allconferencecfpalerts
   

Event       Publishers
  • Home
  • Login
  • Categories
  • Archive
  • Post Cfp
  • Academic Resources
  • Contact Us

 

Second International Conference on Digital Security and Forensics (DigitalSec 2015)

google+
Views: 759                 

When :  2015-11-15

Where :  South Africa

Submission Deadline :  2015-10-15

Categories :   Software Engineering & Security ,  Networks & Communications      

Second International Conference on Digital Security and Forensics (DigitalSec 2015)

November 15-17, 2015

South Africa

Call For Papers

You are invited to participate in The Second International Conference on Digital Security and Forensics (DigitalSec2015) that will be held in Cape Town, South Africa, on November 15-17, 2015. The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures.

Topics

    Distributed and Pervasive Systems Security Enterprise Systems Security
    Formal Methods Application in Security Hardware-Based security
    Incident Handling and Penetration Testing Legal Issues
    Multimedia and Document Security Operating Systems and Database Security
    Privacy issues Secure Software Development, Architecture and Outsourcing
    Security for Future Networks Security in Cloud Computing
    Security in Social Networks Security of Web-based Applications and Services
    Security protocols VOIP, Wireless and Telecommunications Network Security
    SCADA and Embedded systems security Anti-cyberterrorism
    Anti-Forensics and Anti-Anti-Forensics Techniques Cyber-Crimes
    Data leakage, Data protection and Database forensics Evidentiary Aspects of Digital Forensics
    Executable Content and Content Filtering File System and Memory Analysis Multimedia Forensic
    Forensics of Virtual and Cloud Environments Information Hiding
    Investigation of Insider Attacks Large-Scale Investigations
    Malware forensics and Anti-Malware techniques New threats and Non-Traditional approaches
    Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics
    Computer Forensics Business Continuity & Disaster Recovery Planning
    Corporate Governance Critical Infrastructure Protection
    Decidability and Complexity Digital Rights Management and Intellectual Property Protection
    Economics of Security Fraud Management
    Identity Management Laws and Regulations
    Security Policies and Trust Management Threats, Vulnerabilities, and Risk Management
    Computer Crime Prevention and Detection Authentication and Access Control Systems
    Biometrics Applications Biometrics standards and standardization
    Cyber Peacefare Trends and Approaches Electronic Passports, National ID and Smart Card Security
    New theories and algorithms in biometrics Social engineering
    Surveillance Systems Template Protection and Liveliness detection
    Computer Security Confidentiality Protection
    Cryptography and Data Protection Forensics, Recognition Technologies and Applications
    Network Security Security; Authentication and Cryptography for Wireless Networks

IMPORTANT DATES            

  • Paper submission: October 15, 2015
  •                        
  • Notification of acceptance: October 29, 2015
  •            
  • Final manuscripts due: November 05, 2015
  •                       

    User Name : amala
    Posted on


    Related CFPs

    IJSPTM   International Journal of Security, Privacy and Trust Management
    WiMNeT 2026   13th International Conference on Wireless and Mobile Network
    NCOM 2026   12th International Conference on Networks & Communications
    SCDD 2026   4th International Conference on Soft Computing, Data mining and Data Science

    All Rights Reserved @ Call for Papers - Conference & Journals