征稿已开启

查看我的稿件

注册已开启

查看我的门票

已截止
活动简介

Following the successful, 10th ICGS3, we have much pleasure in announcing the 11th International conference on Global Security, Safety and Sustainability. In an era of unprecedented volatile, political and economic environment across the world, computer based systems face ever more increasing challenges, disputes and responsibilities and while the Internet has created a global platform for the exchange of ideas, goods and services, however, it has also created boundless opportunities for cyber-crime.

Therefore, the role of Information systems in facilitating secure economic transactions and maintaining steady and reliable sources of information that support politically stable and sustainable socio-economic systems is becoming increasingly critical.

As increasing number of large organizations and individuals use the Internet and its satellite mobile technologies, they are increasingly vulnerable to cyber-crime threats. It is therefore paramount that the security industry raises its game to combat these threats. This is an issue of global importance as law enforcement agencies all over the world are struggling to cope.

This Annual International Conference is an established platform in which security, safety and sustainability issues can be examined from several global perspectives through dialogue between academics, students, government representatives, chief executives, security professionals, and research scientists from the United Kingdom and from around the globe.

The three day conference will focus on the challenges of complexity, rapid pace of change and risk/opportunity issues associated with the 21st century living style, systems and infrastructures.

征稿信息

重要日期

2016-07-28
初稿截稿日期
2016-09-15
终稿截稿日期

征稿范围

Systems Security, Safety and Sustainability Cyber Infrastructure protection

  • Internet of Things

  • Security and Systems assurance Frameworks

  • Safety & Security in System of Systems

  • Intelligent sensors for identity management

  • Trusted Systems and Devices

  • Geo-information and Geo-spatial Intelligence security systems (GIS)

  • Data and Telecommunication Networks security

  • Biometric Recognition systems and Biometry information exchange security

  • Networks Privacy Security

  • Memory Management and digital rights management units

  • Safety and Security Evaluation, Assessment and Certification

  • Modelling Approaches and Frameworks

  • Natural and physical resources security, protection of forest areas and management of large scale fire and events

The future of digital forensics

  • Cloud forensics

  • Computer forensics and anti-forensics

  • Mobile and handheld devices forensics

  • Chain of Custody, recovery, storage and preservation

  • Tools and applications

  • Incident response and investigation

  • Standards and procedures

  • Steganography

  • E-discovery and data analysis

  • Network traffic analysis

  • Case studies and best practices

Information Systems security management

  • Information systems

  • Information security management systems

  • Risk Management

  • Cyber risk management

  • Cyber resilience

  • Safety, reliability and risk analysis

  • Strategic approaches to security

  • Fraud management

  • IT Audit, Governance and Security

  • Compliance and certification

  • Risk assessment, methodologies and tools

  • Social media control, risk and governance

Cyber law and cyber arbitration

  • Legal and ethical aspects of digital forensics

  • Privacy (e.g. mail monitoring, location and mobility management, Web 2.0)

  • Data Protection

  • Confidentiality

  • e-Identification (e.g. Evolving EU legal framework, identity related rights)

  • Legal issues related to cloud computing

  • Jurisdiction (e.g. Cyberspace)

  • Electronic Commerce and virtual entities

  • Intellectual Property rights (e.g. copyright, trademarks)

  • Cyber crime

Secure Software Engineering

  • Security and Privacy design in traditional and cloud-based systems

  • Security and Privacy architecture and design for software and systems

  • Methods and models for Security and Privacy

  • Support tools for modelling Security and Privacy

  • Methods and tools for modelling Trust

  • Security and Privacy methods and tools for cloud forensics

  • Methods for security reengineering

  • Case studies in modelling secure and privacy-oriented Information Systems in cloud environments

  • Privacy Enhancing Technologies for the realization of trustworthy Information Systems

  • Human aspects in Security and Privacy

  • Security and Privacy Adaptation

Cyber Intelligence and operation

  • Cyber-crime detection and prevention

  • Cyber-criminology, Criminal data mining and threat Analysis and prediction

  • Crime information intelligence network

  • Cyber threat intelligence

  • Cyber War

  • Open source intelligence

  • Law Enforcement Agencies

  • Social media

  • Attack pattern recognition

  • Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) support systems

  • Cloud Computing Security

  • Enterprise Architecture Security

  • Security in Mobile Operating Environments

  • Enterprise Architecture Security

  • Mass interception communication solutions

  • Content Digitisation security and Mass Data Storage Banks protection

  • Counterintelligence Management

Remote system intelligence and counter measures

  • Access controls

  • Detection and remediation of security breaches

  • Business continuity planning

  • Disaster recovery planning

  • Black hat, White hat and grey hat hacking

  • Honeypots

  • Rootkits

  • Vulnerability assessments – lessons learned, Current operating system vulnerabilities and loopholes.

  • War driving

  • Wi-Fi vulnerabilities

  • The past, present and future of computer hacking

  • Technical measures for self-protection

  • Investigative/ mitigate methods and techniques to apprehend an offender

  • Computer forensic tools (types) used in investigating a crime scene, Data analysis and root cause

  • Forensics and assistance of hacked environment, tools (types) used in investigating a crime scene, Data analysis and root cause

  • Technical methods in collecting volatile and non- volatile information.

  • Legislation and evidence for prosecution

Cyber security education, training and awareness development

  • Skills to participate in a 21st century economy

  • Cybersecurity education and training development

  • Digital forensics Training and education

  • Certification

  • Cybersecurity Workforce Framework and implementations

  • Partnership function between academia, private sector training organisations and the governments

  • Cybersecrity awareness

  • Cyber security, resources programme and resources for schools

  • Improving cyberspace security through International partnership

留言
验证码 看不清楚,更换一张
全部留言
重要日期
  • 会议日期

    01月18日

    2017

    01月20日

    2017

  • 07月28日 2016

    初稿截稿日期

  • 09月15日 2016

    终稿截稿日期

  • 01月20日 2017

    注册截止日期

联系方式
移动端
在手机上打开
小程序
打开微信小程序
客服
扫码或点此咨询