The Fifth International Conference on Cyber Security, Cyber Welfare and Digital Forensic (CyberSec2017)
Date: Apr 22, 2017 4:00 am – Apr 24, 2017 12:00 pm
Location: St. Mary's University, Addis Ababa, Ethiopia
The Fifth International Conference on Cyber Security, Cyber Welfare and Digital Forensic (CyberSec2017)
April 22-24, 2017
St. Mary's University, Addis Ababa, Ethiopia
URL: http://sdiwc.net/conferences/5th-international-cyber-security-cyber-welfare-digital-forensic/
Email: cybersec17@sdiwc.net
The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures.
The conference welcomes papers on the following (but not limited to) research topics:
- Cyber Security
- Distributed and Pervasive Systems Security
- Formal Methods Application in Security
- Incident Handling and Penetration Testing
- Multimedia and Document Security
- Privacy issues
- Secure Software Development, Architecture and Outsourcing
- Security in Cloud Computing
- Security of Web-based Applications and Services
- VOIP, Wireless and Telecommunications Network Security
- Enterprise Systems Security
- Hardware-Based security
- Legal Issues
- Operating Systems and Database Security
- SCADA and Embedded systems security
- Security for Future Networks
- Security in Social Networks
- Security protocols
- Digital Forensic
- Anti-Forensics and Anti-Anti-Forensics Techniques
- Data leakage, Data protection and Database forensics
- Executable Content and Content Filtering
- Forensics of Virtual and Cloud Environments
- Investigation of Insider Attacks
- Malware forensics and Anti-Malware techniques
- New threats and Non-Traditional approaches
- Cyber-Crimes
- Evidentiary Aspects of Digital Forensics
- File System and Memory Analysis Multimedia Forensic
- Information Hiding
- Large-Scale Investigations
- Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics
- Information Assurance and Security Management
- Business Continuity & Disaster Recovery Planning
- Critical Infrastructure Protection
- Digital Rights Management and Intellectual Property Protection
- Fraud Management
- Laws and Regulations
- Threats, Vulnerabilities, and Risk Management
- Corporate Governance
- Decidability and Complexity
- Economics of Security
- Identity Management
- Security Policies and Trust Management
- Cyber Peacefare and Physical Security
- Authentication and Access Control Systems
- Biometrics standards and standardization
- Electronic Passports, National ID and Smart Card Security
- Social engineering
- Template Protection and Liveliness detection
- Biometrics Applications
- Cyber Peacefare Trends and Approaches
- New theories and algorithms in biometrics
- Surveillance Systems
All registered papers will be published in the Society of Digital Information and Wireless Communication's Digital Library, and in the proceedings of the conference.
The conference uses double-blind review by at least two reviewers, which means that both the reviewer and author identities are concealed from the reviewers, and vice versa, throughout the review process. To facilitate this, authors need to ensure that their manuscripts are prepared in a way that does not give away their identity.
IMPORTANT DATES
Submission Deadline: March 1, 2017
Last Notification of Acceptance: March 15, 2017
Camera Ready Submission: April 6, 2017
Registration Deadline: April 6, 2017
Conference Dates: April 22-24, 2017
Submitted by Mari Glambert
on
The Fifth International Conference on Cyber Security, Cyber Welfare and Digital Forensic (CyberSec2017)
April 22-24, 2017
St. Mary's University, Addis Ababa, Ethiopia
URL: http://sdiwc.net/conferences/5th-international-cyber-security-cyber-welfare-digital-forensic/
Email: cybersec17@sdiwc.net
The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures.
The conference welcomes papers on the following (but not limited to) research topics:
- Cyber Security
- Distributed and Pervasive Systems Security
- Formal Methods Application in Security
- Incident Handling and Penetration Testing
- Multimedia and Document Security
- Privacy issues
- Secure Software Development, Architecture and Outsourcing
- Security in Cloud Computing
- Security of Web-based Applications and Services
- VOIP, Wireless and Telecommunications Network Security
- Enterprise Systems Security
- Hardware-Based security
- Legal Issues
- Operating Systems and Database Security
- SCADA and Embedded systems security
- Security for Future Networks
- Security in Social Networks
- Security protocols
- Digital Forensic
- Anti-Forensics and Anti-Anti-Forensics Techniques
- Data leakage, Data protection and Database forensics
- Executable Content and Content Filtering
- Forensics of Virtual and Cloud Environments
- Investigation of Insider Attacks
- Malware forensics and Anti-Malware techniques
- New threats and Non-Traditional approaches
- Cyber-Crimes
- Evidentiary Aspects of Digital Forensics
- File System and Memory Analysis Multimedia Forensic
- Information Hiding
- Large-Scale Investigations
- Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics
- Information Assurance and Security Management
- Business Continuity & Disaster Recovery Planning
- Critical Infrastructure Protection
- Digital Rights Management and Intellectual Property Protection
- Fraud Management
- Laws and Regulations
- Threats, Vulnerabilities, and Risk Management
- Corporate Governance
- Decidability and Complexity
- Economics of Security
- Identity Management
- Security Policies and Trust Management
- Cyber Peacefare and Physical Security
- Authentication and Access Control Systems
- Biometrics standards and standardization
- Electronic Passports, National ID and Smart Card Security
- Social engineering
- Template Protection and Liveliness detection
- Biometrics Applications
- Cyber Peacefare Trends and Approaches
- New theories and algorithms in biometrics
- Surveillance Systems
All registered papers will be published in the Society of Digital Information and Wireless Communication's Digital Library, and in the proceedings of the conference.
The conference uses double-blind review by at least two reviewers, which means that both the reviewer and author identities are concealed from the reviewers, and vice versa, throughout the review process. To facilitate this, authors need to ensure that their manuscripts are prepared in a way that does not give away their identity.
IMPORTANT DATES
Submission Deadline: March 1, 2017
Last Notification of Acceptance: March 15, 2017
Camera Ready Submission: April 6, 2017
Registration Deadline: April 6, 2017
Conference Dates: April 22-24, 2017