| |||||||||||||||
ICGS3 2019 : 12th International Conference on Global Security, Safety & SustainabilityConference Series : International Conference on Global Security, Safety, and Sustainability | |||||||||||||||
Link: http://london.northumbria.ac.uk/event/icgs3-19/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
12th ICGS3-19 is an IEEE technical sponsored event with Conference Proceedings to be published by IEEE Xplore
Following the successful 11th ICGS3, we have much pleasure in announcing the 12th International conference on Global Security, Safety & Sustainability. In an era of unprecedented volatile, political and economic environments across the world, computer based systems face ever-increasing challenges, disputes and responsibilities. Whilst the Internet has created a global platform for the exchange of ideas, goods and services – it has also, however, created boundless opportunities for cyber-crime. Therefore, the role of information systems in facilitating secure economic transactions and maintaining steady and reliable sources of information that support politically stable and sustainable socio-economic systems is becoming increasingly critical. As the number of large organizations and individuals using the Internet and its satellite mobile technologies increases, they are increasingly vulnerable to cyber-crime. It is therefore paramount that the security industry raises its game to combat these threats. This is an issue of global importance as law enforcement agencies the world over are struggling to cope. This Annual International Conference is an established platform in which security, safety and sustainability issues can be examined from several global perspectives through dialogue between academics, students, government representatives, chief executives, security professionals, and research scientists from the United Kingdom and from around the globe. The three-day conference will focus on the challenges of complexity, the rapid pace of change and risk/opportunity issues associated with the 21st century lifestyle, systems and infrastructures. The list of topics includes (but are not limited to): Systems Security, Safety and Sustainability Cyber Infrastructure Protection Internet of Things SCADA and Ransomware Transport Security Cyber Warfare Modelling Approaches, Security and Systems Assurance Frameworks Safety & Security in System of Systems Trusted Systems and Devices Geo-information and Geo-spatial Intelligence Security Systems (GIS) Networks Security Digital Twins Blockchain Biometric Recognition Systems and Biometry Information Exchange Security Networks Privacy Security Safety and Security Evaluation, Assessment and Certification Large Scale Systems Protection and Management of Major Events Smart Cities The Future of Digital Forensics Cloud Forensics Computer Forensics and Anti-Forensics Mobile and Handheld Device Forensics Chain of Custody, Recovery, Storage and Preservation Tools and Applications Incident Response and Investigation Standards and Procedures Steganography E-discovery and Data Analysis Network Traffic Analysis Case Studies and Best Practices Legal Issues Related to Cloud Computing Legal and Ethical Aspects of Digital Forensics Computer Forensic Tools Used in Investigating a Crime Scene, Data Analysis and Root Cause Forensics and Assistance of Hacked Environment, Tools (Types) Used in Investigating a Crime Scene, Data Analysis and Root Cause Technical Methods in Collecting Volatile and Non-Volatile Information Legislation and Evidence for Prosecution Information Systems Security Management Information Systems Information Security Management Systems Risk Management Cyber Risk Management Cyber Resilience Safety, Reliability and Risk Analysis Strategic Approaches to Security Fraud Management IT Audit, Governance and Security Compliance and Certification Risk Assessment, Methodologies and Tools Social Media Control, Risk and Governance Security and Privacy Architecture and Design For Software and Systems Methods and Models for Security and Privacy Support Tools For Modelling Security and Privacy Methods and Tools For Modelling Trust Human Aspects in Security and Privacy Cyber Criminology Cyber-Criminology, Criminal Data Mining, Threat Analysis and Prediction Crime and Social Media Victimisation Cyber Criminology, Theories and Models, Psychology of the Cyber Criminals Cybercrime Policing Cybercrime Justice Models The role of Big data Dark Web/ Darknet Jurisdiction Hacking and Cracking Cyber Bullying, Stoking Etc. Cybercrime Punishment E-Identification (e.g. Evolving EU Legal Framework, Identity Related Rights) Augmented Reality Cyber Intelligence and Operation Cyber-Crime Detection and Prevention Crime Information Intelligence Network Cyber Threat Intelligence Cyber War Open Source Intelligence Law Enforcement Agencies Social Media Attack Pattern Recognition Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) Support Systems Cloud Computing Security Enterprise Architecture Security Security in Mobile Operating Environments Enterprise Architecture Security Mass Interception Communication Solutions Content Digitisation Security and Mass Data Storage Banks protection Counterintelligence Management Remote System Intelligence and Counter Measures Access Controls Detection and Remediation of Security Breaches Business Continuity Planning Disaster Recovery Planning Black, White and Grey Hat Hacking Honeypots Rootkits Vulnerability Assessments – Lessons Learned on Current Operating system Vulnerabilities and Loopholes War Driving Wi-Fi Vulnerabilities The Past, Present and Future of Computer Hacking Technical Measures for Self-Protection Investigative, Mitigation Methods and Techniques to Apprehend an Offender |
|