posted by organizer: hazel || 278 views || tracked by 1 users: [display]

InfoSec 2015 : The Second International Conference on Information Security and Cyber Forensics (InfoSec2015)

FacebookTwitterLinkedInGoogle

Link: http://sdiwc.net/conferences/infosec2015/
 
When Nov 15, 2015 - Nov 17, 2015
Where Cape Town, South Africa
Submission Deadline Oct 15, 2015
Categories    computer science   technology
 

Call For Papers

The Second International Conference on Information Security and Cyber Forensics (InfoSec2015)

November 15-17, 2015 ยป Cape Town, South Africa

University of Cape Town

http://sdiwc.net/conferences/infosec2015/

infosec15@sdiwc.net

All registered papers will be submitted to IEEE for potential inclusion to IEEE Xplore

====================================================
Dates

Submission Deadline Open from now until October 15, 2015
Notification of Acceptance 2-3 weeks from the submission date
Camera Ready Submission Open from now until November 05, 2015
Registration Deadline Open from now until November 05, 2015
Conference Dates November 15-17, 2015

====================================================

The conference welcomes papers on the following (but not limited to) research topics:

***Cyber Security***
-Distributed and Pervasive Systems Security
-Enterprise Systems Security
-Formal Methods Application in Security
-Hardware-Based security
-Incident Handling and Penetration Testing
-Legal Issues
-Multimedia and Document Security
-Operating Systems and Database Security
-Privacy issues
-SCADA and Embedded systems security
-Secure Software Development, Architecture and Outsourcing
-Security for Future Networks
-Security in Cloud Computing
-Security in Social Networks
-Security of Web-based Applications and Services
-Security protocols
-VOIP, Wireless and Telecommunications
-Network Security

***Digital Forensic***
-Anti-Forensics and Anti-Forensics Techniques
-Cyber-Crimes
-Data leakage, Data protection and Database forensics
-Evidentiary Aspects of Digital Forensics
-Executable Content and Content Filtering
-File System and Memory Analysis Multimedia Forensic
-Forensics of Virtual and Cloud Environments
-Information Hiding
-Investigation of Insider Attacks
-Large-Scale Investigations
-Malware forensics and Anti-Malware techniques
-Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics
-New threats and Non-Traditional approaches

***Information Assurance and Security Management***
-Business Continuity & Disaster Recovery Planning
-Corporate Governance
-Critical Infrastructure Protection
-Decidability and Complexity
-Digital Rights Management and Intellectual Property Protection Economics of Security
-Fraud Management
-Identity Management
-Laws and Regulations
-Security Policies and Trust Management
-Threats, Vulnerabilities, and Risk Management

***Cyber Peacefare and Physical Security***
-Authentication and Access Control Systems
-Biometrics Applications
-Biometrics standards and standardization
-Cyber Peacefare Trends and Approaches
-Electronic Passports, National ID and Smart Card Security
-New theories and algorithms in biometrics
-Social engineering
-Surveillance Systems
-Template Protection and Liveliness detection

Related Resources

ECCWS 2024   23rd European Conference on Cyber Warfare and Security
IEEE-Ei/Scopus-ACEPE 2024   2024 IEEE Asia Conference on Advances in Electrical and Power Engineering (ACEPE 2024) -Ei Compendex
ICONSEC 2024   3rd International Conference On Cyber Security and Digital Forensics
GreeNet Symposium - SGNC 2024   15th Symposium on Green Networking and Computing (SGNC 2024)
InCIT 2024   The 8th International Conference on Information Technology
IEEE-Ei/Scopus-SGGEA 2024   2024 Asia Conference on Smart Grid, Green Energy and Applications (SGGEA 2024) -EI Compendex
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IEEE ICA 2022   The 6th IEEE International Conference on Agents
LAJC 2024   Latin-American Journal of Computing
CST 2024   11th International Conference on Advances in Computer Science and Information Technology