会议信息
CyberSec 2016: International Conference on Cyber Security, Cyber Warfare and Digital Forensic
请登录查看会议网址
截稿日期: |
2016-06-26 |
通知日期: |
2016-07-05 |
会议日期: |
2016-07-26 |
会议地点: |
Manchester, UK |
届数: |
5 |
浏览: 19083 关注: 2 参加: 0
征稿
You are invited to participate in The Fifth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic (CyberSec2016) that will be held in Manchester, UK, on July 26-28, 2016. The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures.
Cyber Security
Distributed and Pervasive Systems Security Enterprise Systems Security
Formal Methods Application in Security Hardware-Based security
Incident Handling and Penetration Testing Legal Issues
Multimedia and Document Security Operating Systems and Database Security
Privacy issues SCADA and Embedded systems security
Secure Software Development, Architecture and Outsourcing Security for Future Networks
Security in Cloud Computing Security in Social Networks
Security of Web-based Applications and Services Security protocols
VOIP, Wireless and Telecommunications Network Security
Digital Forensic
Anti-Forensics and Anti-Anti-Forensics Techniques Cyber-Crimes
Data leakage, Data protection and Database forensics Evidentiary Aspects of Digital Forensics
Executable Content and Content Filtering File System and Memory Analysis Multimedia Forensic
Forensics of Virtual and Cloud Environments Information Hiding
Investigation of Insider Attacks Large-Scale Investigations
Malware forensics and Anti-Malware techniques Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics
New threats and Non-Traditional approaches
Information Assurance and Security Management
Business Continuity & Disaster Recovery Planning Corporate Governance
Critical Infrastructure Protection Decidability and Complexity
Digital Rights Management and Intellectual Property Protection Economics of Security
Fraud Management Identity Management
Laws and Regulations Security Policies and Trust Management
Threats, Vulnerabilities, and Risk Management
Cyber warfare and Physical Security
Surveillance Systems Biometrics Applications
Cyber Warfare Trends and Approaches Electronic Passports, National ID and Smart Card Security
Social engineering Template Protection and Liveliness detection
Authentication and Access Control Systems Biometrics standards and standardization
New theories and algorithms in biometrics
The conference uses double-blind review by at least two reviewers, which means that both the reviewer and author identities are concealed from the reviewers, and vice versa, throughout the review process. To facilitate this, authors need to ensure that their manuscripts are prepared in a way that does not give away their identity.
All the registered papers will be submitted to IEEE for potential inclusion to IEEE Xplore as well as other Abstracting and Indexing (A&I) databases. In addition, BEST registered papers will be published in one of the following special issues provided that the author do major improvements and extension within the time frame that will be set by the conference and his/her paper is approved by the chief editor。
Cyber Security
Distributed and Pervasive Systems Security Enterprise Systems Security
Formal Methods Application in Security Hardware-Based security
Incident Handling and Penetration Testing Legal Issues
Multimedia and Document Security Operating Systems and Database Security
Privacy issues SCADA and Embedded systems security
Secure Software Development, Architecture and Outsourcing Security for Future Networks
Security in Cloud Computing Security in Social Networks
Security of Web-based Applications and Services Security protocols
VOIP, Wireless and Telecommunications Network Security
Digital Forensic
Anti-Forensics and Anti-Anti-Forensics Techniques Cyber-Crimes
Data leakage, Data protection and Database forensics Evidentiary Aspects of Digital Forensics
Executable Content and Content Filtering File System and Memory Analysis Multimedia Forensic
Forensics of Virtual and Cloud Environments Information Hiding
Investigation of Insider Attacks Large-Scale Investigations
Malware forensics and Anti-Malware techniques Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics
New threats and Non-Traditional approaches
Information Assurance and Security Management
Business Continuity & Disaster Recovery Planning Corporate Governance
Critical Infrastructure Protection Decidability and Complexity
Digital Rights Management and Intellectual Property Protection Economics of Security
Fraud Management Identity Management
Laws and Regulations Security Policies and Trust Management
Threats, Vulnerabilities, and Risk Management
Cyber warfare and Physical Security
Surveillance Systems Biometrics Applications
Cyber Warfare Trends and Approaches Electronic Passports, National ID and Smart Card Security
Social engineering Template Protection and Liveliness detection
Authentication and Access Control Systems Biometrics standards and standardization
New theories and algorithms in biometrics
The conference uses double-blind review by at least two reviewers, which means that both the reviewer and author identities are concealed from the reviewers, and vice versa, throughout the review process. To facilitate this, authors need to ensure that their manuscripts are prepared in a way that does not give away their identity.
All the registered papers will be submitted to IEEE for potential inclusion to IEEE Xplore as well as other Abstracting and Indexing (A&I) databases. In addition, BEST registered papers will be published in one of the following special issues provided that the author do major improvements and extension within the time frame that will be set by the conference and his/her paper is approved by the chief editor。
最后更新 Xin Yao 在 2016-06-23
相关会议
| CCF | CORE | QUALIS | 简称 | 全称 | 截稿日期 | 通知日期 | 会议日期 |
|---|---|---|---|---|---|---|---|
| b | a | CSF | IEEE Computer Security Foundations Symposium | 2026-01-29 | 2026-04-01 | 2026-07-26 | |
| c | IFIP WG 11.9 | IFIP WG 11.9 International Conference on Digital Forensics | 2025-09-30 | 2025-10-30 | 2026-01-05 | ||
| b | a | a1 | ACSAC | Annual Computer Security Applications Conference | 2025-05-30 | 2025-09-03 | 2025-12-09 |
| c | c | NSPW | New Security Paradigms Workshop | 2025-04-25 | 2025-05-30 | 2025-08-24 | |
| b | TrustBus | International Conference on Trust, Privacy, and Security in Digital Business | 2022-03-07 | 2022-05-10 | 2022-08-22 | ||
| b | b1 | TPDL | International Conference on Theory and Practice of Digital Libraries | 2020-04-03 | 2020-05-15 | 2020-08-25 | |
| c | DFRWS | Digital Forensics Research Conference | 2017-10-15 | 2017-12-18 | 2018-03-21 | ||
| b4 | IMF | International Conference on IT Security Incident Management and IT Forensics | 2016-10-02 | 2016-12-18 | 2017-03-21 | ||
| c | b3 | ICIDS | International Conference on Interactive Digital Storytelling | 2015-07-06 | 2015-08-21 | 2015-11-30 | |
| c | ICIS' | International Conference on Interaction Sciences: IT, Human and Digital Content | 2013-08-07 | 2013-09-07 | 2013-10-08 |
相关期刊
| CCF | 全称 | 影响因子 | 出版商 | ISSN |
|---|---|---|---|---|
| Applied Surface Science | 6.9 | Elsevier | 0169-4332 | |
| b | Computers & Security | 5.4 | Elsevier | 0167-4048 |
| c | Journal of Information Security and Applications | 3.7 | Elsevier | 2214-2126 |
| c | Journal of Cybersecurity | 3.2 | Oxford University Press | 2057-2093 |
| Computer Law & Security Review | 3.2 | Elsevier | 0267-3649 | |
| c | Computer Law and Security Review | 3.2 | Elsevier | 0267-3649 |
| Calculus of Variations and Partial Differential Equations | 2.0 | Springer | 0944-2669 | |
| Circuits, Systems, and Signal Processing | 2.0 | Springer | 0278-081X | |
| c | International Journal of Pattern Recognition and Artificial Intelligence | 1.1 | World Scientific | 0218-0014 |
| IET Computers and Digital Techniques | 0.484 | IET | 1751-8601 |