The Third International Conference on Information Security and Cyber Forensics (INFOSEC 2017) is dedicated to cyber security, digital forensics, cyber peacefare and physical security.
Topics
- Digital Forensic
- Cyber-Crimes
- Anti-Forensics and Anti-Forensics Techniques
- Evidentiary Aspects of Digital Forensics
- Data leakage, Data protection and Database forensics
- File System and Memory Analysis Multimedia Forensic
- Executable Content and Content Filtering
- Information Hiding
- Forensics of Virtual and Cloud Environments
- Large-Scale Investigations
- Investigation of Insider Attacks
- Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics
- Malware Forensics and Anti-Malware techniques
- New threats and Non-Traditional Approaches
- Cyber Security
- Enterprise Systems Security
- Distributed and Pervasive Systems Security
- Hardware-Based security
- Formal Methods Application in Security
- Legal Issues
- Incident Handling and Penetration Testing
- Operating Systems and Database Security
- Multimedia and Document Security
- SCADA and Embedded systems security
- Privacy Issues
- Security for Future Networks
- Secure Software Development, Architecture and Outsourcing
- Security in Social Networks
- Security in Cloud Computing
- Security protocols
- Security of Web-based Applications and Services
- VOIP, Wireless and Telecommunications Network Security
- Cyber Peacefare and Physical Security
- Biometrics Applications
- Authentication and Access Control Systems
- Cyber Peacefare Trends and Approaches
- Biometrics standards and standardization
- New theories and algorithms in biometrics
- Electronic Passports, National ID and Smart Card Security
- Surveillance Systems
- Social Engineering
- Template Protection and Liveliness Detection
- Information Assurance and Security Management
- Corporate Governance
- Business Continuity & Disaster Recovery Planning
- Decidability and Complexity
- Critical Infrastructure Protection
- Economics of Security
- Digital Rights Management and Intellectual Property Protection
- Identity Management
- Fraud Management
- Security Policies and Trust Management
- Laws and Regulations
- Threats, Vulnerabilities, and Risk Management
Who should Attend
Attendees involved or interested in:
- Computers
- Cyber forensics
- Computer engineering
- Information technology
- International conference
- Cyber security
- Social engineering