The Fifth International Conference on Cyber Security, Cyber Welfare and Digital Forensic (CyberSec2017)

8 years ago Posted By : User Ref No: WURUR9889 1
  • Image
  • TypeConference
  • Image
  • Location Addis Ababa, Addis Ababa, Ethiopia
  • Price
  • Date 22-04-2017 - 24-04-2017
The Fifth International Conference on Cyber Security, Cyber Welfare and Digital Forensic (CyberSec2017), Addis Ababa, Addis Ababa, Ethiopia
Conference Title
The Fifth International Conference on Cyber Security, Cyber Welfare and Digital Forensic (CyberSec2017)
Event Type
Conference
Conference Date
22-04-2017 to 24-04-2017
Last Date for Applying
01-03-2017
Location
Addis Ababa, Addis Ababa, Ethiopia
Organization Name / Organize By
The Society of Digital Information and Wireless Communications (SDIWC)
Organizing/Related Departments
St. Mary's University
Organization Type
University
ConferenceCategory
Both (Technical & Non Technical)
ConferenceLevel
International
Related Industries

Education/Teaching/Training/Development

Engineering

Computer Science

Information Technology

Computer/Technology

Location
Addis Ababa, Addis Ababa, Ethiopia

You are invited to participate in The Fifth International Conference on Cyber Security, Cyber Welfare and Digital Forensic (CyberSec2017) that will be held in Addis Ababa, Ethiopia on April 22-24, 2017. The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures.

 

The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures.

CONFERENCE WELCOMES PAPERS
The conference welcomes papers on the following (but not limited to) research topics:

Cyber Security

  • Distributed and Pervasive Systems Security
  • Enterprise Systems Security
  • Formal Methods Application in Security
  • Hardware-Based security
  • Incident Handling and Penetration Testing
  • Legal Issues
  • Multimedia and Document Security
  • Operating Systems and Database Security
  • Privacy issues SCADA and Embedded systems security
  • Secure Software Development, Architecture and Outsourcing
  • Security for Future Networks
  • Security in Cloud Computing
  • Security in Social Networks
  • Security of Web-based Applications and Services
  • Security protocols
  • VOIP, Wireless and Telecommunications Network Security

Digital Forensic

  • Anti-Forensics and Anti-Anti-Forensics Techniques
  • Cyber-Crimes
  • Data leakage, Data protection and Database forensics
  • Evidentiary Aspects of Digital Forensics
  • Executable Content and Content Filtering
  • File System and Memory Analysis Multimedia Forensic
  • Forensics of Virtual and Cloud Environments
  • Information Hiding
  • Investigation of Insider Attacks
  • Large-Scale Investigations
  • Malware forensics and Anti-Malware techniques
  • Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics
  • New threats and Non-Traditional approaches

Information Assurance and Security Management

  • Business Continuity & Disaster Recovery Planning
  • Corporate Governance
  • Critical Infrastructure Protection
  • Decidability and Complexity
  • Digital Rights Management and Intellectual Property Protection Economics of Security
  • Fraud Management
  • Identity Management
  • Laws and Regulations
  • Security Policies and Trust Management
  • Threats, Vulnerabilities, and Risk Management

Cyber Peacefare and Physical Security

  • Authentication and Access Control Systems
  • Biometrics Applications
  • Biometrics standards and standardization
  • Cyber Peacefare Trends and Approaches
  • Electronic Passports, National ID and Smart Card Security
  • New theories and algorithms in biometrics
  • Social engineering
  • Surveillance Systems
  • Template Protection and Liveliness detection

All registered papers will be published in the Society of Digital Information and Wireless Communication's Digital Library, and in the proceedings of the conference.

The conference uses double-blind review by at least two reviewers, which means that both the reviewer and author identities are concealed from the reviewers, and vice versa, throughout the review process. To facilitate this, authors need to ensure that their manuscripts are prepared in a way that does not give away their identity.
IMPORTANT DATES
Submission Deadline: March 1, 2017
Last Notification of Acceptance: March 15, 2017
Camera Ready Submission: April 6, 2017
Registration Deadline: April 6, 2017
Conference Dates: April 22-24, 2017

Registration Fees
Available
Registration Fees Details
URL: http://sdiwc.net/conferences/5th-international-cyber-security-cyber-welfare-digital-forensic/registration
Registration Ways
Website
Address/Venue
  St. Mary's University, Ras Abebe Aragay St, Addis Ababa, Addis Ababa, Ethiopia  Pin/Zip Code : 1000
Official Email ID
Contact
Mari Glambert

[email protected]

     (202)-657-4603
SI NO Filename Download
1 CyberSec2017 poster Download