Conference Information
CyberSec 2014 : International Conference on Cyber Security, Cyber Warfare and Digital Forensic
http://sdiwc.net/conferences/2014/cybersec2014/
Submission Date:
2014-04-10 Extended
Notification Date:
2014-04-17
Conference Date:
2014-04-29
Location:
Beirut, Lebanon
Years:
3
Viewed: 2778   Tracked: 2   Attend: 0

Conference Location
Advertisment
Call For Papers
You are invited to participate in The Third International Conference on Cyber Security, Cyber Warfare, and Digital Forensic (CyberSec2014) that will be held at the Faculty of Engineering – Lebanese University, Campus of Hadath, Beirut – Lebanon on Apr. 29 – May 1, 2014. The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures.

Cyber Security
Distributed and Pervasive Systems Security 	
Enterprise Systems Security
Formal Methods Application in Security 	
Hardware-Based security
Incident Handling and Penetration Testing 	
Legal Issues
Multimedia and Document Security 	
Operating Systems and Database Security
Privacy issues 
SCADA and Embedded systems security
Secure Software Development, Architecture and Outsourcing 	
Security for Future Networks
Security in Cloud Computing 	
Security in Social Networks
Security of Web-based Applications and Services 	
Security protocols
VOIP, Wireless and Telecommunications Network Security 	

Digital Forensic
Anti-Forensics and Anti-Anti-Forensics Techniques 	
Cyber-Crimes
Data leakage, Data protection and Database forensics 	
Evidentiary Aspects of Digital Forensics
Executable Content and Content Filtering 	
File System and Memory Analysis Multimedia Forensic
Forensics of Virtual and Cloud Environments 	
Information Hiding
Investigation of Insider Attacks 	
Large-Scale Investigations
Malware forensics and Anti-Malware techniques 	
Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics
New threats and Non-Traditional approaches 	

Information Assurance and Security Management
Business Continuity & Disaster Recovery Planning 	
Corporate Governance
Critical Infrastructure Protection 	
Decidability and Complexity
Digital Rights Management and Intellectual Property Protection 	
Economics of Security
Fraud Management 	
Identity Management
Laws and Regulations 	
Security Policies and Trust Management
Threats, Vulnerabilities, and Risk Management 
	
Cyber Peacefare and Physical Security
Authentication and Access Control Systems 	
Biometrics Applications
Biometrics standards and standardization 	
Cyber Peacefare Trends and Approaches
Electronic Passports, National ID and Smart Card Security 	
New theories and algorithms in biometrics
Social engineering 	
Surveillance Systems
Template Protection and Liveliness detection 	

All the submitted papers will be reviewed by a minimum of two reviewers, and all the registered papers will be submitted to IEEE for potential inclusion to IEEE Xplore as well as other Abstracting and Indexing (A&I) databases. In addition, BEST registered papers will be published in one of the following special issues provided that the author do major improvements and extension within the time frame that will be set by the conference and his/her paper is approved by the chief editor.
Last updated by Dou Sun in 2014-04-04
Related Publications
Related Conferences
ShortFull NameSubmissionNotificationConference
CSETWorkshop on Cyber Security Experimentation and Test 2013-05-302013-08-12
MABSInternational Workshop on Multi-Agent-Based Simulation 2012-03-302012-06-04
CSTInternational Conference on Computer Science and Technology2013-07-302013-08-202013-09-26
NDSSAnnual Network & Distributed System Security Symposium2013-08-052013-11-012014-02-23
WICTWorld Congress on Information and Communication Technologies2012-08-312012-09-202012-10-27
EurocryptInternational Conference on the Theory and Applications of Cryptographic Techniques2013-10-172014-01-142014-05-11
EATISEuro American Conference on Telematics and Information Systems2013-11-182013-12-162014-04-02
DBSecInternational Conference on Data and Applications Security and Privacy2013-03-012013-04-192013-07-15
URKEInternational Conference on Uncertainty Reasoning and Knowledge Engineering2013-05-012013-06-012013-08-01
ICGECInternational Conference on Genetic and Evolutionary Computing2014-06-012014-07-012014-10-18
Advertisment
Comments
comments powered by Disqus