allconferencecfpalerts
   

Event       Publishers
  • Home
  • Login
  • Categories
  • Archive
  • Post Cfp
  • Academic Resources
  • Contact Us

 

15th European Conference on Cyber Warfare and Security (ECCWS 2016)

google+
Views: 761                 

When :  2016-07-07

Where :  Germany

Submission Deadline :  2016-02-04

Categories :   Software Engineering & Security ,  Education      

15th European Conference on Cyber Warfare and Security (ECCWS 2016)

July 7-8, 2016

 Germany

Call For Papers


The 15th European Conference on Cyber Warfare and Security (ECCWS) is an opportunity for academics, practitioners and consultants from Europe and elsewhere who are involved in the study, management, development and implementation of systems and concepts to combat cyber warfare or to improve information systems security to come together and exchange ideas. There are several strong strands of research and interest that are developing in the area including the understanding of threats and risks to information systems, the development of a strong security culture, as well as incident detection and post incident investigation. This conference is continuing to establish itself as a key event for individuals working in the field from around the world.

Topics


  • Cyber conflict
  • Patriotic hackers as an extension of state power
  • Potential military uses of cyber attacks
  • Case studies of cyber attacks in modern conflicts
  • Theoretical cyber conflict scenarios
  • Cyber conflict frameworks
  • Human Factors
  • Cyber-terrorism
  • Principles of i-Warfare
  • Physical security
  • Counter-terrorism security policies, procedures and legislation
  • Information warfare policy
  • SMEs - Small-to-medium Size Enterprises Security model
  • Critical national infrastructure protection
  • Information warfare theory
  • Security implications of “virtualised machines and services
  • e-Health systems as part of a national critical infrastructure
  • Information warfare techniques
  • The Resilience and Susceptibility of "Service Oriented Architectures" (SOAs)
  • Information security governance and management
  • Information warfare and security education
  • Hacking and cracking
  • Biometrics
  • e-Intelligence/counter-intelligence
  • Information Assurance
  • Cryptography : classical  and malicious
  • Networked Centric War
  • Malwares and antimalwares technologies
  • Wireless Treats
  • Reflector attacks
  • UCE
  • Threat Agents
  • Art of war
  • Cyber-fraud
  • Particle swarm data mining
  • Computers-as-weapons
  • Risk Management
  • Virtual Intrusion Detection
  • Electro-magnetic pulse weapons
  • Collaborative decision making
  • National security policy
  • Information operations
  • Security policy
  • Acute situational awareness
  • Strategic leadership
  • Firewalls
  • Aircraft Environment
  • Influence campaigns
  • Phishing and spam
  • Digital forensics
  • Psychological warfare
  • Current Anti Virus Technologies
  • Network anomaly detection models
  • PSYOP - PSYOPS
  • Mobile Virus
  • Corporate defence mechanisms
  • Perception management
  • RFID Virus
  • Security for small to medium enterprises
  • Infra-structure warfare
  • SQL Infections
  • Information, computer and network security
  • Military Culture Topography
  • Data Loss
  • Security of the virtual worlds
  • Modern conflict
  • Data Integration
  • SIMAD what can/should be done to protect against this threat?
  • Military approaches
  • ISO 27001
  • Unidirectional linguistic steganography
  • Compromise path analysis
  • Gaussian empirical rule
  • IT auditing and compliance
  • Defence steganography
  • Natural computing
  • Information Security Architecture
  • Data and service integration
  • Random numbers approximation sequence
  • Artificial immune recognition system security infrastructure
  • Legal issues concerned with information warfare and e-Crime
  • Traffic classification
  • Public Key Infrastructure
  • Non-traditional enemies
  • Subliminal Channel
  • Network Address Translator
  • Ethical, political and social issues relating to information warfare
  • Machine Learning Risk
  • Mathematical-filtering
  • Association of Religions with Warfare
  • Context free grammers
  • SecureMDA
  • Image-processing
  • New trends
  • Information Security Economy
  • Other relevant topics

IMPORTANT DATES

  • Paper submission: February 4,2016
  •                        
  • Notification of acceptance: April 14,2016
  •            
  • Final manuscripts due:June 02, 2016
  •                        
  • Conference dates:July 7-8, 2016
  • User Name : MANI
    Posted on


    Related CFPs

    NCS 2026   18th International Conference on Network and Communications Security
    CBW 2026   7th International Conference on Cloud, Big Data and Web Services (CBW 2026)
    EDUPT 2026   5th International Conference on Education, Pedagogy and Technology (EDUPT 2026)
    EDUR 2026   4th International Conference on Educational Research

    All Rights Reserved @ Call for Papers - Conference & Journals