You are invited to participate in The Fifth International Conference on Cyber Security, Cyber Welfare and Digital Forensic (CyberSec2017) that will be held in Addis Ababa, Ethiopia on April 22-24, 2017. The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures.
| The conference welcomes papers on the following (but not limited to) research topics: | |
|---|---|
| Cyber Security | |
| # Distributed and Pervasive Systems Security | # Enterprise Systems Security |
| # Formal Methods Application in Security | # Hardware-Based security |
| # Incident Handling and Penetration Testing | # Legal Issues |
| # Multimedia and Document Security | # Operating Systems and Database Security |
| # Privacy issues | # SCADA and Embedded systems security |
| # Secure Software Development, Architecture and Outsourcing | # Security for Future Networks |
| # Security in Cloud Computing | # Security in Social Networks |
| # Security of Web-based Applications and Services | # Security protocols |
| # VOIP, Wireless and Telecommunications Network Security | |
| Digital Forensic | |
| # Anti-Forensics and Anti-Anti-Forensics Techniques | # Cyber-Crimes |
| # Data leakage, Data protection and Database forensics | # Evidentiary Aspects of Digital Forensics |
| # Executable Content and Content Filtering | # File System and Memory Analysis Multimedia Forensic |
| # Forensics of Virtual and Cloud Environments | # Information Hiding |
| # Investigation of Insider Attacks | # Large-Scale Investigations |
| # Malware forensics and Anti-Malware techniques | #Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics |
| # New threats and Non-Traditional approaches | |
| Information Assurance and Security Management | |
| # Business Continuity & Disaster Recovery Planning | # Corporate Governance |
| # Critical Infrastructure Protection | # Decidability and Complexity |
| # Digital Rights Management and Intellectual Property Protection | # Economics of Security |
| # Fraud Management | # Identity Management |
| # Laws and Regulations | # Security Policies and Trust Management |
| # Threats, Vulnerabilities, and Risk Management | |
| Cyber Peacefare and Physical Security | |
| # Authentication and Access Control Systems | # Biometrics Applications |
| # Biometrics standards and standardization | # Cyber Peacefare Trends and Approaches |
| # Electronic Passports, National ID and Smart Card Security | # New theories and algorithms in biometrics |
| # Social engineering | # Surveillance Systems |
| # Template Protection and Liveliness detection | |
User Name : jerish
Posted 26-08-2016 on 09:58:22 AEDT