[AISWorld] 7 days before submission deadline for IEEE Co-sponsored CyberSec2014 - Lebanon

Liezelle Ann Canadilla liezelle at sdiwc.info
Sat Mar 8 06:11:08 EST 2014




All the papers will be submitted to IEEE for inclusion to IEEE
Xplore as well as other Abstracting and Indexing (A&I)
databases.



FIRST SUBMISSION DEADLINE: March 15, 2014



You are invited to participate in The Third International Conference on
Cyber Security, Cyber Warfare, and Digital Forensic (CyberSec2014) that
will be held at the Faculty of Engineering – Lebanese University,
Campus of Hadath, Beirut – Lebanon on Apr. 29 – May 1, 2014.
The event will be held over three days, with presentations delivered by
researchers from the international community, including presentations from
keynote speakers and state-of-the-art lectures.



~ Cyber Security

Distributed and Pervasive Systems Security

Enterprise Systems Security

Formal Methods Application in Security

Hardware-Based security

Incident Handling and Penetration Testing

Legal Issues

Multimedia and Document Security

Operating Systems and Database Security

Privacy issues

SCADA and Embedded systems security

Secure Software Development, Architecture and Outsourcing

Security for Future Networks

Security in Cloud Computing

Security in Social Networks

Security of Web-based Applications and Services

Security protocols

VOIP, Wireless and Telecommunications

Network Security

    

~ Digital Forensic

Anti-Forensics and Anti-Anti-Forensics Techniques

Cyber-Crimes

Data leakage, Data protection and Database forensics

Evidentiary Aspects of Digital Forensics

Executable Content and Content Filtering

File System and Memory Analysis Multimedia Forensic

Forensics of Virtual and Cloud Environments

Information Hiding

Investigation of Insider Attacks

Large-Scale Investigations

Malware forensics and Anti-Malware techniques

Network Forensics and Traffic Analysis Hardware

Vulnerabilities and Device Forensics

New threats and Non-Traditional approaches     



~Information Assurance and Security Management

Business Continuity & Disaster Recovery Planning

Corporate Governance

Critical Infrastructure Protection

Decidability and Complexity

Digital Rights Management and Intellectual Property Protection

Economics of Security

Fraud Management

Identity Management

Laws and Regulations

Security Policies and Trust Management

Threats, Vulnerabilities, and Risk Management

    

~Cyber Peacefare and Physical Security

Authentication and Access Control Systems

Biometrics Applications

Biometrics standards and standardization

Cyber Peacefare Trends and Approaches

Electronic Passports, National ID and Smart Card Security

New theories and algorithms in biometrics

Social engineering

Surveillance Systems

Template Protection and Liveliness detection



CONTACT EMAIL: cyb2014 at sdiwc.net
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20140308/b4c08a08/attachment.html>


More information about the AISWorld mailing list