| |||||||||||||||||
SAD 2013 : Secure Abu Dhabi 2013 | |||||||||||||||||
Link: http://www.adpoly.ac.ae/SAD2013/default.html | |||||||||||||||||
| |||||||||||||||||
Call For Papers | |||||||||||||||||
Practioners & Solution Providers Track
As economies, society and businesses become ever more dependent on the Internet, understanding not only the current threat landscape, but also the potential impact of developing threats is crucial to security and ultimately business management. A review of current headlines suggests attackers continue to range from the idealistic hacker to the more sophisticated criminal or state-sponsored groups, while the cyber world continues to evolve as a preferred platform for social protest. Technical Abstracts Track Researchers are encouraged to submit one to two pages abstracts of their research findings in all major areas of information security, which include, but not limited to: Critical Infrastructure Protection Web Application Security Security Software Design & Implementation Cyber Security Wireless & Mobile Security Firewall & Intrusion Analysis Applied Cryptography & Forensics Access control & Authentication Identity Management Incident Analysis Physical Security & Biometric System Security Assessment System Security Administration Database Security Cloud security Information Security Education Privacy protection and Trust Management Student Video & Poster Contest The conference will embody a contest in search of short information security awareness videos and posters developed by students. The contest seeks creative, topical, and effective videos (two minutes or less) and posters that focus attention on information security problems and how best to handle them. Winners will receive prizes, and their videos and posters will be featured on international website. The winning videos and posters will be announced during the closing session of the conference. |
|