Conference Information
CyberSec 2014 : International Conference on Cyber Security, Cyber Warfare and Digital Forensic
Submission Date:
2014-04-10 Extended
Notification Date:
Conference Date:
Beirut, Lebanon
Viewed: 3357   Tracked: 2   Attend: 0

Conference Location
Call For Papers
You are invited to participate in The Third International Conference on Cyber Security, Cyber Warfare, and Digital Forensic (CyberSec2014) that will be held at the Faculty of Engineering – Lebanese University, Campus of Hadath, Beirut – Lebanon on Apr. 29 – May 1, 2014. The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures.

Cyber Security
Distributed and Pervasive Systems Security 	
Enterprise Systems Security
Formal Methods Application in Security 	
Hardware-Based security
Incident Handling and Penetration Testing 	
Legal Issues
Multimedia and Document Security 	
Operating Systems and Database Security
Privacy issues 
SCADA and Embedded systems security
Secure Software Development, Architecture and Outsourcing 	
Security for Future Networks
Security in Cloud Computing 	
Security in Social Networks
Security of Web-based Applications and Services 	
Security protocols
VOIP, Wireless and Telecommunications Network Security 	

Digital Forensic
Anti-Forensics and Anti-Anti-Forensics Techniques 	
Data leakage, Data protection and Database forensics 	
Evidentiary Aspects of Digital Forensics
Executable Content and Content Filtering 	
File System and Memory Analysis Multimedia Forensic
Forensics of Virtual and Cloud Environments 	
Information Hiding
Investigation of Insider Attacks 	
Large-Scale Investigations
Malware forensics and Anti-Malware techniques 	
Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics
New threats and Non-Traditional approaches 	

Information Assurance and Security Management
Business Continuity & Disaster Recovery Planning 	
Corporate Governance
Critical Infrastructure Protection 	
Decidability and Complexity
Digital Rights Management and Intellectual Property Protection 	
Economics of Security
Fraud Management 	
Identity Management
Laws and Regulations 	
Security Policies and Trust Management
Threats, Vulnerabilities, and Risk Management 
Cyber Peacefare and Physical Security
Authentication and Access Control Systems 	
Biometrics Applications
Biometrics standards and standardization 	
Cyber Peacefare Trends and Approaches
Electronic Passports, National ID and Smart Card Security 	
New theories and algorithms in biometrics
Social engineering 	
Surveillance Systems
Template Protection and Liveliness detection 	

All the submitted papers will be reviewed by a minimum of two reviewers, and all the registered papers will be submitted to IEEE for potential inclusion to IEEE Xplore as well as other Abstracting and Indexing (A&I) databases. In addition, BEST registered papers will be published in one of the following special issues provided that the author do major improvements and extension within the time frame that will be set by the conference and his/her paper is approved by the chief editor.
Last updated by Dou Sun in 2014-04-04
Related Publications
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
CCBDInternational Conference on Cloud Computing and Big Data2014-07-272014-08-272014-11-12
CSETWorkshop on Cyber Security Experimentation and Test2015-04-232015-06-082015-08-10
SpringSimSpring Simulation Multiconference2014-09-122015-01-092015-04-12
3DTV3DTV Conference2014-03-282014-05-092014-07-02
b1IECONAnnual Conference of the IEEE Industrial Electronics Society2015-04-152015-06-152015-11-09
b2WOCNInternational Conference on wireless and Optical communications Networks2014-06-102014-06-302014-09-11
b4AIA'International Conference on Artificial Intelligence and Application2014-09-102014-09-252014-10-24
ICC'International Conference on Intelligent Cloud Computing2013-09-302013-11-152014-02-24
baa1NDSSAnnual Network & Distributed System Security Symposium2014-08-012014-10-222015-02-08
cNISSInternational Conference on New Trends in Information Science and Service Science2013-03-202013-04-012013-05-29
Related Journals
comments powered by Disqus