posted by user: suenugus || 13607 views || tracked by 20 users: [display]

ECCWS 2016 : 15th European Conference on Cyber Warfare and Security ECCWS-2016

FacebookTwitterLinkedInGoogle

Link: http://academic-conferences.org/eccws/eccws2016/eccws16-home.htm
 
When Jul 7, 2016 - Jul 8, 2016
Where Bundeswehr University, Munich, Germany
Abstract Registration Due Jun 16, 2016
Submission Deadline Dec 3, 2015
Notification Due Dec 10, 2015
Final Version Due May 12, 2016
Categories    adademic   cyber warfare   security   education
 

Call For Papers

Topics for submissions may include, but are not limited to:

Cyber conflict
Patriotic hackers as an extension of state power
Potential military uses of cyber attacks
Case studies of cyber attacks in modern conflicts
Theoretical cyber conflict scenarios
Cyber conflict frameworks
Human Factors
Cyber-terrorism
Principles of i-Warfare
Physical security
Counter-terrorism security policies, procedures and legislation
Information warfare policy
SMEs - Small-to-medium Size Enterprises Security model
Critical national infrastructure protection
Information warfare theory
Security implications of “virtualised machines and services
e-Health systems as part of a national critical infrastructure
Information warfare techniques
The Resilience and Susceptibility of "Service Oriented Architectures" (SOAs)
Information security governance and management
Information warfare and security education
Hacking and cracking
Biometrics
e-Intelligence/counter-intelligence
Information Assurance
Cryptography : classical and malicious
Networked Centric War
Malwares and antimalwares technologies
Wireless Treats
Reflector attacks
UCE
Threat Agents
Art of war
Cyber-fraud
Particle swarm data mining
Computers-as-weapons
Risk Management
Virtual Intrusion Detection
Electro-magnetic pulse weapons
Collaborative decision making
National security policy
Information operations
Security policy
Acute situational awareness
Strategic leadership
Firewalls
Aircraft Environment
Influence campaigns
Phishing and spam
Digital forensics
Psychological warfare
Current Anti Virus Technologies
Network anomaly detection models
PSYOP - PSYOPS
Mobile Virus
Corporate defence mechanisms
Perception management
RFID Virus
Security for small to medium enterprises
Infra-structure warfare
SQL Infections
Information, computer and network security
Military Culture Topography
Data Loss
Security of the virtual worlds
Modern conflict
Data Integration
SIMAD what can/should be done to protect against this threat?
Military approaches
ISO 27001
Unidirectional linguistic steganography
Compromise path analysis
Gaussian empirical rule
IT auditing and compliance
Defence steganography
Natural computing
Information Security Architecture
Data and service integration
Random numbers approximation sequence
Artificial immune recognition system security infrastructure
Legal issues concerned with information warfare and e-Crime
Traffic classification
Public Key Infrastructure
Non-traditional enemies
Subliminal Channel
Network Address Translator
Ethical, political and social issues relating to information warfare
Machine Learning Risk
Mathematical-filtering
Association of Religions with Warfare
Context free grammers
SecureMDA
Image-processing
New trends
Information Security Economy
Other relevant topics

Related Resources

ECCWS 2024   23rd European Conference on Cyber Warfare and Security
EduTeach 2025   9th Canadian Conference on Advances in Education, Teaching & Technology 2025
ECCWS 2025   24th European Conference on Cyber Warfare and Security
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
BIBC 2024   5th International Conference on Big Data, IOT and Blockchain
EEI 2024   10th International Conference on Emerging Trends in Electrical, Electronics & Instrumentation Engineering
ICCWS 2025   20th International Conference on Cyber Warfare and Security
AP-EduTeach 2025   7th Asia-Pacific Conference on Education, Teaching & Technology 2025
IEEE CSR 2025   2025 IEEE International Conference on Cyber Security and Resilience
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 2