| |||||||||||
ISDF 2014 : The International Conference in Information, Security, and Digital Forensics (ISDF2014)Conference Series : Information Security and Digital Forensics | |||||||||||
Link: http://sdiwc.net/conferences/isdf2014/ | |||||||||||
| |||||||||||
Call For Papers | |||||||||||
The proposed conference on the above theme The International Conference in Information, Security, and Digital Forensics (ISDF2014) will be held at Metropolitan College on December 12-14, 2014 which aims to enable researchers build connections between different digital applications. The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures.
The conference welcomes papers on the following (but not limited to) research topics: Cyber Security - Distributed and Pervasive System Security - Formal Methods Application in Security - Incident Handling and Penetration Testing - Multimedia and Document Security - Privacy Issues - Secure Software Development, Architecture and Outsourcing - Security in Cloud Computing - Security of Web-based Applications and Services - VOIP, Wireless and Telecommunications Network Security - Enterprise System Security - Hardware-Based Security - Legal issues - Operating System and Database - SCADA and Embedded Systems - Security for Future Networks - Security in Social Networks Digital Forensics - Anti-Forensics and Anti-Forensics Techniques - Data leakage, Data protection and Database forensics - Executable Content and Content Filtering - Forensics of Virtual and Cloud Environments - Investigation of Insider Attacks - Malware forensics, and Anti-Malware Techniques - New Treats and Non-Traditional approaches - Cyber-Crimes - Evidentiary Aspects of Digital Forensics - File System and Memory Analysis Multimedia Forensics - Information Hiding - Large Scale Investigations - Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics Information Assurance and Security Management - Business Continuity & Disaster Recovery Planning - Critical Infrastructure Protection - Digital Rights Management and Intellectual Property Protection - Fraud Management - Laws and Regulations - Corporate Governance - Decidability and Complexity - Economics of Security - Treats, Vulnerabilities, and Risk Management - Identity Management - Security Policies and Trust Management ---------------------- Important Dates: Submission Deadline: October 12, 2014 Notification of Acceptance: November 12, 2014 or 4 weeks after the submission date Camera Ready Submission: December 02, 2014 Registration Date: December 02, 2014. It is recommended to do it few days before Conference Dates: December 12-14, 2014 ------------------------- All registered papers will be included in SDIWC Digital Library, and in the proceedings of the conference. All submitted papers will be reviewed by a minimum of two reviewers. The published proceedings will be indexed in ResearchBib, in addition, they will be reviewed for possible inclusion within the INSPEC, EI, DBLP, Microsoft Academic Research, ResearchGate, and Google Scholar Databases. In addition, BEST registered papers will be published in one of the following special issues provided that the author do major improvements and extension within the time frame that will be set by the conference and his/her paper is approved by the chief editor: Paper Submission: http://sdiwc.net/conferences/isdf2014/openconf/openconf.php Conference Web Site: http://sdiwc.net/conferences/isdf14/ |
|