Información de la conferencia
ICCICS 2014: International Conference on Cyber-Crime Investigation and Cyber Security
Por favor Iniciar para ver el sitio web del congreso
Día de Entrega: |
2014-11-02 Extended |
Fecha de Notificación: |
2014-11-04 |
Fecha de Conferencia: |
2014-11-17 |
Ubicación: |
Kuala Lumpur, Malaysia |
Vistas: 13212 Seguidores: 1 Asistentes: 0
Solicitud de Artículos
You are invited to participate in The International Conference on Cyber-Crime Investigation and Cyber Security (ICCICS2014) that will be held in Asia Pacific University of Technology and Innovation (APU), Kuala Lumpur, Malaysia on November 17-19, 2014 as part of The Third World Congress on Computing and Information Technology (WCIT). The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures.
The conference welcomes papers on the following (but not limited to) research topics:
Business Applications of Digital Forensics
Civil Litigation Support
Cyber Crime Investigations
Cyber Criminal Psychology and Profiling
Cyber Culture & Cyber Terrorism
Digital Forensic Case Studies
Digital Forensic Processes and Workflow Models
Digital Forensics & Law
Digital Forensics Process & Procedures
Digital Forensics Standardization & Accreditation
Digital Forensics Techniques and Tools
E-Discovery
Embedded Device Forensics
Hacking
Incident Response
Information Warfare & Critical Infrastructure Protection
Legal, Ethical and Policy Issues Related to Digital Forensics
Malware & Botnets
Mobile / Handheld Device & Multimedia Forensics
Money Laundering
Network and Cloud Forensics
Online Fraud
Sexual Abuse of Children On Internet
Software & Media Piracy
Theoretical Foundations of Digital Forensics
Theories, Techniques and Tools for Extracting, Analyzing and Preserving Digital Evidence
The conference welcomes papers on the following (but not limited to) research topics:
Business Applications of Digital Forensics
Civil Litigation Support
Cyber Crime Investigations
Cyber Criminal Psychology and Profiling
Cyber Culture & Cyber Terrorism
Digital Forensic Case Studies
Digital Forensic Processes and Workflow Models
Digital Forensics & Law
Digital Forensics Process & Procedures
Digital Forensics Standardization & Accreditation
Digital Forensics Techniques and Tools
E-Discovery
Embedded Device Forensics
Hacking
Incident Response
Information Warfare & Critical Infrastructure Protection
Legal, Ethical and Policy Issues Related to Digital Forensics
Malware & Botnets
Mobile / Handheld Device & Multimedia Forensics
Money Laundering
Network and Cloud Forensics
Online Fraud
Sexual Abuse of Children On Internet
Software & Media Piracy
Theoretical Foundations of Digital Forensics
Theories, Techniques and Tools for Extracting, Analyzing and Preserving Digital Evidence
Última Actualización Por Dou Sun en 2014-10-31
Conferencias Relacionadas
Revistas Relacionadas
| CCF | Nombre Completo | Factor de Impacto | Editor | ISSN |
|---|---|---|---|---|
| a | IEEE Transactions on Information Forensics and Security | 8.0 | IEEE | 1556-6013 |
| Journal of Enterprise Information Management | 6.4 | Emerald | 1741-0398 | |
| Enterprise Information Systems | 3.9 | Taylor & Francis | 1751-7575 | |
| International Journal of Information Security | 3.2 | Springer | 1615-5262 | |
| c | Journal of Cybersecurity | 3.2 | Oxford University Press | 2057-2093 |
| ACM Transactions on Privacy and Security | 2.8 | ACM | 2471-2566 | |
| c | EURASIP Journal on Information Security | 2.1 | Springer | 1687-417X |
| c | IET Information Security | 1.300 | IET | 1751-8709 |
| c | International Journal of Information Security and Privacy | 0.800 | Idea Group Inc | 1930-1650 |
| c | International Journal of Cooperative Information Systems | 0.500 | World Scientific | 0218-8430 |