| |||||||||||||||||
ECCWS 2016 : 15th European Conference on Cyber Warfare and Security ECCWS-2016 | |||||||||||||||||
Link: http://academic-conferences.org/eccws/eccws2016/eccws16-home.htm | |||||||||||||||||
| |||||||||||||||||
Call For Papers | |||||||||||||||||
Topics for submissions may include, but are not limited to:
Cyber conflict Patriotic hackers as an extension of state power Potential military uses of cyber attacks Case studies of cyber attacks in modern conflicts Theoretical cyber conflict scenarios Cyber conflict frameworks Human Factors Cyber-terrorism Principles of i-Warfare Physical security Counter-terrorism security policies, procedures and legislation Information warfare policy SMEs - Small-to-medium Size Enterprises Security model Critical national infrastructure protection Information warfare theory Security implications of “virtualised machines and services e-Health systems as part of a national critical infrastructure Information warfare techniques The Resilience and Susceptibility of "Service Oriented Architectures" (SOAs) Information security governance and management Information warfare and security education Hacking and cracking Biometrics e-Intelligence/counter-intelligence Information Assurance Cryptography : classical and malicious Networked Centric War Malwares and antimalwares technologies Wireless Treats Reflector attacks UCE Threat Agents Art of war Cyber-fraud Particle swarm data mining Computers-as-weapons Risk Management Virtual Intrusion Detection Electro-magnetic pulse weapons Collaborative decision making National security policy Information operations Security policy Acute situational awareness Strategic leadership Firewalls Aircraft Environment Influence campaigns Phishing and spam Digital forensics Psychological warfare Current Anti Virus Technologies Network anomaly detection models PSYOP - PSYOPS Mobile Virus Corporate defence mechanisms Perception management RFID Virus Security for small to medium enterprises Infra-structure warfare SQL Infections Information, computer and network security Military Culture Topography Data Loss Security of the virtual worlds Modern conflict Data Integration SIMAD what can/should be done to protect against this threat? Military approaches ISO 27001 Unidirectional linguistic steganography Compromise path analysis Gaussian empirical rule IT auditing and compliance Defence steganography Natural computing Information Security Architecture Data and service integration Random numbers approximation sequence Artificial immune recognition system security infrastructure Legal issues concerned with information warfare and e-Crime Traffic classification Public Key Infrastructure Non-traditional enemies Subliminal Channel Network Address Translator Ethical, political and social issues relating to information warfare Machine Learning Risk Mathematical-filtering Association of Religions with Warfare Context free grammers SecureMDA Image-processing New trends Information Security Economy Other relevant topics |
|