征稿已开启

查看我的稿件

注册已开启

查看我的门票

已截止
活动简介

International Conference on Cyber Security and Protection of Digital Services - Cyber Security 2018 - is an IEEE Technically Co-Sponsored (TCS) and internationally refereed conference dedicated to the advancement of Cyber Security, information security, network security, application security and business transformation of digital services, and the protection of public digital services, especially high value bearing online services.

The aim of the Cyber Security 2018 is to encourage participation and promotion of collaborative scientific, industrial and academic inter-workings among individual researchers, practitioners, members of existing associations, academia, standardisation bodies, and including government departments and agencies. The purpose is to build bridges between academia and industry, and to encourage interplay of different culture.

Cyber Security 2018 invites researchers and industry practitioners to submit papers that encompass principles, analysis, design, methods and applications. All submitted papers are independently peer-reviewed.

征稿信息

重要日期

2018-01-26
初稿截稿日期
2018-03-26
初稿录用日期
2018-04-14
终稿截稿日期

征稿范围

Original papers are invited on recent advances in Cyber Security, Online Services, and Protection Mechanisms for Digital Services. The topics in Cyber Security 2018 include but not limited to:

Cyber Security

  • Information Security

  • Computer Network Security

  • Application Security

  • Web Services Security

  • Mobile Security

  • Protective Security

  • Software Security

  • Wireless & Sensor Network Security

  • Software Coding Security

  • Barcode Scanner Security

  • Security in Middleware, Interface and Interaction

  • Security Services in Authentication, Authorisation, Accountability, Automation, Availability, Integrity and Nonrepudiation

  • Security Management

  • Security Operations

  • Digital Trust and Reputation

  • Geographical Location (IP Geolocation) and Cyber Travel

  • Geospatial Intelligence Networks (Centralised, Distributed & Hybrid)

  • Policy, Legal, Legislation & Compliance

  • Security Standardisation

  • Law, Legal and Ethics

Digital Services

  • Web Services

  • Internet Banking

  • E-Booking

  • Cloud Computing

  • E-Government

  • Electronic Commerce

  • Citizens Public Online Services

  • Mobile Commerce

  • E-Postal Services

  • E-Health

  • Online & Virtual Education

  • E-Learning

  • Web Chats

  • Secure Protocols, Coding and Development

  • Security Principles, Theory and Analysis

  • Security Policy, Standards and Procedures

  • Security in Business Processes

  • Security Enforcing Function (SEF) Gateways

  • Intrusion Detection Systems

  • Intrusion Prevention Systems

  • Firewalls

  • Anti-Virus and Anti-Malware Gateways

  • Data Loss Prevention

  • Encryption Services

Protection of Digital Services

  • Protection of Business Information Systems

  • Protection of Online Services

  • Public Online Services

  • Internet Banking

  • Security, Trust, Privacy

  • Security in Online Gaming Systems

  • Security in e-Government and Electoral Systems

  • Content Security

  • Protection of Public Online Content Distribution Systems

  • Secure practices, processes and procedures in Public Online Services

  • Cryptography  -  PKI, HSMs, Symmetric and Asymmetric Crypto, Crypto Custodian & Crypto Standards and Practices

  • Digital Forensics and Investigations

  • HoneyPots and Honey Nets

  • Critical National Infrastructures (CNIs)

  • Critical Network Systems (CNS) 

Security Operations Centre

  • Cyber Security Operations Centre (CSOC)

  • Joint Security Operations Centre (JSOC)

  • Strategic Security Operations Centre (SSOC)

  • Virtual Security Operations Centre (vSOC)

  • Cyber SOC Designs

  • SOC Design Architecture Patterns

  • Threat Intelligence

  • Fusion Centre & Cyber Centre

  • Operations Monitoring Centre

  • Security Monitoring

  • Transaction Monitoring

  • Web Fraud Detection (WFD)

  • Incident Management

  • Cyber Incident Response

  • Anomaly Detection

  • Heuristic Learning

  • Intrusion Detection

  • Computer Misuse and Abuse

Security Operations Centre Management

  • Design Requirements

  • Principles and Operations

  • SOC Security Operating Procedures (SOC SyOPs)

  • Architectures and Design Considerations

  • Implementation of SOC Centres

  • Monitoring and Security Analysis

  • Security Information and Event Management (SIEM)

  • Log Analysis & Analytics

  • IDS/IPS & Firewall Administration

  • Alerting and Event Prioritisation

  • Log Management

  • Analysis Tools and Techniques

  • Incident Triage

  • Incident Analysis, Management, Reporting and Escalation

  • Management Reports and Management Information (MI) Reports

  • Coordination and Containment

  • Collaboration and Incident Investigation

  • National CERT Liaison

  • Model of Operations

  • Intelligence Interfaces and Threat Intelligence Feeds

  • Asset Management, Prioritisation and Categorisation

  • Investigation & Forensic Readiness

Network Operations Centre (NOC)

  • Functions of NOCs

  • Design Principles

  • Design Architectures and Design Requirements

  • Monitoring and Analysis

  • Coordination

  • Incident Response & Handling

  • Incident Management

  • Operations Management

  • Models of Operations

  • System Interfaces and Automation

  • Asset Management

  • Data Leak Prevention (DLP)

  • Denial and Distributed Denial of Service (DDoS)

Vulnerability Management

  • Vulnerability Scanning, Ranking and Prioritisation

  • IT Health Checks (ITHC)

  • Vulnerability Analysis

  • Vulnerability Management

  • Asset Management & Configuration Management Database

  • Business Information Systems Management

  • Asset Classification, Categorisation & Prioritisation

Remediation and Optimisation

  •  Remedial Action Plans

  • Risk Management

  • Business Process Optimisation

  • Security Management

  • Policy and Standards Compliance

  • Vulnerability Management

  • Accreditation & Assurance

  • Security Assurance and Certification

  • Process, Procedure and Standardisation

  • Global IT Outsourcing

  • Supplier Management

留言
验证码 看不清楚,更换一张
全部留言
重要日期
  • 会议日期

    06月11日

    2018

    06月12日

    2018

  • 01月26日 2018

    初稿截稿日期

  • 03月26日 2018

    初稿录用通知日期

  • 04月14日 2018

    终稿截稿日期

  • 06月12日 2018

    注册截止日期

移动端
在手机上打开
小程序
打开微信小程序
客服
扫码或点此咨询