C-IoT 2017 - International Workshop on Cybersecurity and the Internet of Things (C-IoT 2017)
Topics/Call fo Papers
Original submissions reflecting latest research observation and achievement are invited.
The papers submitted to this special session might be in a large range of topics that include, but are not limited to:
? Phishing (Web, Email, Social media)
? Decision Support System for Information Security
? Cyber Threat Modelling and Analysis
? Cyber Forensics
? Cyber Security Test Beds, Tools, and Methodologies
? Cyber Hacking and Next Generation Fire Wall
? Cyber Threat Intelligence
? Cyber Monitoring and Incident Response
? Cyber Security Modelling and Threat in Big Data
? Big Data Security and Privacy
? Big Data Security Applications
? Cryptography and Key Algorithms
? Encryption, Authentication, Protocol and Access Control
? Smartphone Security and Privacy
? Security and Privacy in Cloud and Distributed Systems
? Wearable Device Security
? Malware Detection and Analysis (Ransomware, Virus, Worms, Trojans)
? Adoption of Security Approaches
? Advanced Persistent Threat Detection
? Intrusion Detection/Prevention Systems
? Denial of Service/ Distributed Denial of Service (DoS/DDoS)
? Social Engineering (Phishing, Spear Phishing, Baiting, Scareware, Insider Threat)
? Human Aspects of Information Security (Awareness & Training)
? Cloud Security Mitigation Techniques for Critical Infrastructures in Banking and Finance, Energy, Transport and Healthcare
? Internet of Things (IoT) enabled system security
? Cyber Security in the Critical Infrastructure: Advances and Future Directions.
The papers submitted to this special session might be in a large range of topics that include, but are not limited to:
? Phishing (Web, Email, Social media)
? Decision Support System for Information Security
? Cyber Threat Modelling and Analysis
? Cyber Forensics
? Cyber Security Test Beds, Tools, and Methodologies
? Cyber Hacking and Next Generation Fire Wall
? Cyber Threat Intelligence
? Cyber Monitoring and Incident Response
? Cyber Security Modelling and Threat in Big Data
? Big Data Security and Privacy
? Big Data Security Applications
? Cryptography and Key Algorithms
? Encryption, Authentication, Protocol and Access Control
? Smartphone Security and Privacy
? Security and Privacy in Cloud and Distributed Systems
? Wearable Device Security
? Malware Detection and Analysis (Ransomware, Virus, Worms, Trojans)
? Adoption of Security Approaches
? Advanced Persistent Threat Detection
? Intrusion Detection/Prevention Systems
? Denial of Service/ Distributed Denial of Service (DoS/DDoS)
? Social Engineering (Phishing, Spear Phishing, Baiting, Scareware, Insider Threat)
? Human Aspects of Information Security (Awareness & Training)
? Cloud Security Mitigation Techniques for Critical Infrastructures in Banking and Finance, Energy, Transport and Healthcare
? Internet of Things (IoT) enabled system security
? Cyber Security in the Critical Infrastructure: Advances and Future Directions.
Other CFPs
- International Workshop on Reasoning in Smart-Homes (RIS-2017)
- 2nd International Symposium on Real-time Data Processing for Cloud Computing (RTDPCC-2017)
- International Workshop on Engineering Data- & Model-driven Applications (EDMA-2017)
- 2nd International Workshop on Mobile Social Networking and Computing (MSNCom-2017)
- 15th International Symposium on Spatial and Temporal Databases
Last modified: 2017-02-19 13:33:32