Info/Cyber-Security 2016 - International Symposium on Information and Cyber Security: Info/Cyber-Security 2016
Topics/Call fo Papers
Some authors conceive Information Security as part of Cyber Security and others perceive Cyber Security as being part of Information Security. It depends on the meaning associated to each of the term. We prefer to consider that both areas intersect each other because we prefer to assign a more comprehensive meaning to each of the two phrases.
Topics
General Approaches and Methodologies
Systems Approach, thinking and methodologies to managing the cyber-security risks
Case studies or reports
Case studies as research and educational methodologies
Systems security and security systems
Information and computer security: concepts, techniques, procedures and methodologies.
Cyber Security Technologies and methodologies
Network Communications Security
Cyber security strategies and related Regulations
Information forensics
Cryptography
Organizational Security: Business and Government
Security for critical infrastructures
Cyber-Espionage
Cyber-Wars
Cyber-Attack
Cyber-Crime
Anti-cyber terrorism
Computer Crime Prevention and Detection
Web, e-commerce, m-commerce, and e-mail security
Mobile security
Computer and network forensic
Intrusion detection and prevention
Digital Forensics
Cyber Security Education
Industrial Espionage and Theft of Information
Legal informatics
Information security culture
Enhancing risk perception
Public understanding of security
Impacts of standards, policies, compliance requirements
Organizational governance for information assurance
Risk Management and Risk Mitigation Strategies
Insider Threat
Individual Security, Privacy and Human Aspects
Human aspects of information security and assurance
Management of information and cyber security risks
Cyber-Anxiety
Security and privacy in social networks
Social, economic and policy issues of trust, security and privacy
Security and privacy for big data
Security and privacy in the Internet of Things
Security and privacy in cloud computing and federated cloud
Anonymization and privacy in communication systems
Privacy in e-health systems
Confidentiality Protection
Information Content Security
Information Ethics
Awareness and education methods
Psychological models of security
User acceptance of security policies and technologies
User-friendly authentication methods
Social engineering and other human-related risks
Privacy attitudes and practices
Mobile privacy and security technologies
Specific Areas, Cases, and Technologies
Secured software
Security in mobile networks, computing and technologies
Intelligent Access Control Models
Adversarial Modeling
Automated Vulnerability Assessment/ Penetration Testing
Cloud Computing, Social Media Security, and Privacy
Game-theoretic approaches to Security and Privacy
Malware (Virus, Worms, Trojans, Backdoors)
Multi-party/Multi-agent Access Control
Resilience and Robustness
Biometric technologies and impacts
Visualization for cyber security
Topics
General Approaches and Methodologies
Systems Approach, thinking and methodologies to managing the cyber-security risks
Case studies or reports
Case studies as research and educational methodologies
Systems security and security systems
Information and computer security: concepts, techniques, procedures and methodologies.
Cyber Security Technologies and methodologies
Network Communications Security
Cyber security strategies and related Regulations
Information forensics
Cryptography
Organizational Security: Business and Government
Security for critical infrastructures
Cyber-Espionage
Cyber-Wars
Cyber-Attack
Cyber-Crime
Anti-cyber terrorism
Computer Crime Prevention and Detection
Web, e-commerce, m-commerce, and e-mail security
Mobile security
Computer and network forensic
Intrusion detection and prevention
Digital Forensics
Cyber Security Education
Industrial Espionage and Theft of Information
Legal informatics
Information security culture
Enhancing risk perception
Public understanding of security
Impacts of standards, policies, compliance requirements
Organizational governance for information assurance
Risk Management and Risk Mitigation Strategies
Insider Threat
Individual Security, Privacy and Human Aspects
Human aspects of information security and assurance
Management of information and cyber security risks
Cyber-Anxiety
Security and privacy in social networks
Social, economic and policy issues of trust, security and privacy
Security and privacy for big data
Security and privacy in the Internet of Things
Security and privacy in cloud computing and federated cloud
Anonymization and privacy in communication systems
Privacy in e-health systems
Confidentiality Protection
Information Content Security
Information Ethics
Awareness and education methods
Psychological models of security
User acceptance of security policies and technologies
User-friendly authentication methods
Social engineering and other human-related risks
Privacy attitudes and practices
Mobile privacy and security technologies
Specific Areas, Cases, and Technologies
Secured software
Security in mobile networks, computing and technologies
Intelligent Access Control Models
Adversarial Modeling
Automated Vulnerability Assessment/ Penetration Testing
Cloud Computing, Social Media Security, and Privacy
Game-theoretic approaches to Security and Privacy
Malware (Virus, Worms, Trojans, Backdoors)
Multi-party/Multi-agent Access Control
Resilience and Robustness
Biometric technologies and impacts
Visualization for cyber security
Other CFPs
- International Symposium on Information Systems and Software Engineering: ISSE 2016
- International Symposium, Workshop, and Exhibition on Research, Education, Innovations, and Applications of 3D Technologies
- Symposium on Health Sciences, Systems and Technologies HSST 2016
- 2016 International Symposium on Information and Cyber Security
- 1st International INFOCOM Workshop on Software-Driven Flexible and Agile Networking
Last modified: 2015-11-08 23:03:06