会议信息
ICCICS 2014: International Conference on Cyber-Crime Investigation and Cyber Security
请登录查看会议网址
截稿日期: |
2014-11-02 Extended |
通知日期: |
2014-11-04 |
会议日期: |
2014-11-17 |
会议地点: |
Kuala Lumpur, Malaysia |
浏览: 13215 关注: 1 参加: 0
征稿
You are invited to participate in The International Conference on Cyber-Crime Investigation and Cyber Security (ICCICS2014) that will be held in Asia Pacific University of Technology and Innovation (APU), Kuala Lumpur, Malaysia on November 17-19, 2014 as part of The Third World Congress on Computing and Information Technology (WCIT). The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures.
The conference welcomes papers on the following (but not limited to) research topics:
Business Applications of Digital Forensics
Civil Litigation Support
Cyber Crime Investigations
Cyber Criminal Psychology and Profiling
Cyber Culture & Cyber Terrorism
Digital Forensic Case Studies
Digital Forensic Processes and Workflow Models
Digital Forensics & Law
Digital Forensics Process & Procedures
Digital Forensics Standardization & Accreditation
Digital Forensics Techniques and Tools
E-Discovery
Embedded Device Forensics
Hacking
Incident Response
Information Warfare & Critical Infrastructure Protection
Legal, Ethical and Policy Issues Related to Digital Forensics
Malware & Botnets
Mobile / Handheld Device & Multimedia Forensics
Money Laundering
Network and Cloud Forensics
Online Fraud
Sexual Abuse of Children On Internet
Software & Media Piracy
Theoretical Foundations of Digital Forensics
Theories, Techniques and Tools for Extracting, Analyzing and Preserving Digital Evidence
The conference welcomes papers on the following (but not limited to) research topics:
Business Applications of Digital Forensics
Civil Litigation Support
Cyber Crime Investigations
Cyber Criminal Psychology and Profiling
Cyber Culture & Cyber Terrorism
Digital Forensic Case Studies
Digital Forensic Processes and Workflow Models
Digital Forensics & Law
Digital Forensics Process & Procedures
Digital Forensics Standardization & Accreditation
Digital Forensics Techniques and Tools
E-Discovery
Embedded Device Forensics
Hacking
Incident Response
Information Warfare & Critical Infrastructure Protection
Legal, Ethical and Policy Issues Related to Digital Forensics
Malware & Botnets
Mobile / Handheld Device & Multimedia Forensics
Money Laundering
Network and Cloud Forensics
Online Fraud
Sexual Abuse of Children On Internet
Software & Media Piracy
Theoretical Foundations of Digital Forensics
Theories, Techniques and Tools for Extracting, Analyzing and Preserving Digital Evidence
最后更新 Dou Sun 在 2014-10-31
相关会议
| CCF | CORE | QUALIS | 简称 | 全称 | 截稿日期 | 通知日期 | 会议日期 |
|---|---|---|---|---|---|---|---|
| b | b3 | ICISS | International Conference on Information Systems Security | 2026-07-10 | 2026-09-10 | 2026-12-16 | |
| a | a* | a1 | CCS | ACM Conference on Computer and Communications Security | 2026-04-22 | 2026-07-17 | 2026-11-15 |
| c | b | b1 | SOUPS | International Symposium On Usable Privacy and Security | 2026-02-12 | 2026-05-19 | 2026-08-23 |
| c | b | b1 | AsiaCCS | ACM ASIA Conference on Computer and Communications Security | 2025-12-12 | 2026-03-10 | 2026-06-01 |
| c | b | a2 | ISC | Information Security Conference | 2025-06-04 | 2025-07-29 | 2025-10-20 |
| c | b3 | CIS | International Conference on Computational Intelligence and Security | 2020-08-05 | 2020-08-31 | 2020-11-27 | |
| c | CRITIS | International Conference on Critical Information Infrastructures Security | 2018-04-30 | 2018-06-18 | 2018-09-24 | ||
| c | IAS | International Conference on Information Assurance and Security | 2015-10-21 | 2015-11-10 | 2015-12-07 | ||
| b2 | CICC | IEEE Custom Integrated Circuits Conference | 2015-05-04 | 2015-09-28 | |||
| b4 | MINES | International Conference on Multimedia Information Networking and Security | 2013-07-20 | 2013-07-25 | 2013-11-01 |
相关期刊
| CCF | 全称 | 影响因子 | 出版商 | ISSN |
|---|---|---|---|---|
| a | IEEE Transactions on Information Forensics and Security | 8.0 | IEEE | 1556-6013 |
| Journal of Enterprise Information Management | 6.4 | Emerald | 1741-0398 | |
| Enterprise Information Systems | 3.9 | Taylor & Francis | 1751-7575 | |
| International Journal of Information Security | 3.2 | Springer | 1615-5262 | |
| c | Journal of Cybersecurity | 3.2 | Oxford University Press | 2057-2093 |
| ACM Transactions on Privacy and Security | 2.8 | ACM | 2471-2566 | |
| c | EURASIP Journal on Information Security | 2.1 | Springer | 1687-417X |
| c | IET Information Security | 1.300 | IET | 1751-8709 |
| c | International Journal of Information Security and Privacy | 0.800 | Idea Group Inc | 1930-1650 |
| c | International Journal of Cooperative Information Systems | 0.500 | World Scientific | 0218-8430 |