[Open-education] [LAST Call for Papers] IEEE:: Second InfoSec2015 South Africa

Hazel Ann hazel.sdiwc at gmail.com
Wed Oct 14 14:06:43 UTC 2015


The submission is open until October 25, 2015. Please consider 
submitting your papers to InfoSec2015.

****ALL registered papers will be submitted to IEEE for POTENTIAL 
inclusion to IEEE Xplore.****
=================================================================================================

The Second International Conference on Information Security and Cyber 
Forensics (InfoSec2015)

November 15-17, 2015 » Cape Town, South Africa

University of Cape Town

http://sdiwc.net/conferences/infosec2015/

infosec15 at sdiwc.net

All registered papers will be submitted to IEEE for potential inclusion 
to IEEE Xplore

====================================================
Dates

Submission Deadline        Open from now until October 25, 2015
Notification of Acceptance    November 2, 2015
Camera Ready Submission        Open from now until November 05, 2015
Registration Deadline        Open from now until November 05, 2015
Conference Dates        November 15-17, 2015

====================================================

The conference welcomes papers on the following (but not limited to) 
research topics:

***Cyber Security***
-Distributed and Pervasive Systems Security
-Enterprise Systems Security
-Formal Methods Application in Security
-Hardware-Based security
-Incident Handling and Penetration Testing
-Legal Issues
-Multimedia and Document Security
-Operating Systems and Database Security
-Privacy issues
-SCADA and Embedded systems security
-Secure Software Development, Architecture and Outsourcing
-Security for Future Networks
-Security in Cloud Computing
-Security in Social Networks
-Security of Web-based Applications and Services
-Security protocols
-VOIP, Wireless and Telecommunications
-Network Security

***Digital Forensic***
-Anti-Forensics and Anti-Forensics Techniques
-Cyber-Crimes
-Data leakage, Data protection and Database forensics
-Evidentiary Aspects of Digital Forensics
-Executable Content and Content Filtering
-File System and Memory Analysis Multimedia Forensic
-Forensics of Virtual and Cloud Environments
-Information Hiding
-Investigation of Insider Attacks
-Large-Scale Investigations
-Malware forensics and Anti-Malware techniques
-Network Forensics and Traffic Analysis Hardware Vulnerabilities and 
Device Forensics
-New threats and Non-Traditional approaches

***Information Assurance and Security Management***
-Business Continuity & Disaster Recovery Planning
-Corporate Governance
-Critical Infrastructure Protection
-Decidability and Complexity
-Digital Rights Management and Intellectual Property Protection 
  Economics of Security
-Fraud Management
-Identity Management
-Laws and Regulations
-Security Policies and Trust Management
-Threats, Vulnerabilities, and Risk Management

***Cyber Peacefare and Physical Security***
-Authentication and Access Control Systems
-Biometrics Applications
-Biometrics standards and standardization
-Cyber Peacefare Trends and Approaches
-Electronic Passports, National ID and Smart Card Security
-New theories and algorithms in biometrics
-Social engineering
-Surveillance Systems
-Template Protection and Liveliness detection



More information about the open-education mailing list