活动简介

In an era of unprecedented volatile, political and economic environment across the world, computer based systems face ever more increasing challenges, disputes and responsibilities and while the Internet has created a global platform for the exchange of ideas, goods and services, however, it has also created boundless opportunities for cyber-crime. This Annual International Conference is an established platform in which security, safety and sustainability issues can be examined from several global perspectives through dialogue between academics, students, government representatives, chief executives, security professionals, and research scientists from the United Kingdom and from around the globe. The three day conference will focus on the challenges of complexity, rapid pace of change and risk/opportunity issues associated with the 21st century living style, systems and infrastructures.

征稿信息

重要日期

2018-06-11
初稿截稿日期

征稿范围

The list of topics includes (but are not limited to):

Systems Security, Safety and Sustainability Cyber Infrastructure Protection

  • Internet of Things
  • SCADA and Ransomware
  • Transport Security
  • Cyber Warfare
  • Modelling Approaches, Security and Systems Assurance Frameworks
  • Safety & Security in System of Systems
  • Trusted Systems and Devices
  • Geo-information and Geo-spatial Intelligence Security Systems (GIS)
  • Networks Security
  • Digital Twins
  • Blockchain
  • Biometric Recognition Systems and Biometry Information Exchange Security
  • Networks Privacy Security
  • Safety and Security Evaluation, Assessment and Certification
  • Large Scale Systems Protection and Management of Major Events
  • Smart Cities

The Future of Digital Forensics 

  • Cloud Forensics
  • Computer Forensics and Anti-Forensics
  • Mobile and Handheld Device Forensics
  • Chain of Custody, Recovery, Storage and Preservation
  • Tools and Applications
  • Incident Response and Investigation
  • Standards and Procedures
  • Steganography
  • E-discovery and Data Analysis
  • Network Traffic Analysis
  • Case Studies and Best Practices
  • Legal Issues Related to Cloud Computing
  • Legal and Ethical Aspects of Digital Forensics
  • Computer Forensic Tools Used in Investigating a Crime Scene, Data Analysis and Root Cause
  • Forensics and Assistance of Hacked Environment, Tools (Types) Used in Investigating a Crime Scene, Data Analysis and Root Cause
  • Technical Methods in Collecting Volatile and Non-Volatile Information
  • Legislation and Evidence for Prosecution

Information Systems Security Management

  • Information Systems
  • Information Security Management Systems
  • Risk Management
  • Cyber Risk Management
  • Cyber Resilience
  • Safety, Reliability and Risk Analysis
  • Strategic Approaches to Security
  • Fraud Management
  • IT Audit, Governance and Security
  • Compliance and Certification
  • Risk Assessment, Methodologies and Tools
  • Social Media Control, Risk and Governance
  • Security and Privacy Architecture and Design For Software and Systems
  • Methods and Models for Security and Privacy
  • Support Tools For Modelling Security and Privacy
  • Methods and Tools For Modelling Trust
  • Human Aspects in Security and Privacy

Cyber Criminology 

  • Cyber-Criminology, Criminal Data Mining, Threat Analysis and Prediction
  • Crime and Social Media
  • Victimisation
  • Cyber Criminology, Theories and Models,
  • Psychology of the Cyber Criminals
  • Cybercrime Policing
  • Cybercrime Justice Models
  • The role of Big data
  • Dark Web/ Darknet
  • Jurisdiction
  • Hacking and Cracking
  • Cyber Bullying, Stoking Etc.
  • Cybercrime Punishment
  • E-Identification (e.g. Evolving EU Legal Framework, Identity Related Rights)
  • Augmented Reality

Cyber Intelligence and Operation

  • Cyber-Crime Detection and Prevention
  • Crime Information Intelligence Network
  • Cyber Threat Intelligence
  • Cyber War
  • Open Source Intelligence
  • Law Enforcement Agencies
  • Social Media
  • Attack Pattern Recognition
  • Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) Support Systems
  • Cloud Computing Security
  • Enterprise Architecture Security
  • Security in Mobile Operating Environments
  • Enterprise Architecture Security
  • Mass Interception Communication Solutions
  • Content Digitisation Security and Mass Data Storage Banks protection
  • Counterintelligence Management

Remote System Intelligence and Counter Measures

  • Access Controls
  • Detection and Remediation of Security Breaches
  • Business Continuity Planning
  • Disaster Recovery Planning
  • Black, White and Grey Hat Hacking
  • Honeypots
  • Rootkits
  • Vulnerability Assessments – Lessons Learned on Current Operating system Vulnerabilities and Loopholes
  • War Driving
  • Wi-Fi Vulnerabilities
  • The Past, Present and Future of Computer Hacking
  • Technical Measures for Self-Protection
  • Investigative, Mitigation Methods and Techniques to Apprehend an Offender
留言
验证码 看不清楚,更换一张
全部留言
重要日期
  • 会议日期

    01月16日

    2019

    01月18日

    2019

  • 06月11日 2018

    初稿截稿日期

  • 01月18日 2019

    注册截止日期

移动端
在手机上打开
小程序
打开微信小程序
客服
扫码或点此咨询