[FZH] Call for Participation: The International Conference on Digital Security and Forensics (DigitalSec2014), Czech Republic

International Conference on Digital Security and Forensics (DigitalSec2014) digitalsec2014 at sdiwc.net
Mon May 5 23:45:08 UTC 2014

The International Conference on Digital Security and Forensics
VSB-Technical University of Ostrava, Czech Republic
June 24-26, 2014


The proposed conference will be held at VSB-Technical University of
Ostrava, Czech Republic. From June 24-26, 2014 which aims to enable
researchers build connections between different digital applications.
The conference welcomes papers on the following (but not limited to)
research topics:

- Distributed and Pervasive Systems Security
- Enterprise Systems Security
- Formal Methods Application in Security
- Hardware-Based security
- Incident Handling and Penetration Testing
- Legal Issues
- Multimedia and Document Security
- Operating Systems and Database Security
- Privacy issues
- Secure Software Development, Architecture and Outsourcing
- Security for Future Networks
- Security in Cloud Computing
- Security in Social Networks
- Security of Web-based Applications and Services
- Security protocols
- VOIP, Wireless and Telecommunications
- Network Security
- SCADA and Embedded systems security
- Anti-cyberterrorism
- Anti-Forensics and Anti-Anti-Forensics Techniques
- Cyber-Crimes
- Data leakage, Data protection and Database forensics
- Evidentiary Aspects of Digital Forensics
- Executable Content and Content Filtering
- File System and Memory Analysis Multimedia Forensic
- Forensics of Virtual and Cloud Environments
- Information Hiding
- Investigation of Insider Attacks
- Large-Scale Investigations
- Malware forensics and Anti-Malware techniques
- New threats and Non-Traditional approaches
- Network Forensics and Traffic Analysis
- Hardware Vulnerabilities and Device Forensics
- Computer Forensics
- Business Continuity & Disaster Recovery Planning
- Corporate Governance
- Critical Infrastructure Protection
- Decidability and Complexity
- Digital Rights Management and Intellectual Property Protection
- Economics of Security
- Fraud Management
- Identity Management
- Laws and Regulations
- Security Policies and Trust Management
- Threats, Vulnerabilities, and Risk Management
- Computer Crime Prevention and Detection
- Authentication and Access Control Systems
- Biometrics Applications
- Biometrics standards and standardization
- Cyber Peacefare Trends and Approaches
- Electronic Passports, National ID and Smart Card Security
- New theories and algorithms in biometrics
- Social engineering
- Surveillance Systems
- Template Protection and Liveliness detection
- Computer Security
- Confidentiality Protection
- Cryptography and Data Protection
- Forensics, Recognition Technologies and Applications
- Network Security
- Security; Authentication and Cryptography for Wireless Networks

Researchers are encouraged to submit their work electronically. All papers
will be fully refereed by a minimum of two specialized referees. Before
final acceptance, all referees comments must be considered.

Best selected papers will be published in one of the following special
issues provided that the author do major improvements and extension within
the time frame that will be set by the conference and his/her paper is
approved by the chief editor:

International Journal of New Computer Architectures and their Applications
International Journal of Digital Information and Wireless Communications
International Journal of Cyber-Security and Digital Forensics (IJCSDF)
International Journal of E-Entrepreneurship and Innovation (IJEEI)
International Journal of E-Services and Mobile Applications (IJESMA)

Submission Deadline        : May 25, 2014
Notification of Acceptance : 3 days from the submission date
Camera Ready Submission    : June 14, 2014
Last Day for Registration  : June 14, 2014, however, it is recommended to
do it few days before
Conference Dates           : June 24-26, 2014

More information about the Chinese mailing list