19, 2015Conference Dates October 29- 31, 2015
Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.