International Conference on Cyber Security and Protection of Digital Services - Cyber Security 2018 - is an IEEE Technically Co-Sponsored (TCS) and internationally refereed conference dedicated to the advancement of Cyber Security, information security, network security, application security and business transformation of digital services, and the protection of public digital services, especially high value bearing online services.
The aim of the Cyber Security 2018 is to encourage participation and promotion of collaborative scientific, industrial and academic inter-workings among individual researchers, practitioners, members of existing associations, academia, standardisation bodies, and including government departments and agencies. The purpose is to build bridges between academia and industry, and to encourage interplay of different culture.
Cyber Security 2018 invites researchers and industry practitioners to submit papers that encompass principles, analysis, design, methods and applications. All submitted papers are independently peer-reviewed.
Original papers are invited on recent advances in Cyber Security, Online Services, and Protection Mechanisms for Digital Services. The topics in Cyber Security 2018 include but not limited to:
Cyber Security
Information Security
Computer Network Security
Application Security
Web Services Security
Mobile Security
Protective Security
Software Security
Wireless & Sensor Network Security
Software Coding Security
Barcode Scanner Security
Security in Middleware, Interface and Interaction
Security Services in Authentication, Authorisation, Accountability, Automation, Availability, Integrity and Nonrepudiation
Security Management
Security Operations
Digital Trust and Reputation
Geographical Location (IP Geolocation) and Cyber Travel
Geospatial Intelligence Networks (Centralised, Distributed & Hybrid)
Policy, Legal, Legislation & Compliance
Security Standardisation
Law, Legal and Ethics
Digital Services
Web Services
Internet Banking
E-Booking
Cloud Computing
E-Government
Electronic Commerce
Citizens Public Online Services
Mobile Commerce
E-Postal Services
E-Health
Online & Virtual Education
E-Learning
Web Chats
Secure Protocols, Coding and Development
Security Principles, Theory and Analysis
Security Policy, Standards and Procedures
Security in Business Processes
Security Enforcing Function (SEF) Gateways
Intrusion Detection Systems
Intrusion Prevention Systems
Firewalls
Anti-Virus and Anti-Malware Gateways
Data Loss Prevention
Encryption Services
Protection of Digital Services
Protection of Business Information Systems
Protection of Online Services
Public Online Services
Internet Banking
Security, Trust, Privacy
Security in Online Gaming Systems
Security in e-Government and Electoral Systems
Content Security
Protection of Public Online Content Distribution Systems
Secure practices, processes and procedures in Public Online Services
Cryptography - PKI, HSMs, Symmetric and Asymmetric Crypto, Crypto Custodian & Crypto Standards and Practices
Digital Forensics and Investigations
HoneyPots and Honey Nets
Critical National Infrastructures (CNIs)
Critical Network Systems (CNS)
Security Operations Centre
Cyber Security Operations Centre (CSOC)
Joint Security Operations Centre (JSOC)
Strategic Security Operations Centre (SSOC)
Virtual Security Operations Centre (vSOC)
Cyber SOC Designs
SOC Design Architecture Patterns
Threat Intelligence
Fusion Centre & Cyber Centre
Operations Monitoring Centre
Security Monitoring
Transaction Monitoring
Web Fraud Detection (WFD)
Incident Management
Cyber Incident Response
Anomaly Detection
Heuristic Learning
Intrusion Detection
Computer Misuse and Abuse
Security Operations Centre Management
Design Requirements
Principles and Operations
SOC Security Operating Procedures (SOC SyOPs)
Architectures and Design Considerations
Implementation of SOC Centres
Monitoring and Security Analysis
Security Information and Event Management (SIEM)
Log Analysis & Analytics
IDS/IPS & Firewall Administration
Alerting and Event Prioritisation
Log Management
Analysis Tools and Techniques
Incident Triage
Incident Analysis, Management, Reporting and Escalation
Management Reports and Management Information (MI) Reports
Coordination and Containment
Collaboration and Incident Investigation
National CERT Liaison
Model of Operations
Intelligence Interfaces and Threat Intelligence Feeds
Asset Management, Prioritisation and Categorisation
Investigation & Forensic Readiness
Network Operations Centre (NOC)
Functions of NOCs
Design Principles
Design Architectures and Design Requirements
Monitoring and Analysis
Coordination
Incident Response & Handling
Incident Management
Operations Management
Models of Operations
System Interfaces and Automation
Asset Management
Data Leak Prevention (DLP)
Denial and Distributed Denial of Service (DDoS)
Vulnerability Management
Vulnerability Scanning, Ranking and Prioritisation
IT Health Checks (ITHC)
Vulnerability Analysis
Vulnerability Management
Asset Management & Configuration Management Database
Business Information Systems Management
Asset Classification, Categorisation & Prioritisation
Remediation and Optimisation
Remedial Action Plans
Risk Management
Business Process Optimisation
Security Management
Policy and Standards Compliance
Vulnerability Management
Accreditation & Assurance
Security Assurance and Certification
Process, Procedure and Standardisation
Global IT Outsourcing
Supplier Management
06月11日
2018
06月12日
2018
初稿截稿日期
初稿录用通知日期
终稿截稿日期
注册截止日期
2019年06月03日 英国 Oxford
2019 International Conference on Cyber Security and Protection of Digital Services2017年06月19日 英国 London,United Kingdom
2017 International Conference On Cyber Security And Protection Of Digital Services2016年06月13日 英国 London, United Kingdom
2016 International Conference On Cyber Security And Protection Of Digital Services
留言