ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

ICCWS 2014 - 9th International Conference on Cyber Warfare and Security

Date2014-03-24 - 2014-03-25

Deadline2013-10-21

VenueIndiana, USA - United States USA - United States

Keywords

Websitehttps://academic-conferences.org/iciw/iciw2014

Topics/Call fo Papers

ICCWS 2014 is an opportunity for academics, practitioners and consultants from around the world who are involved in the study, management, development and implementation of systems and concepts to combat information warfare or to improve information systems security to come together and exchange ideas. There are several strong strands of research and interest that are developing in the area including the understanding of threats and risks to information systems, the development of a strong security culture, as well as incident detection and post incident investigation. This conference is continuing to establish itself as a key event for individuals working in the field from around the world.
Please consider submitting to this conference. We are interested in the entire range of concepts from theory to practice, including case studies, works-in-progress, and conceptual explorations.
Publication opportunity
Papers accepted for the conference will be published in the conference proceedings, subject to author registration and payment.
Selected papers that have been presented at the Conference will be considered for publication in a special issue of the Journal of Information Warfare: http://www.jinfowar.com and the International Journal of Cyber Warfare and Terrorism (IJCWT) published by Information Resources Management Association, USA.( DOI: 10.4018/IJCWT, ISSN: 1947-3435, EISSN: 1947-3443). Additionally, selected papers from the conference will be considered for publication in the International Journal of Electronic Security and Digital Forensics published by Inderscience UK (ISSN:1751-1911X).
The advisory group for the conference invites submissions of both academic and practitioner papers on a wide range of topics and a wide range of scholarly approaches including theoretical and empirical papers employing qualitative, quantitative and critical methods. Academic research papers, case studies and work-in-progress/posters are welcomed approaches. PhD Research, proposals for roundtable discussions, non-academic contributions and product demonstrations based on the main themes are also invited. You can find full details in the submission types document (.pdf format).
In addition to the main conference topics below, the advisory group invite suggestions for mini tracks. If you would be interested in preparing and chairing a mini track, please contact the Conference Director, Sue Nugus
Submission details are given below. Topics for submissions may include, but are not limited to:
Cyberwarfare practice and theory
The politics of cyberwarfare, including conceptual cyberarms agreements
Cyber-exploitation execution and detection
Information security practice
Information security management
Dual-use technologies
Cyber conflict - Neural linguistic techniques in cyberwarfare
Patriotic hackers as an extension of state power
Potential military uses of cyber attacks
Case studies of cyber attacks in modern conflicts
Theoretical cyber conflict scenarios
Cyber conflict frameworks
Human Factors
Cyber-terrorism
Principles of i-Warfare
Physical security
Counter-terrorism security policies, procedures and legislation
Information warfare policy
SMEs - Small-to-medium Size Enterprises Security model
Critical national infrastructure protection
Information warfare theory
Security implications of “virtualised machines and services
e-Health systems as part of a national critical infrastructure
Information warfare techniques
The Resilience and Susceptibility of "Service Oriented Architectures" (SOAs)
Information security governance and management
Information warfare and security education
Hacking
Biometrics
Attribution of threat actors
e-Intelligence/counter-intelligence
Information Assurance
Cryptography
Networked Centric War
Malware
Wireless Threats
Reflector attacks
UCE
Threat Agents ? Insider threats
Art of war
Cyber-fraud
Particle swarm data mining
Computers-as-weapons
Risk Management
Virtual Intrusion Detection
Electro-magnetic pulse weapons
Collaborative decision making
National security policy
Information operations
Security policy
Acute situational awareness
Strategic leadership
Firewalls
Aircraft Environment
Influence campaigns
Phishing and spam
Digital forensics
Psychological warfare
Current Anti Virus Technologies
Network anomaly detection models
PSYOP - PSYOPS
Mobile Virus
Corporate defence mechanisms
Perception management
RFID Virus
Security for small to medium enterprises
Infra-structure warfare
SQL Infections
Information, computer and network security
Military Culture Topography
Data Loss
Security of the virtual worlds
Modern conflict
Data Integration
SIMAD what can/should be done to protect against this threat?
Military approaches
ISO 27001
Unidirectional linguistic steganography
Compromise path analysis
Gaussian empirical rule
IT auditing and compliance
Defence steganography
Natural computing
Information Security Architecture
Data and service integration
Random numbers approximation sequence
Artificial immune recognition system security infrastructure
Legal issues concerned with information warfare and e-Crime
Traffic classification
Public Key Infrastructure
Non-traditional enemies
Subliminal Channel
Network Address Translator
Ethical, political and social issues relating to information warfare
Machine Learning Risk
Mathematical-filtering
Association of Religions with Warfare
Context free grammers
SecureMDA
Image-processing

Last modified: 2013-04-11 22:56:28