2nd SDIWC International Conference on Information Security and Cyber Forensics (InfoSec) 2015 Cape Town

  • Conference Call
  • You are invited to participate in The Second International Conference on Information Security and Cyber Forensics (InfoSec) 2015 that will be held in Cape Town, South Africa at the University of Cape Town on November 15 – 17, 2015. The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-​of-​the-​art lectures.

    Conference Topics

    Cyber Security

    • Distributed and Pervasive Systems Security
    • Enterprise Systems Security
    • Formal Methods Application in Security
    • Hardware-​Based security
    • Incident Handling and Penetration Testing
    • Legal Issues
    • Multimedia and Document Security
    • Operating Systems and Database Security
    • Privacy issues
    • SCADA and Embedded systems security
    • Secure Software Development, Architecture and Outsourcing
    • Security for Future Networks
    • Security in Cloud Computing
    • Security in Social Networks
    • Security of Web-​based Applications and Services
    • Security protocols
    • VOIP, Wireless and Telecommunications Network Security

    Cyber Peacefare and Physical Security

    • Authentication and Access Control Systems
    • Biometrics Applications
    • Biometrics standards and standardization
    • Cyber Peacefare Trends and Approaches
    • Electronic Passports, National ID and Smart Card Security
    • New theories and algorithms in biometrics
    • Social engineering
    • Surveillance Systems
    • Template Protection and Liveliness detection

    Digital Forensic

    • Anti-​Forensics and Anti-​Forensics Techniques
    • Cyber-​Crimes
    • Data leakage, Data protection and Database forensics
    • Evidentiary Aspects of Digital Forensics
    • Executable Content and Content Filtering
    • File System and Memory Analysis Multimedia Forensic
    • Forensics of Virtual and Cloud Environments
    • Information Hiding
    • Investigation of Insider Attacks
    • Large-​Scale Investigations
    • Malware forensics and Anti-​Malware techniques
    • Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics
    • New threats and Non-​Traditional approaches

    Information Assurance and Security Management

    • Business Continuity & Disaster Recovery Planning
    • Corporate Governance
    • Critical Infrastructure Protection
    • Decidability and Complexity
    • Digital Rights Management and Intellectual Property Protection
    • Economics of Security
    • Fraud Management
    • Identity Management
    • Laws and Regulations
    • Security Policies and Trust Management
    • Threats, Vulnerabilities, and Risk Management

    Publication Opportunities

    All the submitted papers will be reviewed by a minimum of two reviewers, and all the registered papers will be submitted to IEEE for POTENTIAL inclusion to IEEE Xplore as well as other Abstracting and Indexing (A&I) databases. Please note that IEEE requires that the paper must be presented by anyone of the authors. Non presented papers will be published in SDIWC digital library instead of IEEE Xplore. In addition, BESTregistered papers will be published in one of the following special issues provided that the author do major improvements and extension within the time frame that will be set by the conference and his/​her paper is approved by the chief editor:


    General Chair

    • Jean-​Paul Van Belle, University of Cape Town, South Africa

    Organizing Chair

    • Wathiq Mansoor, American University in Dubai, UAE

    Program Chairs

    • Fadhilah Ahmad, University Sultan Zainal Abidin, Malaysia
    • Jan Platos, VSB-​Technical University of Ostrava, Czech Republic

    Program Co-​Chair

    • Jacek Stando, Technical University of Lodz, Poland

    Publication Chairs

    • Yoshiro Imai, Kagawa University, Japan
    • Ousanee Sawagvudcharee, Stamford International University, Phetchaburi, Thailand

    Publication Co-​Chair

    • Jim Yonazi, The Institute of Finance Management, Tanzania

    Publicity Chair

    • Tutut Herawan, University Malaysia Pahang, Malaysia


    • Jacques Ophoff, University of Cape Town, South Africa
    • Vishwajit K. Barbudhe, Jagdambha College Of Engineering & Technology, India
    • Javed Mohammed, Newyork Institute of Technology, USA
    • Rizwan Ahmed, delaPlex Software at India Development Center (IDC) – Q M CompuTech Pvt. Ltd., India
    • Abbas Mohammed Ali Al-​Ghaili, AL Yemenia University, Yemen
    • Sujeet More, Shaikh College of Engineering and Technology, India
    • Phongsak Phakamach, North Eastern University, Thailand
    • Eric Opoku Osei, Cape Coast University, Ghana
    • Yilun Shang, Tongji University, China
    • Zacchaeus Oni Omogbadegun, Covenant University, Nigeria
    • Shyam Nandan Kumar, Lakshmi Narain College of Technology, India
    • Firas Al Khalil, University of French Polynesia, France
    • Ahmad Tafti, University of Wisconsin at Milwaukee, USA
    • Meerja. Akhil Jabbar, Aurora’s Engineering College, India
    • Hamid Ali Abed Al-​asadi, Basra University, Iraq
    • Zuraini Ismail, Universiti Teknologi Malaysia, Malaysia


    Conference START 17.11.2015 END

    All deadlines have expired!

    This conference has no more open deadlines. There may be successive conferences coming up you may by interested in.

    Please check our conference list and search...

    Conference Facts

    Location , Address University of Cape Town Category Organiser More Info Conference Website

    Further interesting Conferences

    Currently we have no similar events listed. Please check our website regulary, subscribe to our RSS-Feed or follow us on twitter for new listings.