ICIW 2012 - 7th International Conference on Information Warfare and Security ICIW-2012
Topics/Call fo Papers
ICIW provides an opportunity for academics, practitioners and consultants from around the world who are involved in the study, management, development and implementation of systems and concepts to combat information warfare or to improve information systems security to come together and exchange ideas. There are several strong strands of research and interest that are developing in the area including the understanding of threats and risks to information systems, the development of a strong security culture, as well as incident detection and post incident investigation. This conference is continuing to establish itself as a key event for individuals working in the field from around the world.
Publication opportunity
Papers accepted for the conference will be published in the conference proceedings, subject to author registration and payment.
Selected papers from the Conference will be considered for publication in a special issue of the Journal of Information Warfare: http://www.jinfowar.com. Additionally, selected papers from the conference will be considered for publication in the International Journal of Electronic Security and Digital Forensics published by Inderscience UK (ISSN:1751-1911X).
The advisory group for the conference invites submissions of both academic and practitioner papers on a wide range of topics and a wide range of scholarly approaches including theoretical and empirical papers employing qualitative, quantitative and critical methods. Academic research papers, case studies and work-in-progress/posters are welcomed approaches. PhD Research, proposals for roundtable discussions, non-academic contributions and product demonstrations based on the main themes are also invited. You can find full details in the submission types document (.pdf format).
In addition to the main conference topics, the advisory group invite suggestions for mini tracks. If you would be interested in preparing and chairing a mini track, please contact the Conference Director, Sue Nugus.
Submission details are given below. Topics for submissions may include, but are not limited to:
Cyberwarfare practice and theory
The politics of cyberwarfare, including conceptual cyberarms agreements
Cyber-exploitation execution and detection
Information security practice
Information security management
Dual-use technologies
Cyber conflict - Neural linguistic techniques in cyberwarfare
Patriotic hackers as an extension of state power
Potential military uses of cyber attacks
Case studies of cyber attacks in modern conflicts
Theoretical cyber conflict scenarios
Cyber conflict frameworks
Human Factors
Cyber-terrorism
Principles of i-Warfare
Physical security
Counter-terrorism security policies, procedures and legislation
Information warfare policy
SMEs - Small-to-medium Size Enterprises Security model
Critical national infrastructure protection
Information warfare theory
Security implications of “virtualised machines and services
e-Health systems as part of a national critical infrastructure
Information warfare techniques
The Resilience and Susceptibility of "Service Oriented Architectures" (SOAs)
Information security governance and management
Information warfare and security education
Hacking
Biometrics
e-Intelligence/counter-intelligence
Information Assurance
Cryptography
Networked Centric War
Malware
Wireless Treats
Reflector attacks
UCE
Threat Agents ? Insider threats
Art of war
Cyber-fraud
Particle swarm data mining
Computers-as-weapons
Risk Management
Virtual Intrusion Detection
Electro-magnetic pulse weapons
Collaborative decision making
National security policy
Information operations
Security policy
Acute situational awareness
Strategic leadership
Firewalls
Aircraft Environment
Influence campaigns
Phishing and spam
Digital forensics
Psychological warfare
Current Anti Virus Technologies
Network anomaly detection models
PSYOP - PSYOPS
Mobile Virus
Corporate defence mechanisms
Perception management
RFID Virus
Security for small to medium enterprises
Infra-structure warfare
SQL Infections
Information, computer and network security
Military Culture Topography
Data Loss
Security of the virtual worlds
Modern conflict
Data Integration
SIMAD what can/should be done to protect against this threat?
Military approaches
ISO 27001
Unidirectional linguistic steganography
Compromise path analysis
Gaussian empirical rule
IT auditing and compliance
Defence steganography
Natural computing
Information Security Architecture
Data and service integration
Random numbers approximation sequence
Artificial immune recognition system security infrastructure
Legal issues concerned with information warfare and e-Crime
Traffic classification
Public Key Infrastructure
Non-traditional enemies
Subliminal Channel
Network Address Translator
Ethical, political and social issues relating to information warfare
Machine Learning Risk
Mathematical-filtering
Association of Religions with Warfare
Context free grammers
SecureMDA
Image-processing
Participants will be asked to vote for the best poster and a prize will be given for the poster receiving the highest number of votes. Additionally a prize will be awarded to the best PhD paper presented at the conference.
If you would be interested in preparing and chairing a mini track, please contact the Conference Director, Sue Nugus outlining your suggested topic.
Submission details
Abstract details:
All submission types require an abstract in the first instance. The Abstract should be a minimum of 300 and no more than 500 words including keywords to be received by 12 September 2011 Please read the Abstract Guidelines section of the website before submitting.
Submission:
Online via the submission form. Please ensure that you complete all relevant sections of the form, including the conference track the abstract is intended for, the proposed title for the paper, the full names (first name and surname, not initials) and email addresses of all authors and a postal address and telephone number for at least one contact author. Please indicate clearly if the contact author is not the lead author.
Full paper:
Only required when the abstract has been selected and not to be more than 5,000 words including abstract, keywords and references (the Harvard referencing rules need to be followed). Submission date will be no later than 20 October 2012. Authors are advised that this is a final date. Earlier submission of the full paper helps us to manage the review process in a timely manner. Papers should be submitted as .doc or .rtf file attachments by email to Charlotte Hall with the paper submission checklist and copyright form.
Due to the large number of papers expected for this conference, the committee prefers that an author presents only one paper. However, if multiple papers are accepted for publication and presentation, each paper requires a separate registration fee. Author registration and payment must be completed by 16 February 2012 and there are special discounts available for earlybird registration and group bookings, including a special reduced rate for supervisors and students attending together
Important information
§ The selection panel of the conference committee will consider all abstracts received by the submission deadline to ensure that the proposed paper is relevant to the Conference.
§ The authors of abstracts that describe a relevant paper will receive a notification of abstract selection.
§ All full papers will be double-blind reviewed by members of the conference committee to ensure an adequate standard, that the proposed subject of their abstract has been followed, that the paper is of a suitable length, the standard of English is adequate and the paper is appropriately referenced.
§ For authors whose first language is not English we request that you have your work proof read prior to submission by a native English speaker (or at least a fluent English speaker). Papers can be rejected due to a poor standard of English. We do offer proof-reading services.
§ Papers that are accepted will be published in the conference proceedings providing at least one author registers and presents the work at the Conference (see the registration section of the conference website for more information about registration). Author registration must be completed by 16 February 2012.
§ Due to the large number of papers expected for this conference, the committee only allows an author to present one paper. However, if multiple papers are accepted for publication and presentation, each paper requires a separate registration fee.
Proceedings for previous ICIW conferences can be purchased from our bookshop by clicking on the Purchase proceedings button.
Important Dates
Abstract submission deadline:
12 September 2011
Notification of abstract acceptance:
16 September 2011
Full paper due for review:
20 October 2011
Notification of paper acceptance(with any requested changes):
29 December 2011
Earlybird registration closes
12 January 2012
Final paper due:
26 January 2012
Final author registration date
16 February 2012
Publication opportunity
Papers accepted for the conference will be published in the conference proceedings, subject to author registration and payment.
Selected papers from the Conference will be considered for publication in a special issue of the Journal of Information Warfare: http://www.jinfowar.com. Additionally, selected papers from the conference will be considered for publication in the International Journal of Electronic Security and Digital Forensics published by Inderscience UK (ISSN:1751-1911X).
The advisory group for the conference invites submissions of both academic and practitioner papers on a wide range of topics and a wide range of scholarly approaches including theoretical and empirical papers employing qualitative, quantitative and critical methods. Academic research papers, case studies and work-in-progress/posters are welcomed approaches. PhD Research, proposals for roundtable discussions, non-academic contributions and product demonstrations based on the main themes are also invited. You can find full details in the submission types document (.pdf format).
In addition to the main conference topics, the advisory group invite suggestions for mini tracks. If you would be interested in preparing and chairing a mini track, please contact the Conference Director, Sue Nugus.
Submission details are given below. Topics for submissions may include, but are not limited to:
Cyberwarfare practice and theory
The politics of cyberwarfare, including conceptual cyberarms agreements
Cyber-exploitation execution and detection
Information security practice
Information security management
Dual-use technologies
Cyber conflict - Neural linguistic techniques in cyberwarfare
Patriotic hackers as an extension of state power
Potential military uses of cyber attacks
Case studies of cyber attacks in modern conflicts
Theoretical cyber conflict scenarios
Cyber conflict frameworks
Human Factors
Cyber-terrorism
Principles of i-Warfare
Physical security
Counter-terrorism security policies, procedures and legislation
Information warfare policy
SMEs - Small-to-medium Size Enterprises Security model
Critical national infrastructure protection
Information warfare theory
Security implications of “virtualised machines and services
e-Health systems as part of a national critical infrastructure
Information warfare techniques
The Resilience and Susceptibility of "Service Oriented Architectures" (SOAs)
Information security governance and management
Information warfare and security education
Hacking
Biometrics
e-Intelligence/counter-intelligence
Information Assurance
Cryptography
Networked Centric War
Malware
Wireless Treats
Reflector attacks
UCE
Threat Agents ? Insider threats
Art of war
Cyber-fraud
Particle swarm data mining
Computers-as-weapons
Risk Management
Virtual Intrusion Detection
Electro-magnetic pulse weapons
Collaborative decision making
National security policy
Information operations
Security policy
Acute situational awareness
Strategic leadership
Firewalls
Aircraft Environment
Influence campaigns
Phishing and spam
Digital forensics
Psychological warfare
Current Anti Virus Technologies
Network anomaly detection models
PSYOP - PSYOPS
Mobile Virus
Corporate defence mechanisms
Perception management
RFID Virus
Security for small to medium enterprises
Infra-structure warfare
SQL Infections
Information, computer and network security
Military Culture Topography
Data Loss
Security of the virtual worlds
Modern conflict
Data Integration
SIMAD what can/should be done to protect against this threat?
Military approaches
ISO 27001
Unidirectional linguistic steganography
Compromise path analysis
Gaussian empirical rule
IT auditing and compliance
Defence steganography
Natural computing
Information Security Architecture
Data and service integration
Random numbers approximation sequence
Artificial immune recognition system security infrastructure
Legal issues concerned with information warfare and e-Crime
Traffic classification
Public Key Infrastructure
Non-traditional enemies
Subliminal Channel
Network Address Translator
Ethical, political and social issues relating to information warfare
Machine Learning Risk
Mathematical-filtering
Association of Religions with Warfare
Context free grammers
SecureMDA
Image-processing
Participants will be asked to vote for the best poster and a prize will be given for the poster receiving the highest number of votes. Additionally a prize will be awarded to the best PhD paper presented at the conference.
If you would be interested in preparing and chairing a mini track, please contact the Conference Director, Sue Nugus outlining your suggested topic.
Submission details
Abstract details:
All submission types require an abstract in the first instance. The Abstract should be a minimum of 300 and no more than 500 words including keywords to be received by 12 September 2011 Please read the Abstract Guidelines section of the website before submitting.
Submission:
Online via the submission form. Please ensure that you complete all relevant sections of the form, including the conference track the abstract is intended for, the proposed title for the paper, the full names (first name and surname, not initials) and email addresses of all authors and a postal address and telephone number for at least one contact author. Please indicate clearly if the contact author is not the lead author.
Full paper:
Only required when the abstract has been selected and not to be more than 5,000 words including abstract, keywords and references (the Harvard referencing rules need to be followed). Submission date will be no later than 20 October 2012. Authors are advised that this is a final date. Earlier submission of the full paper helps us to manage the review process in a timely manner. Papers should be submitted as .doc or .rtf file attachments by email to Charlotte Hall with the paper submission checklist and copyright form.
Due to the large number of papers expected for this conference, the committee prefers that an author presents only one paper. However, if multiple papers are accepted for publication and presentation, each paper requires a separate registration fee. Author registration and payment must be completed by 16 February 2012 and there are special discounts available for earlybird registration and group bookings, including a special reduced rate for supervisors and students attending together
Important information
§ The selection panel of the conference committee will consider all abstracts received by the submission deadline to ensure that the proposed paper is relevant to the Conference.
§ The authors of abstracts that describe a relevant paper will receive a notification of abstract selection.
§ All full papers will be double-blind reviewed by members of the conference committee to ensure an adequate standard, that the proposed subject of their abstract has been followed, that the paper is of a suitable length, the standard of English is adequate and the paper is appropriately referenced.
§ For authors whose first language is not English we request that you have your work proof read prior to submission by a native English speaker (or at least a fluent English speaker). Papers can be rejected due to a poor standard of English. We do offer proof-reading services.
§ Papers that are accepted will be published in the conference proceedings providing at least one author registers and presents the work at the Conference (see the registration section of the conference website for more information about registration). Author registration must be completed by 16 February 2012.
§ Due to the large number of papers expected for this conference, the committee only allows an author to present one paper. However, if multiple papers are accepted for publication and presentation, each paper requires a separate registration fee.
Proceedings for previous ICIW conferences can be purchased from our bookshop by clicking on the Purchase proceedings button.
Important Dates
Abstract submission deadline:
12 September 2011
Notification of abstract acceptance:
16 September 2011
Full paper due for review:
20 October 2011
Notification of paper acceptance(with any requested changes):
29 December 2011
Earlybird registration closes
12 January 2012
Final paper due:
26 January 2012
Final author registration date
16 February 2012
Other CFPs
- IAU 14th General Conference
- 6th International Workshop on Middleware Tools, Services, and Run-Time Support for Sensor Networks (MidSens'2011)
- 6th International Workshop on Middleware for Service Oriented Computing (MW4SOC'2011)
- 3rd International Workshop on Middleware for Pervasive Mobile and Embedded Computing (M-MPAC'2011)
- 2nd International Workshop on Green Computing Middleware (GCM'2011)
Last modified: 2011-07-09 14:09:43