会议信息
ICCICS 2014: International Conference on Cyber-Crime Investigation and Cyber Security
http://sdiwc.net/conferences/2014/iccics2014/截稿日期: |
2014-11-02 Extended |
通知日期: |
2014-11-04 |
会议日期: |
2014-11-17 |
会议地点: |
Kuala Lumpur, Malaysia |
浏览: 11880 关注: 1 参加: 0
征稿
You are invited to participate in The International Conference on Cyber-Crime Investigation and Cyber Security (ICCICS2014) that will be held in Asia Pacific University of Technology and Innovation (APU), Kuala Lumpur, Malaysia on November 17-19, 2014 as part of The Third World Congress on Computing and Information Technology (WCIT). The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures. The conference welcomes papers on the following (but not limited to) research topics: Business Applications of Digital Forensics Civil Litigation Support Cyber Crime Investigations Cyber Criminal Psychology and Profiling Cyber Culture & Cyber Terrorism Digital Forensic Case Studies Digital Forensic Processes and Workflow Models Digital Forensics & Law Digital Forensics Process & Procedures Digital Forensics Standardization & Accreditation Digital Forensics Techniques and Tools E-Discovery Embedded Device Forensics Hacking Incident Response Information Warfare & Critical Infrastructure Protection Legal, Ethical and Policy Issues Related to Digital Forensics Malware & Botnets Mobile / Handheld Device & Multimedia Forensics Money Laundering Network and Cloud Forensics Online Fraud Sexual Abuse of Children On Internet Software & Media Piracy Theoretical Foundations of Digital Forensics Theories, Techniques and Tools for Extracting, Analyzing and Preserving Digital Evidence
最后更新 Dou Sun 在 2014-10-31
相关会议
| CCF | CORE | QUALIS | 简称 | 全称 | 截稿日期 | 通知日期 | 会议日期 |
|---|---|---|---|---|---|---|---|
| b2 | CICC | IEEE Custom Integrated Circuits Conference | 2015-05-04 | 2015-09-28 | |||
| c | b | b1 | AsiaCCS | ACM ASIA Conference on Computer and Communications Security | 2025-12-12 | 2026-03-10 | 2026-06-01 |
| c | b3 | CIS | International Conference on Computational Intelligence and Security | 2020-08-05 | 2020-08-31 | 2020-11-27 | |
| c | IAS | International Conference on Information Assurance and Security | 2015-10-21 | 2015-11-10 | 2015-12-07 | ||
| c | b | b1 | SOUPS | International Symposium On Usable Privacy and Security | 2025-02-13 | 2025-05-12 | 2025-08-10 |
| c | CRITIS | International Conference on Critical Information Infrastructures Security | 2018-04-30 | 2018-06-18 | 2018-09-24 | ||
| a | a* | a1 | CCS | ACM Conference on Computer and Communications Security | 2025-04-14 | 2025-07-01 | 2025-10-13 |
| c | b | a2 | ISC | Information Security Conference | 2025-06-04 | 2025-07-29 | 2025-10-20 |
| b | b3 | ICISS | International Conference on Information Systems Security | 2025-08-10 | 2025-10-03 | 2025-12-16 | |
| b4 | MINES | International Conference on Multimedia Information Networking and Security | 2013-07-20 | 2013-07-25 | 2013-11-01 |
| 简称 | 全称 | 会议日期 |
|---|---|---|
| CICC | IEEE Custom Integrated Circuits Conference | 2015-09-28 |
| AsiaCCS | ACM ASIA Conference on Computer and Communications Security | 2026-06-01 |
| CIS | International Conference on Computational Intelligence and Security | 2020-11-27 |
| IAS | International Conference on Information Assurance and Security | 2015-12-07 |
| SOUPS | International Symposium On Usable Privacy and Security | 2025-08-10 |
| CRITIS | International Conference on Critical Information Infrastructures Security | 2018-09-24 |
| CCS | ACM Conference on Computer and Communications Security | 2025-10-13 |
| ISC | Information Security Conference | 2025-10-20 |
| ICISS | International Conference on Information Systems Security | 2025-12-16 |
| MINES | International Conference on Multimedia Information Networking and Security | 2013-11-01 |
相关期刊
| CCF | 全称 | 影响因子 | 出版商 | ISSN |
|---|---|---|---|---|
| c | International Journal of Information and Computer Security | Inderscience | 1744-1765 | |
| c | IET Information Security | 1.300 | IET | 1751-8709 |
| International Journal of Information Security | 2.400 | Springer | 1615-5262 | |
| International Journal on Cryptography and Information Security | AIRCC | 1839-8626 | ||
| a | IEEE Transactions on Information Forensics and Security | 6.300 | IEEE | 1556-6013 |
| c | Information Management & Computer Security | Emerald | 0968-5227 | |
| c | EURASIP Journal on Information Security | 2.500 | Springer | 1687-417X |
| ACM Transactions on Privacy and Security | 3.000 | ACM | 2471-2566 | |
| Digital Investigation | Elsevier | 1742-2876 | ||
| b | Journal of Computer Security | IOS Press | 0926-227X |
| 全称 | 影响因子 | 出版商 |
|---|---|---|
| International Journal of Information and Computer Security | Inderscience | |
| IET Information Security | 1.300 | IET |
| International Journal of Information Security | 2.400 | Springer |
| International Journal on Cryptography and Information Security | AIRCC | |
| IEEE Transactions on Information Forensics and Security | 6.300 | IEEE |
| Information Management & Computer Security | Emerald | |
| EURASIP Journal on Information Security | 2.500 | Springer |
| ACM Transactions on Privacy and Security | 3.000 | ACM |
| Digital Investigation | Elsevier | |
| Journal of Computer Security | IOS Press |