-------- Weitergeleitete Nachricht -------- Betreff: [AISWorld] IEEE Call for Papers: InfoSec'15 South Africa Datum: Fri, 12 Jun 2015 17:12:43 +0800 Von: Sandra Evans sandra.sdiwc@gmail.com An: aisworld@lists.aisnet.org
The Second International Conference on Information Security and Cyber Forensics (InfoSec2015)
November 15-17, 2015 » Cape Town, South Africa
University of Cape Town
http://sdiwc.net/conferences/infosec2015/
infosec15@sdiwc.net
All registered papers will be submitted to IEEE for potential inclusion to IEEE Xplore
==================================================== Dates
Submission Deadline Open from now until October 15, 2015 Notification of Acceptance 2-3 weeks from the submission date Camera Ready Submission Open from now until November 05, 2015 Registration Deadline Open from now until November 05, 2015 Conference Dates November 15-17, 2015
====================================================
The conference welcomes papers on the following (but not limited to) research topics:
***Cyber Security*** -Distributed and Pervasive Systems Security -Enterprise Systems Security -Formal Methods Application in Security -Hardware-Based security -Incident Handling and Penetration Testing -Legal Issues -Multimedia and Document Security -Operating Systems and Database Security -Privacy issues -SCADA and Embedded systems security -Secure Software Development, Architecture and Outsourcing -Security for Future Networks -Security in Cloud Computing -Security in Social Networks -Security of Web-based Applications and Services -Security protocols -VOIP, Wireless and Telecommunications -Network Security ***Digital Forensic*** -Anti-Forensics and Anti-Forensics Techniques -Cyber-Crimes -Data leakage, Data protection and Database forensics -Evidentiary Aspects of Digital Forensics -Executable Content and Content Filtering -File System and Memory Analysis Multimedia Forensic -Forensics of Virtual and Cloud Environments -Information Hiding -Investigation of Insider Attacks -Large-Scale Investigations -Malware forensics and Anti-Malware techniques -Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics -New threats and Non-Traditional approaches ***Information Assurance and Security Management*** -Business Continuity & Disaster Recovery Planning -Corporate Governance -Critical Infrastructure Protection -Decidability and Complexity -Digital Rights Management and Intellectual Property Protection Economics of Security -Fraud Management -Identity Management -Laws and Regulations -Security Policies and Trust Management -Threats, Vulnerabilities, and Risk Management ***Cyber Peacefare and Physical Security*** -Authentication and Access Control Systems -Biometrics Applications -Biometrics standards and standardization -Cyber Peacefare Trends and Approaches -Electronic Passports, National ID and Smart Card Security -New theories and algorithms in biometrics -Social engineering -Surveillance Systems -Template Protection and Liveliness detection _______________________________________________ AISWorld mailing list AISWorld@lists.aisnet.org