征稿已开启

查看我的稿件

注册已开启

查看我的门票

已截止
活动简介

Cyber security has become an important research and development area for academia, government, and industry in recent years. The advent of big data,

Authors of selected papers will also be invited to prepare extended papers of their work for publication in the International Journal of Electronic Security and Digital Forensics

social media and mobile technology growth and the coming of the internet of things (IoT) have led to new opportunities in cyber security and cyber forensic work. To counter this, a multidisciplinary effort involving stakeholders from cyber security, the legal profession, academia, public citizens, and law enforcement agencies is required. The Cyber security and Cyber forensics Conference (CCC 2016) brings together thought-leaders from these separate fields to discuss current and future approaches, technologies and legislation pertinent to the detection, prevention, investigation and prosecution of cybercrime and cyber attacks. The conference offers an interdisciplinary venue to discuss challenges, technologies, and emerging trends.

CCC 2016 invites researchers and practitioners from academia, industry and government, and accepts original, previously unpublished work. The scope of the conference is narrow to ensure a complementary match between capability and need. Papers should either be empirically or rationally based explorations of problems in cyber security and cyber forensic, or propose solutions and/or countermeasures to the most pressing cybercrimes.

征稿信息

重要日期

2016-06-13
初稿截稿日期

征稿范围

  • Attack strategy analysis & modelling

  • Cybercrime scenario analysis and reconstruction

  • Techniques for evidence collection, search, analysis, correlation and preservation and presentation

  • Security & Social Networks

  • Anomaly detection of web-based attacks

  • Malicious Spam detection

  • Botnet Detection and prevention

  • Wireless Network Security and Forensics

  • Cloud Computing Security and the Forensics of Big Data

  • Privacy, ethical and legal issues

  • Forensic Investigation of the Internet of Things

  • Anti-Forensics and Data Hiding Techniques and Discoveries

  • Malware Analysis and Memory Forensic Techniques

  • Advanced Persistent Threats (APTs)

  • System Forensic Techniques for Windows, Linux, Mac, etc

  • File System Forensic Analysis

  • Hacking Techniques: Client-Side Attacks

  • Malicious Content Detection and Analysis Techniques

  • Societal Impact of Cybercrime

  • Defense against cyberterrorism

  • Monitoring and incident response

  • Tools and techniques for network forensics

  • Methodologies for digital forensics

  • Applications of Data Mining for Cybersecurity

  • Cybercrime detection and prevention

  • Mobile Forensics (e.g. Android and iOS devices) and the investigation of embedded devices

  • Forensic software tools and applications

  • Cybercrime Profiling

  • Cybercrime: evolution, new trends and detection

  • Anti-malware techniques: detection, analysis, and prevention

  • Combating cybercrime: anti-phishing, anti-spam, anti-fraud techniques

  • Privacy and anonymity technologies

  • Intrusion prevention, detection, and response

  • Cyberterrorism, Information Warfare & Critical Infrastructure Protection

留言
验证码 看不清楚,更换一张
全部留言
重要日期
  • 08月02日

    2016

    会议日期

  • 06月13日 2016

    初稿截稿日期

  • 08月02日 2016

    注册截止日期

移动端
在手机上打开
小程序
打开微信小程序
客服
扫码或点此咨询