by admin last modified Aug 19, 2017 01:33 PM




All accepted papers of all symposiums will be published by Conference Publishing Services, CPS: as part of the proceedings of The 2017 International Conference on Computational Science and Computational Intelligence (CSCI'17).

Past year's CSCI proceedings are indexed into IEEE Xplore Digital Library and can be accessed via:


Topics of interest include, but are not limited to the following

Prologue: Cyber Warfare adds an additional dimension to warfare. Generally, it involves the battlespace use and targeting of computers and networks in warfare. Cyber Warfare strategies include both offensive and defensive operations pertaining to the threat of cyberattacks, espionage, sabotage, disruptions to infrastructures, theft of critical information, and publishing deliberate misinformation (fake news and fabricated news) spread via traditional media and online social media with the intend to mislead in order to disrupt the political processes of nations. The methods and technologies utilized in Cyber Warfare can be countered using Cyber Defense strategies. Cyber Defense strategies involve the heavy and targeted use of Cyber Security. Topics of interest include:
     - Cyber Warfare Technologies and Strategies
     - Cyber Defense Technologies and Strategies
     - Authorization Infrastructures
     - Autonomous Security Methods
     - Novel Biometric Methods
     - Cloud Security
     - Forensic Technologies
     - Cryptography and Formal Methods
     - Trapping Technologies
     - Data Protection Methods
     - Security and Reverse Engineering
     - Vulnerability Analysis
     - Steganography and Steganalysis
     - Identity Management
     - Security Policies
     - Legislation and Regulatory Approaches for Enhancing Security
     - Safe Computing
     - Identification and Prevention of Online Scams
     - Mobile Protection Techniques
     - Security Risk Analysis, Management and Trade-offs
     - Identity, Privacy and Trust Management
     - Security by Design
     - Incident Response Methods
     - Cybercrime and Underground Economy - Identification and Prevention
     - Detection of Malicious Software
     - Novel Security Tools
     - Lifecycle Security Management and Identification of the Weakest Links
     - Internet Security
     - Network Security
     - Computer Security
     - Prevention of Cyber Attacks on Critical Infrastructures
     - Methodologies in Reducing National Vulnerability to Cyber Attacks
     - Methods for Minimizing Damage and Recovery Time from Cyber Attacks
     - Prevention of Fake and Fabricated News - Media Trust Management
     - Cyber Warfare and Attack Prevention during Elections
     - Secure Voting Systems
     - Securing Electric Power Grids + Smart Grids
     - Securing Communication Systems
     - Cyber Counter-intelligence
     - Tools in Cyber Warfare and Cyber Defense Arsenal
     - Innovative Tools for Cyber Defense Technologies
     - Cyber Weapons
     - Cyber Space and Security
     - Threats from Social Media
     - Data Analytics and Cyber Warfare
     - Prevention of Bad Data Injection
     - Advanced Persistent Threat (APT) and Prevention
     - Data Exfiltration
     - Tools for Countering Attacks by Viruses, Worms, Malware, Phishing, SQL Injection Attack, Cross-Site    
        Scripting, Session Hijacking, Trojan Horses, Rootkits, Botnets, ...
     - Security and Social Engineering
     - Tools for Countering Logic Bomb, Time Bomb, Distributed Denial-of-Service Attack, ...
     - Methodologies to Address System and Data Vulnerabilities
     - Novel Patching Techniques
     - Next Generation Firewalls
     - Intrusion Detection Techniques
     - Cyber Vandalism and Defense
     - Cyber Security and Terrorism
     - Cyber Tools and Identification of Propaganda
Filed under: ,