[agents] Call for Papers:: InfoSec2015
Hazel Ann
hazel.sdiwc at gmail.com
Thu Apr 23 07:25:57 EDT 2015
The Second International Conference on Information Security and Cyber
Forensics (InfoSec2015)
November 15-17, 2015 » Cape Town, South Africa
University of Cape Town
http://sdiwc.net/conferences/infosec2015/
infosec15 at sdiwc.net
All registered papers will be submitted to IEEE for potential inclusion to
IEEE Xplore
====================================================
Dates
Submission Deadline Open from now until October 15, 2015
Notification of Acceptance 2-3 weeks from the submission date
Camera Ready Submission Open from now until November 05, 2015
Registration Deadline Open from now until November 05, 2015
Conference Dates November 15-17, 2015
====================================================
The conference welcomes papers on the following (but not limited to)
research topics:
***Cyber Security***
-Distributed and Pervasive Systems Security
-Enterprise Systems Security
-Formal Methods Application in Security
-Hardware-Based security
-Incident Handling and Penetration Testing
-Legal Issues
-Multimedia and Document Security
-Operating Systems and Database Security
-Privacy issues
-SCADA and Embedded systems security
-Secure Software Development, Architecture and Outsourcing
-Security for Future Networks
-Security in Cloud Computing
-Security in Social Networks
-Security of Web-based Applications and Services
-Security protocols
-VOIP, Wireless and Telecommunications
-Network Security
***Digital Forensic***
-Anti-Forensics and Anti-Forensics Techniques
-Cyber-Crimes
-Data leakage, Data protection and Database forensics
-Evidentiary Aspects of Digital Forensics
-Executable Content and Content Filtering
-File System and Memory Analysis Multimedia Forensic
-Forensics of Virtual and Cloud Environments
-Information Hiding
-Investigation of Insider Attacks
-Large-Scale Investigations
-Malware forensics and Anti-Malware techniques
-Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device
Forensics
-New threats and Non-Traditional approaches
***Information Assurance and Security Management***
-Business Continuity & Disaster Recovery Planning
-Corporate Governance
-Critical Infrastructure Protection
-Decidability and Complexity
-Digital Rights Management and Intellectual Property Protection Economics
of Security
-Fraud Management
-Identity Management
-Laws and Regulations
-Security Policies and Trust Management
-Threats, Vulnerabilities, and Risk Management
***Cyber Peacefare and Physical Security***
-Authentication and Access Control Systems
-Biometrics Applications
-Biometrics standards and standardization
-Cyber Peacefare Trends and Approaches
-Electronic Passports, National ID and Smart Card Security
-New theories and algorithms in biometrics
-Social engineering
-Surveillance Systems
-Template Protection and Liveliness detection
More information about the agents
mailing list