2nd SDIWC International Conference on Digital Security and Forensics (DigitalSec) 2015 Cape Town

  • Conference Call
  • You are invited to participate in the 2nd International Conference on Digital Security and Forensics (DigitalSec) 2015 that will be held in Cape Town, South Africa on November 15 – 17, 2015. The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-​of-​the-​art lectures.

    Keynote Speaker

    Conference Topics

    The conference welcome papers on the following (but not limited to) research topics:

    • Anti-​cyberterrorism
    • Anti-​Forensics and Anti-​Anti-​Forensics Techniques
    • Authentication and Access Control Systems
    • Biometrics Applications
    • Biometrics standards and standardization
    • Business Continuity & Disaster Recovery Planning
    • Computer Crime Prevention and Detection
    • Computer Forensics
    • Computer Security
    • Confidentiality Protection
    • Corporate Governance
    • Critical Infrastructure Protection
    • Cryptography and Data Protection
    • Cyber Peacefare Trends and Approaches
    • Cyber-​Crimes
    • Data leakage, Data protection and Database forensics
    • Decidability and Complexity
    • Digital Rights Management and Intellectual Property Protection
    • Distributed and Pervasive Systems Security
    • Economics of Security
    • Electronic Passports, National ID and Smart Card Security
    • Enterprise Systems Security
    • Evidentiary Aspects of Digital Forensics
    • Executable Content and Content Filtering
    • File System and Memory Analysis Multimedia Forensic
    • Forensics of Virtual and Cloud Environments
    • Forensics, Recognition Technologies and Applications
    • Formal Methods Application in Security
    • Fraud Management
    • Hardware Vulnerabilities and Device Forensics
    • Hardware-​Based security
    • Identity Management
    • Incident Handling and Penetration Testing
    • Information Hiding
    • Investigation of Insider Attacks
    • Large-​Scale Investigations
    • Laws and Regulations
    • Legal Issues
    • Malware forensics and Anti-​Malware techniques
    • Multimedia and Document Security
    • Network Forensics and Traffic Analysis
    • Network Security
    • New theories and algorithms in biometrics
    • New threats and Non-​Traditional approaches
    • Operating Systems and Database Security
    • Privacy issues
    • SCADA and Embedded systems security
    • Secure Software Development, Architecture and Outsourcing
    • Security for Future Networks
    • Security in Cloud Computing
    • Security in Social Networks
    • Security of Web-​based Applications and Services
    • Security Policies and Trust Management
    • Security protocols
    • Security; Authentication and Cryptography for Wireless Networks
    • Social engineering
    • Surveillance Systems
    • Template Protection and Liveliness detection
    • Threats, Vulnerabilities, and Risk Management
    • VOIP, Wireless and Telecommunications Network Security

    Publication Possibilities

    All registered papers will be published in SDIWC Digital Library, and in the proceedings of the conference.

    All submitted papers will be reviewed by a minimum of two reviewers. The published proceedings will be indexed in ResearchBib, in addition, they will be reviewed for POSSIBLE inclusion within the INSPEC, EI, DBLP, Microsoft Academic Research, ResearchGate, and Google Scholar Databases. In addition, ALL registered papers will be published in one of the following special issues provided that the author do major improvements and extension within the time frame that will be set by the conference and his/​her paper is approved by the chief editor:

    Conference Committees

    General Chair

    • Jean-​Paul Van Belle, University of Cape Town, South Africa

    Organizing Chair

    • Wathiq Mansoor, American University in Dubai, UAE

    Program Chairs

    • Fadhilah Ahmad, University Sultan Zainal Abidin, Malaysia
    • Jan Platos, VSB-​Technical University of Ostrava, Czech Republic

    Program Co-​Chair

    • Jacek Stando, Technical University of Lodz, Poland

    Publicity Chair

    • Tutut Herawan, University Malaysia Pahang, Malaysia

    Publication Chairs

    • Yoshiro Imai, Kagawa University, Japan
    • Ousanee Sawagvudcharee, Stamford International University, Phetchaburi, Thailand

    Publication Co-​Chair

    • Jim Yonazi, The Institute of Finance Management, Tanzania

    Reviewers

    • Rizwan Ahmed, delaPlex Software, India
    • Ali Yassin, Basra University, Iraq
    • Firas Al Khalil, University of French Polynesia, France
    • Muhammad Faheem, University of Ottawa, Canada
    • Mikhail I. Gofman, California State University of Fullerton, USA
    • Tushar Gokhale, Hewlett Packard Enterprise, USA

    Timeline

    Conference START 17.11.2015 END

    All deadlines have expired!

    This conference has no more open deadlines. There may be successive conferences coming up you may by interested in.

    Please check our conference list and search...

    Conference Facts

    Location , Address University of Cape Town Category Organiser More Info Conference Website

    Further interesting Conferences

    Currently we have no similar events listed. Please check our website regulary, subscribe to our RSS-Feed or follow us on twitter for new listings.