CHI-ANNOUNCEMENTS Archives

ACM SIGCHI General Interest Announcements (Mailing List)

CHI-ANNOUNCEMENTS@LISTSERV.ACM.ORG

Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Condense Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Content-Type:
text/plain;charset=iso-8859-1
Date:
Mon, 8 Jun 2015 02:52:52 +0300
Reply-To:
"The Second International Conference on Information Security and Digital Forensics (ISDF2015)" <[log in to unmask]>
Subject:
MIME-Version:
1.0
Message-ID:
Content-Transfer-Encoding:
quoted-printable
Sender:
"ACM SIGCHI General Interest Announcements (Mailing List)" <[log in to unmask]>
From:
"The Second International Conference on Information Security and Digital Forensics (ISDF2015)" <[log in to unmask]>
Parts/Attachments:
text/plain (99 lines)
The Second International Conference on Information Security and Digital
Forensics (ISDF2015)
Asia Pacific University of Technology and Innovation (APU), Kuala Lumpur,
Malaysia
September 8-10, 2015
http://sdiwc.net/conferences/isdf2015/
=*=*=*=*=*=*=*=*=*=*=*=
The conference welcomes papers on the following (but not limited to)
research topics:

**Cyber Security
- Distributed and Pervasive Systems Security
- Enterprise Systems Security
- Formal Methods Application in Security
- Hardware-Based security
- Incident Handling and Penetration Testing
- Legal Issues
- Multimedia and Document Security
- Operating Systems and Database Security
- Privacy issues
- SCADA and Embedded systems security
- Secure Software Development, Architecture and Outsourcing
- Security for Future Networks
- Security in Cloud Computing
- Security in Social Networks
- Security of Web-based Applications and Services
- Security protocols
- VOIP, Wireless and Telecommunications Network Security
**Digital Forensic
- Anti-Forensics and Anti-Anti-Forensics Techniques
- Cyber-Crimes
- Data leakage, Data protection and Database forensics
- Evidentiary Aspects of Digital Forensics
- Executable Content and Content Filtering
- File System and Memory Analysis Multimedia Forensic
- Forensics of Virtual and Cloud Environments
- Information Hiding
- Investigation of Insider Attacks
- Large-Scale Investigations
- Malware forensics and Anti-Malware techniques
- Network Forensics and Traffic Analysis Hardware Vulnerabilities and
Device Forensics
- New threats and Non-Traditional approaches
**Information Assurance and Security Management
- Business Continuity & Disaster Recovery Planning
- Corporate Governance
- Critical Infrastructure Protection
- Decidability and Complexity
- Digital Rights Management and Intellectual Property Protection
- Economics of Security
- Fraud Management
- Identity Management
- Laws and Regulations
- Security Policies and Trust Management
- Threats, Vulnerabilities, and Risk Management
**Cyber Peacefare and Physical Security
- Authentication and Access Control Systems
- Biometrics Applications
- Biometrics standards and standardization
- Cyber Peacefare Trends and Approaches
- Electronic Passports, National ID and Smart Card Security
- New theories and algorithms in biometrics
- Social engineering
- Surveillance Systems
- Template Protection and Liveliness detection

Researchers are encouraged to submit their work electronically. All papers
will be fully refereed by a minimum of two specialized referees. Before
final acceptance, all referees comments must be considered.
Best selected papers will be published in one of the following special
issues provided that the author do major improvements and extension within
the time frame that will be set by the conference and his/her paper is
approved by the chief editor:

International Journal of New Computer Architectures and their Applications
(IJNCAA)
International Journal of Digital Information and Wireless Communications
(IJDIWC)
International Journal of Cyber-Security and Digital Forensics (IJCSDF)

=*=*=*=*=*=*=*=*=*=*=*=
IMPORTANT DATES

Submission Dates: The submission is open from now until August 08, 2015
Notification of Acceptance: August 18, 2015
Camera Ready Submission: August 29, 2015
Registration: August 29, 2015
Conference Dates: September 8-10, 2015

    ---------------------------------------------------------------
    For news of CHI books, courses & software, join CHI-RESOURCES
     mailto: [log in to unmask]

    To unsubscribe from CHI-ANNOUNCEMENTS send an email to
     mailto:[log in to unmask]

    For further details of CHI lists see http://listserv.acm.org
    ---------------------------------------------------------------

ATOM RSS1 RSS2