CyberSec 2016 - Fifth International Conference on Cyber Security, Cyber Welfare, and Digital Forensic (CyberSec2016)
Topics/Call fo Papers
Fifth International Conference on Cyber Security, Cyber Welfare, and Digital Forensic (CyberSec2016) that will be held in Manchester, UK, on July 26-28, 2016. The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures.
Cyber Security
Distributed and Pervasive Systems Security Enterprise Systems Security
Formal Methods Application in Security Hardware-Based security
Incident Handling and Penetration Testing Legal Issues
Multimedia and Document Security Operating Systems and Database Security
Privacy issues SCADA and Embedded systems security
Secure Software Development, Architecture and Outsourcing Security for Future Networks
Security in Cloud Computing Security in Social Networks
Security of Web-based Applications and Services Security protocols
VOIP, Wireless and Telecommunications Network Security
Digital Forensic
Anti-Forensics and Anti-Anti-Forensics Techniques Cyber-Crimes
Data leakage, Data protection and Database forensics Evidentiary Aspects of Digital Forensics
Executable Content and Content Filtering File System and Memory Analysis Multimedia Forensic
Forensics of Virtual and Cloud Environments Information Hiding
Investigation of Insider Attacks Large-Scale Investigations
Malware forensics and Anti-Malware techniques Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics
New threats and Non-Traditional approaches
Information Assurance and Security Management
Business Continuity & Disaster Recovery Planning Corporate Governance
Critical Infrastructure Protection Decidability and Complexity
Digital Rights Management and Intellectual Property Protection Economics of Security
Fraud Management Identity Management
Laws and Regulations Security Policies and Trust Management
Threats, Vulnerabilities, and Risk Management
Cyber warfare and Physical Security
Surveillance Systems Biometrics Applications
Cyber Warfare Trends and Approaches Electronic Passports, National ID and Smart Card Security
Social engineering Template Protection and Liveliness detection
Authentication and Access Control Systems Biometrics standards and standardization
New theories and algorithms in biometrics
All registered papers will be included in SDIWC Digital Library, and in the proceedings of the conference.
All Papers submitted will be reviewed by a minimum of two reviewers. The published proceedings will be indexed by at least five or more of the following: DBLP, EI, INSPEC, Research Bible, Scirus, Microsoft Academic Research, ResearchGate, and Google Scholar Databases.
Cyber Security
Distributed and Pervasive Systems Security Enterprise Systems Security
Formal Methods Application in Security Hardware-Based security
Incident Handling and Penetration Testing Legal Issues
Multimedia and Document Security Operating Systems and Database Security
Privacy issues SCADA and Embedded systems security
Secure Software Development, Architecture and Outsourcing Security for Future Networks
Security in Cloud Computing Security in Social Networks
Security of Web-based Applications and Services Security protocols
VOIP, Wireless and Telecommunications Network Security
Digital Forensic
Anti-Forensics and Anti-Anti-Forensics Techniques Cyber-Crimes
Data leakage, Data protection and Database forensics Evidentiary Aspects of Digital Forensics
Executable Content and Content Filtering File System and Memory Analysis Multimedia Forensic
Forensics of Virtual and Cloud Environments Information Hiding
Investigation of Insider Attacks Large-Scale Investigations
Malware forensics and Anti-Malware techniques Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics
New threats and Non-Traditional approaches
Information Assurance and Security Management
Business Continuity & Disaster Recovery Planning Corporate Governance
Critical Infrastructure Protection Decidability and Complexity
Digital Rights Management and Intellectual Property Protection Economics of Security
Fraud Management Identity Management
Laws and Regulations Security Policies and Trust Management
Threats, Vulnerabilities, and Risk Management
Cyber warfare and Physical Security
Surveillance Systems Biometrics Applications
Cyber Warfare Trends and Approaches Electronic Passports, National ID and Smart Card Security
Social engineering Template Protection and Liveliness detection
Authentication and Access Control Systems Biometrics standards and standardization
New theories and algorithms in biometrics
All registered papers will be included in SDIWC Digital Library, and in the proceedings of the conference.
All Papers submitted will be reviewed by a minimum of two reviewers. The published proceedings will be indexed by at least five or more of the following: DBLP, EI, INSPEC, Research Bible, Scirus, Microsoft Academic Research, ResearchGate, and Google Scholar Databases.
Other CFPs
- Sixth International Conference on Digital Information & Communication Technology & its Applications (DICTAP2016)
- Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC2016)
- International Conference on Computing Technology, Information Security and Risk Management
- Twelve International Conference on Electronics Computer and Computation
- Second International Conference on Electrical and Electronics Engineering
Last modified: 2015-06-05 22:53:01