InfoSec2015

The Second International Conference on Information Security and Cyber Forensics (InfoSec2015)

Cape Town (South Africa), 15-17 November 2015


Key deadlines
Conference starts:
2015-11-15
Registration by:
2015-11-05
Paper Submission for Revision by:
2015-10-15
Paper Final Submission by:
2015-11-05
Website

Visit the conference website

Conference Description

All registered papers will be submitted to IEEE for potential inclusion to IEEE Xplore

====================================================
Dates

Submission Deadline Open from now until October 15, 2015
Notification of Acceptance 2-3 weeks from the submission date
Camera Ready Submission Open from now until November 05, 2015
Registration Deadline Open from now until November 05, 2015
Conference Dates November 15-17, 2015

====================================================

The conference welcomes papers on the following (but not limited to) research topics:

***Cyber Security***
-Distributed and Pervasive Systems Security
-Enterprise Systems Security
-Formal Methods Application in Security
-Hardware-Based security
-Incident Handling and Penetration Testing
-Legal Issues
-Multimedia and Document Security
-Operating Systems and Database Security
-Privacy issues
-SCADA and Embedded systems security
-Secure Software Development, Architecture and Outsourcing
-Security for Future Networks
-Security in Cloud Computing
-Security in Social Networks
-Security of Web-based Applications and Services
-Security protocols
-VOIP, Wireless and Telecommunications
-Network Security

***Digital Forensic***
-Anti-Forensics and Anti-Forensics Techniques
-Cyber-Crimes
-Data leakage, Data protection and Database forensics
-Evidentiary Aspects of Digital Forensics
-Executable Content and Content Filtering
-File System and Memory Analysis Multimedia Forensic
-Forensics of Virtual and Cloud Environments
-Information Hiding
-Investigation of Insider Attacks
-Large-Scale Investigations
-Malware forensics and Anti-Malware techniques
-Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics
-New threats and Non-Traditional approaches

***Information Assurance and Security Management***
-Business Continuity & Disaster Recovery Planning
-Corporate Governance
-Critical Infrastructure Protection
-Decidability and Complexity
-Digital Rights Management and Intellectual Property Protection Economics of Security
-Fraud Management
-Identity Management
-Laws and Regulations
-Security Policies and Trust Management
-Threats, Vulnerabilities, and Risk Management

***Cyber Peacefare and Physical Security***
-Authentication and Access Control Systems
-Biometrics Applications
-Biometrics standards and standardization
-Cyber Peacefare Trends and Approaches
-Electronic Passports, National ID and Smart Card Security
-New theories and algorithms in biometrics
-Social engineering
-Surveillance Systems
-Template Protection and Liveliness detection

Conference creator: Hazel

Actions menu

Conference Location

image placeholder

Cape Town (South Africa)

Tags for this conference

Comments

No comments yet!

You must register or sign in to post a comment.