Información de la conferencia
CyberSec 2016: International Conference on Cyber Security, Cyber Warfare and Digital Forensic
Por favor Iniciar para ver el sitio web del congreso

Día de Entrega:
2016-06-26
Fecha de Notificación:
2016-07-05
Fecha de Conferencia:
2016-07-26
Ubicación:
Manchester, UK
Años:
5
Vistas: 19067   Seguidores: 2   Asistentes: 0

Solicitud de Artículos
You are invited to participate in The Fifth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic (CyberSec2016) that will be held in Manchester, UK, on July 26-28, 2016. The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures.

Cyber Security
Distributed and Pervasive Systems Security Enterprise Systems Security
Formal Methods Application in Security Hardware-Based security
Incident Handling and Penetration Testing Legal Issues
Multimedia and Document Security Operating Systems and Database Security
Privacy issues SCADA and Embedded systems security
Secure Software Development, Architecture and Outsourcing Security for Future Networks
Security in Cloud Computing Security in Social Networks
Security of Web-based Applications and Services Security protocols
VOIP, Wireless and Telecommunications Network Security

Digital Forensic
Anti-Forensics and Anti-Anti-Forensics Techniques Cyber-Crimes
Data leakage, Data protection and Database forensics Evidentiary Aspects of Digital Forensics
Executable Content and Content Filtering File System and Memory Analysis Multimedia Forensic
Forensics of Virtual and Cloud Environments Information Hiding
Investigation of Insider Attacks Large-Scale Investigations
Malware forensics and Anti-Malware techniques Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics
New threats and Non-Traditional approaches

Information Assurance and Security Management
Business Continuity & Disaster Recovery Planning Corporate Governance
Critical Infrastructure Protection Decidability and Complexity
Digital Rights Management and Intellectual Property Protection Economics of Security
Fraud Management Identity Management
Laws and Regulations Security Policies and Trust Management
Threats, Vulnerabilities, and Risk Management

Cyber warfare and Physical Security
Surveillance Systems Biometrics Applications
Cyber Warfare Trends and Approaches Electronic Passports, National ID and Smart Card Security
Social engineering Template Protection and Liveliness detection
Authentication and Access Control Systems Biometrics standards and standardization
New theories and algorithms in biometrics

The conference uses double-blind review by at least two reviewers, which means that both the reviewer and author identities are concealed from the reviewers, and vice versa, throughout the review process. To facilitate this, authors need to ensure that their manuscripts are prepared in a way that does not give away their identity.

All the registered papers will be submitted to IEEE for potential inclusion to IEEE Xplore as well as other Abstracting and Indexing (A&I) databases. In addition, BEST registered papers will be published in one of the following special issues provided that the author do major improvements and extension within the time frame that will be set by the conference and his/her paper is approved by the chief editor。
Última Actualización Por Xin Yao en 2016-06-23
Conferencias Relacionadas
CCFCOREQUALISAbreviaciónNombre CompletoEntregaNotificaciónConferencia
baCSFIEEE Computer Security Foundations Symposium2026-01-292026-04-012026-07-26
cIFIP WG 11.9IFIP WG 11.9 International Conference on Digital Forensics2025-09-302025-10-302026-01-05
baa1ACSACAnnual Computer Security Applications Conference 2025-05-302025-09-032025-12-09
ccNSPWNew Security Paradigms Workshop2025-04-252025-05-302025-08-24
bTrustBusInternational Conference on Trust, Privacy, and Security in Digital Business2022-03-072022-05-102022-08-22
bb1TPDLInternational Conference on Theory and Practice of Digital Libraries2020-04-032020-05-152020-08-25
cDFRWSDigital Forensics Research Conference2017-10-152017-12-182018-03-21
b4IMFInternational Conference on IT Security Incident Management and IT Forensics2016-10-022016-12-182017-03-21
cb3ICIDSInternational Conference on Interactive Digital Storytelling2015-07-062015-08-212015-11-30
cICIS'International Conference on Interaction Sciences: IT, Human and Digital Content2013-08-072013-09-072013-10-08
Revistas Relacionadas
CCFNombre CompletoFactor de ImpactoEditorISSN
Applied Surface Science6.9Elsevier0169-4332
bComputers & Security5.4Elsevier0167-4048
cJournal of Information Security and Applications3.7Elsevier2214-2126
cJournal of Cybersecurity3.2Oxford University Press2057-2093
Computer Law & Security Review3.2Elsevier0267-3649
cComputer Law and Security Review3.2Elsevier0267-3649
Calculus of Variations and Partial Differential Equations2.0Springer0944-2669
Circuits, Systems, and Signal Processing2.0Springer0278-081X
c International Journal of Pattern Recognition and Artificial Intelligence1.1World Scientific0218-0014
IET Computers and Digital Techniques0.484IET1751-8601