Conference Information
CyberSec 2016 : International Conference on Cyber Security, Cyber Warfare and Digital Forensic
http://sdiwc.net/conferences/cybersec2016/
Submission Date:
2016-06-26
Notification Date:
2016-07-05
Conference Date:
2016-07-26
Location:
Manchester, UK
Years:
5
Viewed: 4592   Tracked: 2   Attend: 0

Conference Location
Advertisment
Call For Papers
You are invited to participate in The Fifth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic (CyberSec2016) that will be held in Manchester, UK, on July 26-28, 2016. The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures.

Cyber Security
Distributed and Pervasive Systems Security 	Enterprise Systems Security
Formal Methods Application in Security 	Hardware-Based security
Incident Handling and Penetration Testing 	Legal Issues
Multimedia and Document Security 	Operating Systems and Database Security
Privacy issues 	SCADA and Embedded systems security
Secure Software Development, Architecture and Outsourcing 	Security for Future Networks
Security in Cloud Computing 	Security in Social Networks
Security of Web-based Applications and Services 	Security protocols
VOIP, Wireless and Telecommunications Network Security 	

Digital Forensic
Anti-Forensics and Anti-Anti-Forensics Techniques 	Cyber-Crimes
Data leakage, Data protection and Database forensics 	Evidentiary Aspects of Digital Forensics
Executable Content and Content Filtering 	File System and Memory Analysis Multimedia Forensic
Forensics of Virtual and Cloud Environments 	Information Hiding
Investigation of Insider Attacks 	Large-Scale Investigations
Malware forensics and Anti-Malware techniques 	Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics
New threats and Non-Traditional approaches 	

Information Assurance and Security Management
Business Continuity & Disaster Recovery Planning 	Corporate Governance
Critical Infrastructure Protection 	Decidability and Complexity
Digital Rights Management and Intellectual Property Protection 	Economics of Security
Fraud Management 	Identity Management
Laws and Regulations 	Security Policies and Trust Management
Threats, Vulnerabilities, and Risk Management 	

Cyber warfare and Physical Security
Surveillance Systems 	Biometrics Applications
Cyber Warfare Trends and Approaches 	Electronic Passports, National ID and Smart Card Security
Social engineering 	Template Protection and Liveliness detection
Authentication and Access Control Systems 	Biometrics standards and standardization
New theories and algorithms in biometrics 	

The conference uses double-blind review by at least two reviewers, which means that both the reviewer and author identities are concealed from the reviewers, and vice versa, throughout the review process. To facilitate this, authors need to ensure that their manuscripts are prepared in a way that does not give away their identity.

All the registered papers will be submitted to IEEE for potential inclusion to IEEE Xplore as well as other Abstracting and Indexing (A&I) databases. In addition, BEST registered papers will be published in one of the following special issues provided that the author do major improvements and extension within the time frame that will be set by the conference and his/her paper is approved by the chief editor。
Last updated by Dou Sun in 2016-05-06
Related Publications
Advertisment
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
ICDESAInternational conference on VLSI Design, Embedded Systems and Applications2014-07-112014-07-162014-08-25
CSETWorkshop on Cyber Security Experimentation and Test2015-05-052015-06-082015-08-10
AIRSAsian Information Retrieval Societies Conference2016-06-172016-08-052016-11-30
SpringSimSpring Simulation Multiconference2015-09-102016-01-112016-04-03
aICADLInternational Conference on Asia Digital Libraries2015-07-26 2015-12-09
cCRITISInternational Conference on Critical Information Infrastructures Security2016-05-10 2016-10-10
ISIEInternational Symposium on Industrial Electronics2016-01-112016-02-222016-06-08
CCBDInternational Conference on Cloud Computing and Big Data2016-06-202016-08-152016-11-16
NTInternational Conference on Networking and Technology2014-10-102014-10-302014-10-24
b2DRCNInternational Conference on Design of Reliable Communication Networks2015-10-022015-12-042016-03-14
Comments
comments powered by Disqus