posted by organizer: kesterphysics || 1020 views || tracked by 2 users: [display]

ISCWS 2019 : International Symposium on Cyber Warfare and Security

FacebookTwitterLinkedInGoogle

Link: http://icsiot.ghsociety.org/
 
When May 29, 2019 - May 31, 2019
Where Ghana Technology University College
Abstract Registration Due May 27, 2019
Submission Deadline May 20, 2019
Notification Due Feb 25, 2019
Final Version Due May 27, 2019
Categories    computing and engineering   applications of computing   computer communications   cyber security
 

Call For Papers

Call for Papers for May 2019: 2019 ISCWS International Symposium on Cyber Warfare and Security


International Symposium on Cyber Warfare and Security ISCWS 2019 is co-located with ICSIoT. Proceedings of full papers of the in IEEE Xplore, IEEE CSDL and other places such as Scopus, titles of papers will be made available in Web of Science linked to ResearcherID and Clarivate Analytics’Publons etc.. The Areas of the symposium are

 Cyber conflict
 Patriotic hackers as an extension of state power
 Potential military uses of cyber attacks
 Case studies of cyber attacks in modern conflicts
 Theoretical cyber conflict scenarios
 Cyber conflict frameworks
 Human Factors
 Cyber-terrorism
 Principles of i-Warfare
 Physical security
 Counter-terrorism security policies, procedures and legislation
 Information warfare policy
 SMEs - Small-to-medium Size Enterprises Security model
 Critical national infrastructure protection
 Information warfare theory
 Security implications of “virtualised machines and services
 e-Health systems as part of a national critical infrastructure
 Information warfare techniques
 The Resilience and Susceptibility of "Service Oriented Architectures" (SOAs)
 Information security governance and management
 Information warfare and security education
 Hacking and cracking
 Biometrics
 e-Intelligence/counter-intelligence
 Information Assurance
 Cryptography : classical and malicious
 Networked Centric War
 Malwares and antimalwares technologies
 Wireless Treats
 Reflector attacks
 Threat Agents
 Art of war
 Cyber-fraud
 Particle swarm data mining
 Computers-as-weapons
 SQL Infections
 Information, computer and network security
 Military Culture Topography
 Data Loss
 Security of the virtual worlds
 Modern conflict
 Data Integration
 SIMAD what can/should be done to protect against this threat?
 Military approaches
 ISO 27001
 Unidirectional linguistic steganography
 Compromise path analysis
 Gaussian empirical rule
 IT auditing and compliance
 Defence steganography
 Natural computing
 Risk Management
 Virtual Intrusion Detection
 Electro-magnetic pulse weapons
 Collaborative decision making
 National security policy
 Information operations
 Security policy
 Acute situational awareness
 Strategic leadership
 Firewalls
 Aircraft Environment
 Influence campaigns
 Phishing and spam
 Digital forensics
 Psychological warfare
 Current Anti Virus Technologies
 Network anomaly detection models
 PSYOP - PSYOPS
 Mobile Virus
 Corporate defence mechanisms
 Perception management
 RFID Virus
 Security for small to medium enterprises
 Infra-structure warfare
 Information Security Architecture
 Data and service integration
 Random numbers approximation sequence
 Artificial immune recognition system security infrastructure
 Legal issues concerned with information warfare and e-Crime
 Traffic classification
 Public Key Infrastructure
 Non-traditional enemies
 Subliminal Channel
 Network Address Translator
 Ethical, political and social issues relating to information warfare
 Machine Learning Risk
 Mathematical-filtering
 Association of Religions with Warfare
 Context free grammers
 SecureMDA
 Image-processing
 New trends
 Information Security Economy
 Other relevant topics
 Etc.

Proceedings of full papers of the International Symposium on Cyber Warfare and Security ISCWS 2019 will be added to 2019 ICSIoT conference full papers and will be submitted to IEEE Xplore, IEEE CSDL and other places such as Scopus, titles of papers will be made available in Web of Science linked to ResearcherID and Clarivate Analytics’ Publons etc.
Registration for Full Paper $300 (Short paper 3-4 pages and Full paper 5-6 pages IEEE Paper template http://icsiot.ghsociety.org/template.doc) This covers presentation and conference participation.
Registration for Abstract Only $100. (Title, Name of Authors, Affiliation, Abstract and Key words) This covers presentation and conference participation.
All selected papers further qualified for future advancement/improvement of work-done for Special Issues in reputable Journals and Book Chapters to be indexed in reputable places such as SCOPUS. Authors will be contacted in the future for submissions to these call for papers. All selected abstracts qualify for such invitations.
Submission link: https://cmt3.research.microsoft.com/CSIoT2019
Website : http://icsiot.ghsociety.org/
Deadline for full papers submission :
20th May 2019
Final notification of acceptance :
25th May 2019
Deadline for registration :
27th May 2019
Deadline for Camera-ready :
28th May 2019
Conference date : 29th to 31th May 2019
Venue : Ghana Technology University College, Accra Ghana.

Related Resources

EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications
CSW 2022   2022 International Workshop on Cyber Security (CSW 2022)
IEEE CCNC STP-CPS 2023   5th International Workshop on Security Trust Privacy for Cyber-Physical Systems (STP-CPS'23) with IEEE CCNC 2023, 8-11 January, Las Vegas, NV, USA
SI on AdCTI 2022   Special Issue on Advances in Cyber Threat Intelligence 2022, Security and Communication Networks, Wiley & Hindawi
SI on ATD&IS II 2023   Special Issue on Advanced Technologies in Data and Information Security II, Applied Sciences, MDPI
CNSA 2023   16th International Conference on Network Security & Applications
FutureCyberspace 2022   The Future of Cyberspace: From Neutrality and Liberation towards Warfare and Control
IEEE Journal of Selected Topics in Appli 2023   Security and Privacy-preserving Solutions on Remote Sensing Data of Smart Cities
SI-KM4LAW 2023   Journal Special Issue KNOWLEDGE MANAGEMENT FOR LAW in Computer Law and Security Review
WorldCIS 2022   World Congress on Internet Security