ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

ECIW 2013 - 12th European Conference on Information Warfare & Security

Date2013-07-11 - 2013-07-12

Deadline2013-02-07

VenueJyväskylä, Finland Finland

Keywords

Websitehttp://academic-conferences.org

Topics/Call fo Papers

The 12th European Conference on Information Warfare and Security (ECIW) is an opportunity for academics, practitioners and consultants from Europe and elsewhere who are involved in the study, management, development and implementation of systems and concepts to combat information warfare or to improve information systems security to come together and exchange ideas. There are several strong strands of research and interest that are developing in the area including the understanding of threats and risks to information systems, the development of a strong security culture, as well as incident detection and post incident investigation. This conference is continuing to establish itself as a key event for individuals working in the field from around the world.
Publication opportunity
Papers accepted for the conference will be published in the conference proceedings, subject to author registration and payment.
Selected papers presented at the Conference will be considered for publication in a special issue of both the Journal of Information Warfare: http://www.jinfowar.com. and the International Journal of Cyber Warfare and Terrorism (IJCWT) published by Information Resources Management Association, USA.( DOI: 10.4018/IJCWT, ISSN: 1947-3435, EISSN: 1947-3443). Additionally, selected papers from the conference will be considered for publication in the International Journal of Electronic Security and Digital Forensics published by Inderscience UK (ISSN:1751-1911X)
The conference committee is attracted by both theoretical and practical papers on many subjects, as well as by innovative ideas and experiences. We are also interested in case studies that demonstrate how i-Warfare and security strategies have been applied and the lessons learned. We welcome contributions on many topics, presenting a range of scholarly approaches. theoretical and empirical papers employing qualitative, quantitative and critical methods are eagerly awaited. Action research, case studies and work-in-progress/posters are welcomed approaches. PhD Research, proposals for roundtable discussions, non-academic contributions and product demonstrations based on the main themes are also invited. You can find full details in the submission types document (.pdf format).
In addition to the main conference topics, the programme chair invites suggestions for mini tracks. If you would be interested in preparing and chairing a mini track, please contact the Conference Director, Sue Nugus.
Submission details are given below. Topics for submissions may include, but are not limited to:
§ i-Warfare principles, theory and policy and techniques
§ Cyber conflict, Cyber-terrorism and Cyber-fraud
§ Physical security
§ National security policy
§ Information security governance and management
§ Information warfare and security education
§ Information Assurance and Information operations
§ Psychological warfare
§ Perception management
§ Legal issues concerned with information warfare and e-Crime
§ Ethical, political and social issues relating to information warfare
§ SMEs - Small-to-medium Size Enterprises Security issues
§ Critical national infrastructure protection
§ The Resilience and Susceptibility of "Service Oriented Architectures" (SOAs)
§ Hacking and cracking
§ Biometrics
§ e-Intelligence/counter-intelligence
§ Cryptography : classical and malicious
§ Networked Centric War
§ Network anomaly detection models
§ Malware and anti-malware technologies
§ Non-traditional enemies
§
§ Wireless Threats
§ Reflector attacks
§ Computers-as-weapons
§ Risk Management
§ Virtual Intrusion Detection
§ Collaborative decision making
§ Acute situational awareness
§ Firewalls
§ Phishing and spam
§ Digital forensics
§ Current Anti Virus Technologies
§ PSYOPS
§ Mobile Virus
§ RFID Virus
§ ISO 27001
§ Defence steganography and Unidirectional linguistic steganography
§ Traffic classification
§ Public Key Infrastructure
§ Machine Learning Risk
§ Mathematical-filtering
§ SecureMDA
§ Image-processing

Last modified: 2012-09-15 20:52:57