Conference Information
CyberSec 2015 : International Conference on Cyber Security, Cyber Warfare and Digital Forensic
http://sdiwc.net/conferences/cybersec2015/
Submission Date:
2015-09-19
Notification Date:
Conference Date:
2015-10-29
Location:
Jakarta, Indonesia
Years:
4
Viewed: 3506   Tracked: 2   Attend: 0

Conference Location
Advertisment
Call For Papers
The conference welcomes papers on the following (but not limited to) research topics:

Cyber Security
Distributed and Pervasive Systems Security 	Enterprise Systems Security
Formal Methods Application in Security 	Hardware-Based security
Incident Handling and Penetration Testing 	Legal Issues
Multimedia and Document Security 	Operating Systems and Database Security
Privacy issues 	SCADA and Embedded systems security
Secure Software Development, Architecture and Outsourcing 	Security for Future Networks
Security in Cloud Computing 	Security in Social Networks
Security of Web-based Applications and Services 	Security protocols
VOIP, Wireless and Telecommunications Network Security 	

Digital Forensic
Anti-Forensics and Anti-Anti-Forensics Techniques 	Cyber-Crimes
Data leakage, Data protection and Database forensics 	Evidentiary Aspects of Digital Forensics
Executable Content and Content Filtering 	File System and Memory Analysis Multimedia Forensic
Forensics of Virtual and Cloud Environments 	Information Hiding
Investigation of Insider Attacks 	Large-Scale Investigations
Malware forensics and Anti-Malware techniques 	Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics
New threats and Non-Traditional approaches 	

Information Assurance and Security Management
Business Continuity & Disaster Recovery Planning 	Corporate Governance
Critical Infrastructure Protection 	Decidability and Complexity
Digital Rights Management and Intellectual Property Protection 	Economics of Security
Fraud Management 	Identity Management
Laws and Regulations 	Security Policies and Trust Management
Threats, Vulnerabilities, and Risk Management 	

Cyber Peacefare and Physical Security
Authentication and Access Control Systems 	Biometrics Applications
Biometrics standards and standardization 	Cyber Peacefare Trends and Approaches
Electronic Passports, National ID and Smart Card Security 	New theories and algorithms in biometrics
Social engineering 	Surveillance Systems
Template Protection and Liveliness detection 	

All registered papers will be included in SDIWC Digital Library, and in the proceedings of the conference.

All submitted papers will be reviewed by a minimum of two reviewers. The published proceedings will be indexed in ResearchBib, in addition, they will be reviewed for POSSIBLE inclusion within the INSPEC, EI, DBLP, Microsoft Academic Research, ResearchGate, and Google Scholar Databases. In addition, BEST registered papers will be published in one of the following special issues provided that the author do major improvements and extension within the time frame that will be set by the conference and his/her paper is approved by the chief editor.
Last updated by Dou Sun in 2015-03-22
Related Publications
Advertisment
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
ICDESAInternational conference on VLSI Design, Embedded Systems and Applications2014-07-112014-07-162014-08-25
CSETWorkshop on Cyber Security Experimentation and Test2015-05-052015-06-082015-08-10
SpringSimSpring Simulation Multiconference2014-09-122015-01-092015-04-12
aICADLInternational Conference on Asia Digital Libraries2015-07-24 2015-12-09
cCRITISInternational Conference on Critical Information Infrastructures Security2015-05-102015-07-082015-10-05
VoteIDInternational Conference on E-voting and Identity2015-04-132015-05-262015-09-02
CCBDInternational Conference on Cloud Computing and Big Data2014-07-272014-08-272014-11-12
NTInternational Conference on Networking and Technology2014-10-102014-10-302014-10-24
b2DRCNInternational Conference on Design of Reliable Communication Networks2014-11-252015-01-152015-03-25
baa1NDSSAnnual Network & Distributed System Security Symposium2014-08-012014-10-222015-02-08
Related Journals
Comments
comments powered by Disqus