|   | 
| 
 | |||||||||||||||||
| ISCWS 2019 : International Symposium on Cyber Warfare and Security | |||||||||||||||||
| Link: http://icsiot.ghsociety.org/ | |||||||||||||||||
| 
 | |||||||||||||||||
| Call For Papers | |||||||||||||||||
| 
Call for Papers for May 2019: 2019 ISCWS International Symposium on Cyber Warfare and Security
 International Symposium on Cyber Warfare and Security ISCWS 2019 is co-located with ICSIoT. Proceedings of full papers of the in IEEE Xplore, IEEE CSDL and other places such as Scopus, titles of papers will be made available in Web of Science linked to ResearcherID and Clarivate Analytics’Publons etc.. The Areas of the symposium are  Cyber conflict  Patriotic hackers as an extension of state power  Potential military uses of cyber attacks  Case studies of cyber attacks in modern conflicts  Theoretical cyber conflict scenarios  Cyber conflict frameworks  Human Factors  Cyber-terrorism  Principles of i-Warfare  Physical security  Counter-terrorism security policies, procedures and legislation  Information warfare policy  SMEs - Small-to-medium Size Enterprises Security model  Critical national infrastructure protection  Information warfare theory  Security implications of “virtualised machines and services  e-Health systems as part of a national critical infrastructure  Information warfare techniques  The Resilience and Susceptibility of "Service Oriented Architectures" (SOAs)  Information security governance and management  Information warfare and security education  Hacking and cracking  Biometrics  e-Intelligence/counter-intelligence  Information Assurance  Cryptography : classical and malicious  Networked Centric War  Malwares and antimalwares technologies  Wireless Treats  Reflector attacks  Threat Agents  Art of war  Cyber-fraud  Particle swarm data mining  Computers-as-weapons  SQL Infections  Information, computer and network security  Military Culture Topography  Data Loss  Security of the virtual worlds  Modern conflict  Data Integration  SIMAD what can/should be done to protect against this threat?  Military approaches  ISO 27001  Unidirectional linguistic steganography  Compromise path analysis  Gaussian empirical rule  IT auditing and compliance  Defence steganography  Natural computing  Risk Management  Virtual Intrusion Detection  Electro-magnetic pulse weapons  Collaborative decision making  National security policy  Information operations  Security policy  Acute situational awareness  Strategic leadership  Firewalls  Aircraft Environment  Influence campaigns  Phishing and spam  Digital forensics  Psychological warfare  Current Anti Virus Technologies  Network anomaly detection models  PSYOP - PSYOPS  Mobile Virus  Corporate defence mechanisms  Perception management  RFID Virus  Security for small to medium enterprises  Infra-structure warfare  Information Security Architecture  Data and service integration  Random numbers approximation sequence  Artificial immune recognition system security infrastructure  Legal issues concerned with information warfare and e-Crime  Traffic classification  Public Key Infrastructure  Non-traditional enemies  Subliminal Channel  Network Address Translator  Ethical, political and social issues relating to information warfare  Machine Learning Risk  Mathematical-filtering  Association of Religions with Warfare  Context free grammers  SecureMDA  Image-processing  New trends  Information Security Economy  Other relevant topics  Etc. Proceedings of full papers of the International Symposium on Cyber Warfare and Security ISCWS 2019 will be added to 2019 ICSIoT conference full papers and will be submitted to IEEE Xplore, IEEE CSDL and other places such as Scopus, titles of papers will be made available in Web of Science linked to ResearcherID and Clarivate Analytics’ Publons etc. Registration for Full Paper $300 (Short paper 3-4 pages and Full paper 5-6 pages IEEE Paper template http://icsiot.ghsociety.org/template.doc) This covers presentation and conference participation. Registration for Abstract Only $100. (Title, Name of Authors, Affiliation, Abstract and Key words) This covers presentation and conference participation. All selected papers further qualified for future advancement/improvement of work-done for Special Issues in reputable Journals and Book Chapters to be indexed in reputable places such as SCOPUS. Authors will be contacted in the future for submissions to these call for papers. All selected abstracts qualify for such invitations. Submission link: https://cmt3.research.microsoft.com/CSIoT2019 Website : http://icsiot.ghsociety.org/ Deadline for full papers submission : 20th May 2019 Final notification of acceptance : 25th May 2019 Deadline for registration : 27th May 2019 Deadline for Camera-ready : 28th May 2019 Conference date : 29th to 31th May 2019 Venue : Ghana Technology University College, Accra Ghana. | 
| 
 |