Symposium on Cyber Warfare, Cyber Defense, & Cyber Security (CSCI-ISCW)

by admin last modified Sep 08, 2018 05:23 PM
All accepted papers of this symposium will be published by Conference Publishing Services, CPS:

https://www.computer.org/web/cs-cps/ as part of the proceedings of The 2018 International Conference on Computational Science and Computational Intelligence (CSCI'18).

 Past conference proceedings can be accessed via IEEE Xplore Digital Library at:

   Volume (2017):    Pending (end of September 2018 according to IEEE Xplore management

 

You are invited to Submit a Paper for Consideration. Submissions are to be uploaded to the Evaluation Web site portal at: https://american-cse.org/

Scope & Topics

Prologue:
   Cyber Warfare adds an additional dimension to warfare. Generally, it
   involves the battlespace use and targeting of computers and networks in
   warfare. Cyber Warfare strategies include both offensive and defensive
   operations pertaining to the threat of cyberattacks, espionage, sabotage,
   disruptions to infrastructures, theft of critical information, and
   publishing deliberate misinformation (fake news and fabricated news)
   spread via traditional media and online social media with the intend to
   mislead in order to disrupt the political processes of nations. The
   methods and technologies utilized in Cyber Warfare can be countered
   using Cyber Defense strategies. Cyber Defense strategies involve the
   heavy and targeted use of Cyber Security. Topics of interest include:
 
     - Cyber Warfare Technologies and Strategies
     - Cyber Defense Technologies and Strategies
     - Authorization Infrastructures
     - Autonomous Security Methods
     - Novel Biometric Methods
     - Cloud Security
     - Forensic Technologies
     - Cryptography and Formal Methods
     - Trapping Technologies
     - Data Protection Methods
     - Security and Reverse Engineering
     - Vulnerability Analysis
     - Steganography and Steganalysis
     - Identity Management
     - Security Policies
     - Legislation and Regulatory Approaches for Enhancing Security
     - Safe Computing
     - Identification and Prevention of Online Scams
     - Mobile Protection Techniques
     - Security Risk Analysis, Management and Trade-offs
     - Identity, Privacy and Trust Management
     - Security by Design
     - Incident Response Methods
     - Cybercrime and Underground Economy - Identification and Prevention
     - Detection of Malicious Software
     - Novel Security Tools
     - Lifecycle Security Management and Identification of the Weakest Links
     - Internet Security
     - Network Security
     - Computer Security
     - Prevention of Cyber Attacks on Critical Infrastructures
     - Methodologies in Reducing National Vulnerability to Cyber Attacks
     - Methods for Minimizing Damage and Recovery Time from Cyber Attacks
     - Prevention of Fake and Fabricated News - Media Trust Management
     - Cyber Warfare and Attack Prevention during Elections
     - Secure Voting Systems
     - Securing Electric Power Grids + Smart Grids
     - Securing Communication Systems
     - Cyber Counter-intelligence
     - Tools in Cyber Warfare and Cyber Defense Arsenal
     - Innovative Tools for Cyber Defense Technologies
     - Cyber Weapons
     - Cyber Space and Security
     - Threats from Social Media
     - Crime and Terrorism
     - IT and Countering Violent Extremism
     - Global Security
     - Data Analytics and Cyber Warfare
     - Prevention of Bad Data Injection
     - Advanced Persistent Threat (APT) and Prevention
     - Data Exfiltration
     - Tools for Countering Attacks by Viruses, Worms, Malware, Phishing,
       SQL Injection Attack, Cross-Site Scripting, Session Hijacking,
       Trojan Horses, Rootkits, Botnets, ...
     - Security and Social Engineering
     - Tools for Countering Logic Bomb, Time Bomb, Distributed
       Denial-of-Service Attack, ...
     - Methodologies to Address System and Data Vulnerabilities
     - Novel Patching Techniques
     - Next Generation Firewalls
     - Intrusion Detection Techniques
     - Terrorism Databases and Resources
     - Terrorist Networks
     - Threat Assessment
     - Cyber Vandalism and Defense
     - Cyber Security and Terrorism
     - Counter-terrorism
     - Cyber Tools and Identification of Propaganda
     - Security Education and Training
Filed under: ,