INFOSEC 2017 - Third International Conference on Information Security and Cyber Forensics (INFOSEC2017)
Date2017-06-29 - 2017-07-01
Deadline2017-05-01
VenueComenius University in Bratislava, Slovakia
Keywords
Topics/Call fo Papers
Third International Conference on Information Security and Cyber Forensics (INFOSEC2017) that will be held in Slovakia on June 29-July 1, 2017. The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures.
The conference welcomes papers on the following (but not limited to) research topics:
Cyber Security
Distributed and Pervasive Systems Security Enterprise Systems Security
Formal Methods Application in Security Hardware-Based security
Incident Handling and Penetration Testing Legal Issues
Multimedia and Document Security Operating Systems and Database Security
Privacy Issues SCADA and Embedded systems security
Secure Software Development, Architecture and Outsourcing Security for Future Networks
Security in Cloud Computing Security in Social Networks
Security of Web-based Applications and Services Security protocols
VOIP, Wireless and Telecommunications Network Security
Digital Forensic
Anti-Forensics and Anti-Forensics Techniques Cyber-Crimes
Data leakage, Data protection and Database forensics Evidentiary Aspects of Digital Forensics
Executable Content and Content Filtering File System and Memory Analysis Multimedia Forensic
Forensics of Virtual and Cloud Environments Information Hiding
Investigation of Insider Attacks Large-Scale Investigations
Malware Forensics and Anti-Malware techniques Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics
New threats and Non-Traditional Approaches
Information Assurance and Security Management
Business Continuity & Disaster Recovery Planning Corporate Governance
Critical Infrastructure Protection Decidability and Complexity
Digital Rights Management and Intellectual Property Protection Economics of Security
Fraud Management Identity Management
Laws and Regulations Security Policies and Trust Management
Threats, Vulnerabilities, and Risk Management
Cyber Peacefare and Physical Security
Authentication and Access Control Systems Biometrics Applications
Biometrics standards and standardization Cyber Peacefare Trends and Approaches
Electronic Passports, National ID and Smart Card Security New theories and algorithms in biometrics
Social Engineering Surveillance Systems
Template Protection and Liveliness Detection
All registered papers will be published in SDIWC Digital Library, and in the proceedings of the conference.
The conference uses double-blind review by at least two reviewers, which means that both the reviewer and author identities are concealed from the reviewers, and vice versa, throughout the review process. To facilitate this, authors need to ensure that their manuscripts are prepared in a way that does not give away their identity. The published proceedings will be submitted for indexing in ResearchBib. Also, they will be reviewed for POSSIBLE inclusion within the INSPEC, EI, DBLP, Microsoft Academic Research, ResearchGate, and Google Scholar Databases.
The conference welcomes papers on the following (but not limited to) research topics:
Cyber Security
Distributed and Pervasive Systems Security Enterprise Systems Security
Formal Methods Application in Security Hardware-Based security
Incident Handling and Penetration Testing Legal Issues
Multimedia and Document Security Operating Systems and Database Security
Privacy Issues SCADA and Embedded systems security
Secure Software Development, Architecture and Outsourcing Security for Future Networks
Security in Cloud Computing Security in Social Networks
Security of Web-based Applications and Services Security protocols
VOIP, Wireless and Telecommunications Network Security
Digital Forensic
Anti-Forensics and Anti-Forensics Techniques Cyber-Crimes
Data leakage, Data protection and Database forensics Evidentiary Aspects of Digital Forensics
Executable Content and Content Filtering File System and Memory Analysis Multimedia Forensic
Forensics of Virtual and Cloud Environments Information Hiding
Investigation of Insider Attacks Large-Scale Investigations
Malware Forensics and Anti-Malware techniques Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics
New threats and Non-Traditional Approaches
Information Assurance and Security Management
Business Continuity & Disaster Recovery Planning Corporate Governance
Critical Infrastructure Protection Decidability and Complexity
Digital Rights Management and Intellectual Property Protection Economics of Security
Fraud Management Identity Management
Laws and Regulations Security Policies and Trust Management
Threats, Vulnerabilities, and Risk Management
Cyber Peacefare and Physical Security
Authentication and Access Control Systems Biometrics Applications
Biometrics standards and standardization Cyber Peacefare Trends and Approaches
Electronic Passports, National ID and Smart Card Security New theories and algorithms in biometrics
Social Engineering Surveillance Systems
Template Protection and Liveliness Detection
All registered papers will be published in SDIWC Digital Library, and in the proceedings of the conference.
The conference uses double-blind review by at least two reviewers, which means that both the reviewer and author identities are concealed from the reviewers, and vice versa, throughout the review process. To facilitate this, authors need to ensure that their manuscripts are prepared in a way that does not give away their identity. The published proceedings will be submitted for indexing in ResearchBib. Also, they will be reviewed for POSSIBLE inclusion within the INSPEC, EI, DBLP, Microsoft Academic Research, ResearchGate, and Google Scholar Databases.
Other CFPs
- 8th ACM CCS International Workshop on Managing Insider Security Threats
- 4th IEEE Workshop on Hot Topics in Web Systems Technologies
- Fourth International Symposium on Women in Computing and Informatics (WCI-2016)
- 11th International Conference on Malicious and Unwanted Software 2016 (MALCON)
- 2017 SICEAS Seoul International Conference on Engineering and Applied Science
Last modified: 2016-05-05 09:39:05