3rd International Conference on Cyber Security, Cyber Warfare, and Digital Forensic (CyberSec) 2014

  • Conference Call
  • You are invited to par­tic­i­pate in The Third Inter­na­tional Con­fer­ence on Cyber Secu­rity, Cyber War­fare, and Dig­i­tal Foren­sic (Cyber­Sec) 2014 that will be held at the Fac­ulty of Engi­neer­ing – Lebanese Uni­ver­sity, Cam­pus of Hadath, Beirut – Lebanon on Apr. 29 – May 1, 2014. The event will be held over three days, with pre­sen­ta­tions deliv­ered by researchers from the inter­na­tional com­mu­nity, includ­ing pre­sen­ta­tions from keynote speak­ers and state-​of-​the-​art lectures.

    Con­fer­ence Topics

    Cyber Security

    • Dis­trib­uted and Per­va­sive Sys­tems Security
    • Enter­prise Sys­tems Security
    • For­mal Meth­ods Appli­ca­tion in Security
    • Hardware-​Based security
    • Inci­dent Han­dling and Pen­e­tra­tion Testing
    • Legal Issues
    • Mul­ti­me­dia and Doc­u­ment Security
    • Oper­at­ing Sys­tems and Data­base Security
    • Pri­vacy issues
    • SCADA and Embed­ded sys­tems security
    • Secure Soft­ware Devel­op­ment, Archi­tec­ture and Outsourcing
    • Secu­rity for Future Networks
    • Secu­rity in Cloud Computing
    • Secu­rity in Social Networks
    • Secu­rity of Web-​based Appli­ca­tions and Services
    • Secu­rity protocols
    • VOIP, Wire­less and Telecom­mu­ni­ca­tions Net­work Security

    Cyber Peace­fare and Phys­i­cal Security

    • Authen­ti­ca­tion and Access Con­trol Systems
    • Bio­met­rics Applications
    • Bio­met­rics stan­dards and standardization
    • Cyber Peace­fare Trends and Approaches
    • Elec­tronic Pass­ports, National ID and Smart Card Security
    • New the­o­ries and algo­rithms in biometrics
    • Social engi­neer­ing
    • Sur­veil­lance Systems
    • Tem­plate Pro­tec­tion and Live­li­ness detection

    Dig­i­tal Forensic

    • Anti-​Forensics and Anti-​Anti-​Forensics Techniques
    • Cyber-​Crimes
    • Data leak­age, Data pro­tec­tion and Data­base forensics
    • Evi­den­tiary Aspects of Dig­i­tal Forensics
    • Exe­cutable Con­tent and Con­tent Filtering
    • File Sys­tem and Mem­ory Analy­sis Mul­ti­me­dia Forensic
    • Foren­sics of Vir­tual and Cloud Environments
    • Infor­ma­tion Hiding
    • Inves­ti­ga­tion of Insider Attacks
    • Large-​Scale Investigations
    • Mal­ware foren­sics and Anti-​Malware techniques
    • Net­work Foren­sics and Traf­fic Analy­sis Hard­ware Vul­ner­a­bil­i­ties and Device Forensics
    • New threats and Non-​Traditional approaches

    Infor­ma­tion Assur­ance and Secu­rity Management

    • Busi­ness Con­ti­nu­ity & Dis­as­ter Recov­ery Planning
    • Cor­po­rate Governance
    • Crit­i­cal Infra­struc­ture Protection
    • Decid­abil­ity and Complexity
    • Dig­i­tal Rights Man­age­ment and Intel­lec­tual Prop­erty Protection
    • Eco­nom­ics of Security
    • Fraud Man­age­ment
    • Iden­tity Management
    • Laws and Regulations
    • Secu­rity Poli­cies and Trust Management
    • Threats, Vul­ner­a­bil­i­ties, and Risk Management

    Pub­li­ca­tion Opportunities

    All the reg­is­tered papers will be sub­mit­ted to IEEE for poten­tial inclu­sion to IEEE Xplore as well as other Abstract­ing and Index­ing (A&I) databases.

    All the sub­mit­ted papers will be reviewed by a min­i­mum of two review­ers. The pub­lished pro­ceed­ings will be indexed in Research­Bib, in addi­tion, they will be reviewed for pos­si­ble inclu­sion within the INSPEC, EI, DBLP, Microsoft Aca­d­e­mic Research, Research­Gate, and Google Scholar Data­bases. In addi­tion, BESTreg­is­tered papers will be pub­lished in one of the fol­low­ing spe­cial issues pro­vided that the author do major improve­ments and exten­sion within the time frame that will be set by the con­fer­ence and his/​her paper is approved by the chief editor:

    starting: ending: 01.05.2014 Location: , Category:

    Timeline

    Conference START 01.05.2014 END

    All deadlines have expired!

    This conference has no more open deadlines. There may be successive conferences coming up you may by interested in.

    Please check our conference list and search...

    Conference Facts

    Location , Address Lebanese University, Hadath Campus, Lailake Category Organiser More Info Conference Website

    Further interesting Conferences

    Currently we have no similar events listed. Please check our website regulary, subscribe to our RSS-Feed or follow us on twitter for new listings.