| |||||||||||
InfoSec 2015 : The Second International Conference on Information Security and Cyber Forensics (InfoSec2015) | |||||||||||
Link: http://sdiwc.net/conferences/infosec2015/ | |||||||||||
| |||||||||||
Call For Papers | |||||||||||
The Second International Conference on Information Security and Cyber Forensics (InfoSec2015)
November 15-17, 2015 » Cape Town, South Africa University of Cape Town http://sdiwc.net/conferences/infosec2015/ infosec15@sdiwc.net All registered papers will be submitted to IEEE for potential inclusion to IEEE Xplore ==================================================== Dates Submission Deadline Open from now until October 15, 2015 Notification of Acceptance 2-3 weeks from the submission date Camera Ready Submission Open from now until November 05, 2015 Registration Deadline Open from now until November 05, 2015 Conference Dates November 15-17, 2015 ==================================================== The conference welcomes papers on the following (but not limited to) research topics: ***Cyber Security*** -Distributed and Pervasive Systems Security -Enterprise Systems Security -Formal Methods Application in Security -Hardware-Based security -Incident Handling and Penetration Testing -Legal Issues -Multimedia and Document Security -Operating Systems and Database Security -Privacy issues -SCADA and Embedded systems security -Secure Software Development, Architecture and Outsourcing -Security for Future Networks -Security in Cloud Computing -Security in Social Networks -Security of Web-based Applications and Services -Security protocols -VOIP, Wireless and Telecommunications -Network Security ***Digital Forensic*** -Anti-Forensics and Anti-Forensics Techniques -Cyber-Crimes -Data leakage, Data protection and Database forensics -Evidentiary Aspects of Digital Forensics -Executable Content and Content Filtering -File System and Memory Analysis Multimedia Forensic -Forensics of Virtual and Cloud Environments -Information Hiding -Investigation of Insider Attacks -Large-Scale Investigations -Malware forensics and Anti-Malware techniques -Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics -New threats and Non-Traditional approaches ***Information Assurance and Security Management*** -Business Continuity & Disaster Recovery Planning -Corporate Governance -Critical Infrastructure Protection -Decidability and Complexity -Digital Rights Management and Intellectual Property Protection Economics of Security -Fraud Management -Identity Management -Laws and Regulations -Security Policies and Trust Management -Threats, Vulnerabilities, and Risk Management ***Cyber Peacefare and Physical Security*** -Authentication and Access Control Systems -Biometrics Applications -Biometrics standards and standardization -Cyber Peacefare Trends and Approaches -Electronic Passports, National ID and Smart Card Security -New theories and algorithms in biometrics -Social engineering -Surveillance Systems -Template Protection and Liveliness detection |
|