[AISWorld] 7 days before submission deadline for IEEE Co-sponsored CyberSec2014 - Lebanon
Liezelle Ann Canadilla
liezelle at sdiwc.info
Sat Mar 8 06:11:08 EST 2014
All the papers will be submitted to IEEE for inclusion to IEEE
Xplore as well as other Abstracting and Indexing (A&I)
databases.
FIRST SUBMISSION DEADLINE: March 15, 2014
You are invited to participate in The Third International Conference on
Cyber Security, Cyber Warfare, and Digital Forensic (CyberSec2014) that
will be held at the Faculty of Engineering – Lebanese University,
Campus of Hadath, Beirut – Lebanon on Apr. 29 – May 1, 2014.
The event will be held over three days, with presentations delivered by
researchers from the international community, including presentations from
keynote speakers and state-of-the-art lectures.
~ Cyber Security
Distributed and Pervasive Systems Security
Enterprise Systems Security
Formal Methods Application in Security
Hardware-Based security
Incident Handling and Penetration Testing
Legal Issues
Multimedia and Document Security
Operating Systems and Database Security
Privacy issues
SCADA and Embedded systems security
Secure Software Development, Architecture and Outsourcing
Security for Future Networks
Security in Cloud Computing
Security in Social Networks
Security of Web-based Applications and Services
Security protocols
VOIP, Wireless and Telecommunications
Network Security
~ Digital Forensic
Anti-Forensics and Anti-Anti-Forensics Techniques
Cyber-Crimes
Data leakage, Data protection and Database forensics
Evidentiary Aspects of Digital Forensics
Executable Content and Content Filtering
File System and Memory Analysis Multimedia Forensic
Forensics of Virtual and Cloud Environments
Information Hiding
Investigation of Insider Attacks
Large-Scale Investigations
Malware forensics and Anti-Malware techniques
Network Forensics and Traffic Analysis Hardware
Vulnerabilities and Device Forensics
New threats and Non-Traditional approaches
~Information Assurance and Security Management
Business Continuity & Disaster Recovery Planning
Corporate Governance
Critical Infrastructure Protection
Decidability and Complexity
Digital Rights Management and Intellectual Property Protection
Economics of Security
Fraud Management
Identity Management
Laws and Regulations
Security Policies and Trust Management
Threats, Vulnerabilities, and Risk Management
~Cyber Peacefare and Physical Security
Authentication and Access Control Systems
Biometrics Applications
Biometrics standards and standardization
Cyber Peacefare Trends and Approaches
Electronic Passports, National ID and Smart Card Security
New theories and algorithms in biometrics
Social engineering
Surveillance Systems
Template Protection and Liveliness detection
CONTACT EMAIL: cyb2014 at sdiwc.net
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20140308/b4c08a08/attachment.html>
More information about the AISWorld
mailing list