| |||||||||||||||
CyberSec 2015 : The Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic | |||||||||||||||
Link: http://sdiwc.net/conferences/cybersec2015/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
You are invited to participate in The Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic (CyberSec2015) that will be held at Sampoerna University, Jakarta, Indonesia on October 29-31, 2015. The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures.
The conference welcomes papers on the following (but not limited to) research topics: Cyber Security Distributed and Pervasive Systems Security Enterprise Systems Security Formal Methods Application in Security Hardware-Based security Incident Handling and Penetration Testing Legal Issues Multimedia and Document Security Operating Systems and Database Security Privacy issues SCADA and Embedded systems security Secure Software Development, Architecture and Outsourcing Security for Future Networks Security in Cloud Computing Security in Social Networks Security of Web-based Applications and Services Security protocols VOIP, Wireless and Telecommunications Network Security Digital Forensic Anti-Forensics and Anti-Anti-Forensics Techniques Cyber-Crimes Data leakage, Data protection and Database forensics Evidentiary Aspects of Digital Forensics Executable Content and Content Filtering File System and Memory Analysis Multimedia Forensic Forensics of Virtual and Cloud Environments Information Hiding Investigation of Insider Attacks Large-Scale Investigations Malware forensics and Anti-Malware techniques Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics New threats and Non-Traditional approaches Information Assurance and Security Management Business Continuity & Disaster Recovery Planning Corporate Governance Critical Infrastructure Protection Decidability and Complexity Digital Rights Management and Intellectual Property Protection Economics of Security Fraud Management Identity Management Laws and Regulations Security Policies and Trust Management Threats, Vulnerabilities, and Risk Management Cyber Peacefare and Physical Security Authentication and Access Control Systems Biometrics Applications Biometrics standards and standardization Cyber Peacefare Trends and Approaches Electronic Passports, National ID and Smart Card Security New theories and algorithms in biometrics Social engineering Surveillance Systems Template Protection and Liveliness detection All registered papers will be submitted to IEEE Xplore through CPS, and in the proceedings of the conference All submitted papers will be reviewed by a minimum of two reviewers. The published proceedings will be indexed in ResearchBib, in addition, they will be reviewed for POSSIBLE inclusion within the INSPEC, EI, DBLP, Microsoft Academic Research, ResearchGate, and Google Scholar Databases. |
|