RESEARCH TOPICS
The conference welcomes papers on the following (but not limited to) research topics:
CYBER SECURITY
CYBER SECURITY
- Distributed and Pervasive Systems Security
- Formal Methods Application in Security
- Incident Handling and Penetration Testing
- Multimedia and Document Security
- Privacy issues
- Secure Software Development, Architecture and Outsourcing
- Security in Cloud Computing
- Security of Web-based Applications and Services
- VOIP, Wireless and Telecommunications Network Security
- Enterprise Systems Security
- Hardware-Based security
- Legal Issues
- Operating Systems and Database Security
- SCADA and Embedded systems security
- Security for Future Networks
- Security in Social Networks
- Security protocols
DIGITAL FORENSICS
- Anti-Forensics and Anti-Anti-Forensics Techniques
- Data leakage, Data protection and Database forensics
- Executable Content and Content Filtering
- Forensics of Virtual and Cloud Environments
- Investigation of Insider Attacks
- Malware forensics and Anti-Malware techniques
- New threats and Non-Traditional approaches
- Cyber-Crimes
- Evidentiary Aspects of Digital Forensics
- File System and Memory Analysis Multimedia Forensic
- Information Hiding
- Large-Scale Investigations
- Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics
INFORMATION ASSURANCE AND SECURITY MANAGEMENT
- Business Continuity & Disaster Recovery Planning
- Critical Infrastructure Protection
- Digital Rights Management and Intellectual Property Protection
- Fraud Management
- Laws and Regulations
- Threats, Vulnerabilities, and Risk Management
- Corporate Governance
- Decidability and Complexity
- Economics of Security
- Identity Management
- Security Policies and Trust Management