ISCWS 2019 - International Symposium on Cyber Warfare and Security
Date2019-05-29 - 2019-05-31
Deadline2019-05-20
VenueGhana Technology University College, Accra Ghana, Ghana
KeywordsComputing; Computational Modelling; Applications
Websitehttps://icsiot.ghsociety.org
Topics/Call fo Papers
Call for Papers for May 2019: 2019 ISCWS International Symposium on Cyber Warfare and Security
International Symposium on Cyber Warfare and Security ISCWS 2019 is co-located with ICSIoT. Proceedings of full papers of the in IEEE Xplore, IEEE CSDL and other places such as Scopus, titles of papers will be made available in Web of Science linked to ResearcherID and Clarivate Analytics’Publons etc.. The Areas of the symposium are
Cyber conflict
Patriotic hackers as an extension of state power
Potential military uses of cyber attacks
Case studies of cyber attacks in modern conflicts
Theoretical cyber conflict scenarios
Cyber conflict frameworks
Human Factors
Cyber-terrorism
Principles of i-Warfare
Physical security
Counter-terrorism security policies, procedures and legislation
Information warfare policy
SMEs - Small-to-medium Size Enterprises Security model
Critical national infrastructure protection
Information warfare theory
Security implications of “virtualised machines and services
e-Health systems as part of a national critical infrastructure
Information warfare techniques
The Resilience and Susceptibility of "Service Oriented Architectures" (SOAs)
Information security governance and management
Information warfare and security education
Hacking and cracking
Biometrics
e-Intelligence/counter-intelligence
Information Assurance
Cryptography : classical and malicious
Networked Centric War
Malwares and antimalwares technologies
Wireless Treats
Reflector attacks
Threat Agents
Art of war
Cyber-fraud
Particle swarm data mining
Computers-as-weapons
SQL Infections
Information, computer and network security
Military Culture Topography
Data Loss
Security of the virtual worlds
Modern conflict
Data Integration
SIMAD what can/should be done to protect against this threat?
Military approaches
ISO 27001
Unidirectional linguistic steganography
Compromise path analysis
Gaussian empirical rule
IT auditing and compliance
Defence steganography
Natural computing
Risk Management
Virtual Intrusion Detection
Electro-magnetic pulse weapons
Collaborative decision making
National security policy
Information operations
Security policy
Acute situational awareness
Strategic leadership
Firewalls
Aircraft Environment
Influence campaigns
Phishing and spam
Digital forensics
Psychological warfare
Current Anti Virus Technologies
Network anomaly detection models
PSYOP - PSYOPS
Mobile Virus
Corporate defence mechanisms
Perception management
RFID Virus
Security for small to medium enterprises
Infra-structure warfare
Information Security Architecture
Data and service integration
Random numbers approximation sequence
Artificial immune recognition system security infrastructure
Legal issues concerned with information warfare and e-Crime
Traffic classification
Public Key Infrastructure
Non-traditional enemies
Subliminal Channel
Network Address Translator
Ethical, political and social issues relating to information warfare
Machine Learning Risk
Mathematical-filtering
Association of Religions with Warfare
Context free grammers
SecureMDA
Image-processing
New trends
Information Security Economy
Other relevant topics
Etc.
Proceedings of full papers of the International Symposium on Cyber Warfare and Security ISCWS 2019 will be added to 2019 ICSIoT conference full papers and will be submitted to IEEE Xplore, IEEE CSDL and other places such as Scopus, titles of papers will be made available in Web of Science linked to ResearcherID and Clarivate Analytics’ Publons etc.
Registration for Full Paper $300 (Short paper 3-4 pages and Full paper 5-6 pages IEEE Paper template http://icsiot.ghsociety.org/template.doc) This covers presentation and conference participation.
Registration for Abstract Only $100. (Title, Name of Authors, Affiliation, Abstract and Key words) This covers presentation and conference participation.
All selected papers further qualified for future advancement/improvement of work-done for Special Issues in reputable Journals and Book Chapters to be indexed in reputable places such as SCOPUS. Authors will be contacted in the future for submissions to these call for papers. All selected abstracts qualify for such invitations.
Submission link: https://cmt3.research.microsoft.com/CSIoT2019
Website : http://icsiot.ghsociety.org/
Deadline for full papers submission :
20th May 2019
Final notification of acceptance :
25th May 2019
Deadline for registration :
27th May 2019
Deadline for Camera-ready :
28th May 2019
Conference date : 29th to 31th May 2019
Venue : Ghana Technology University College, Accra Ghana.
International Symposium on Cyber Warfare and Security ISCWS 2019 is co-located with ICSIoT. Proceedings of full papers of the in IEEE Xplore, IEEE CSDL and other places such as Scopus, titles of papers will be made available in Web of Science linked to ResearcherID and Clarivate Analytics’Publons etc.. The Areas of the symposium are
Cyber conflict
Patriotic hackers as an extension of state power
Potential military uses of cyber attacks
Case studies of cyber attacks in modern conflicts
Theoretical cyber conflict scenarios
Cyber conflict frameworks
Human Factors
Cyber-terrorism
Principles of i-Warfare
Physical security
Counter-terrorism security policies, procedures and legislation
Information warfare policy
SMEs - Small-to-medium Size Enterprises Security model
Critical national infrastructure protection
Information warfare theory
Security implications of “virtualised machines and services
e-Health systems as part of a national critical infrastructure
Information warfare techniques
The Resilience and Susceptibility of "Service Oriented Architectures" (SOAs)
Information security governance and management
Information warfare and security education
Hacking and cracking
Biometrics
e-Intelligence/counter-intelligence
Information Assurance
Cryptography : classical and malicious
Networked Centric War
Malwares and antimalwares technologies
Wireless Treats
Reflector attacks
Threat Agents
Art of war
Cyber-fraud
Particle swarm data mining
Computers-as-weapons
SQL Infections
Information, computer and network security
Military Culture Topography
Data Loss
Security of the virtual worlds
Modern conflict
Data Integration
SIMAD what can/should be done to protect against this threat?
Military approaches
ISO 27001
Unidirectional linguistic steganography
Compromise path analysis
Gaussian empirical rule
IT auditing and compliance
Defence steganography
Natural computing
Risk Management
Virtual Intrusion Detection
Electro-magnetic pulse weapons
Collaborative decision making
National security policy
Information operations
Security policy
Acute situational awareness
Strategic leadership
Firewalls
Aircraft Environment
Influence campaigns
Phishing and spam
Digital forensics
Psychological warfare
Current Anti Virus Technologies
Network anomaly detection models
PSYOP - PSYOPS
Mobile Virus
Corporate defence mechanisms
Perception management
RFID Virus
Security for small to medium enterprises
Infra-structure warfare
Information Security Architecture
Data and service integration
Random numbers approximation sequence
Artificial immune recognition system security infrastructure
Legal issues concerned with information warfare and e-Crime
Traffic classification
Public Key Infrastructure
Non-traditional enemies
Subliminal Channel
Network Address Translator
Ethical, political and social issues relating to information warfare
Machine Learning Risk
Mathematical-filtering
Association of Religions with Warfare
Context free grammers
SecureMDA
Image-processing
New trends
Information Security Economy
Other relevant topics
Etc.
Proceedings of full papers of the International Symposium on Cyber Warfare and Security ISCWS 2019 will be added to 2019 ICSIoT conference full papers and will be submitted to IEEE Xplore, IEEE CSDL and other places such as Scopus, titles of papers will be made available in Web of Science linked to ResearcherID and Clarivate Analytics’ Publons etc.
Registration for Full Paper $300 (Short paper 3-4 pages and Full paper 5-6 pages IEEE Paper template http://icsiot.ghsociety.org/template.doc) This covers presentation and conference participation.
Registration for Abstract Only $100. (Title, Name of Authors, Affiliation, Abstract and Key words) This covers presentation and conference participation.
All selected papers further qualified for future advancement/improvement of work-done for Special Issues in reputable Journals and Book Chapters to be indexed in reputable places such as SCOPUS. Authors will be contacted in the future for submissions to these call for papers. All selected abstracts qualify for such invitations.
Submission link: https://cmt3.research.microsoft.com/CSIoT2019
Website : http://icsiot.ghsociety.org/
Deadline for full papers submission :
20th May 2019
Final notification of acceptance :
25th May 2019
Deadline for registration :
27th May 2019
Deadline for Camera-ready :
28th May 2019
Conference date : 29th to 31th May 2019
Venue : Ghana Technology University College, Accra Ghana.
Other CFPs
- International Conference on Cyber Security and Internet of Things
- International Doctoral Symposium IDS 2019
- International Symposium on Health Informatics, Computational Biomedical Engineering, Computational Healthcare and Medicine
- International Symposium on Software Engineering, Systems and Architecture
- International Symposium on Financial Technologies
Last modified: 2019-04-28 17:18:13