Is it possible to block this spam?

Note that this organization (SDIWC) is listed at
http://scholarlyoa.com/publishers/ (cf.
https://en.wikipedia.org/wiki/Predatory_open_access_publishing ).

On Wed, May 11, 2016 at 3:39 PM, Lubna Kanan <lubna.sd...@yahoo.com> wrote:
> ***************************************************************************
> We apologize for multiples copies. Please circulate this CFP among your
> colleagues and students.
> ***************************************************************************
>
> 2016 Fifth International Conference on Cyber Security, Cyber Warfare,
> and Digital Forensic [CyberSec]
>
> July 26-28, 2016
>
> Manchester, United Kingdom
>
> http://sdiwc.net/conferences/cybersec2016/
>
> All registered papers will be submitted to IEEE for potential inclusion to
> IEEE Xplore
>
> ***************************************************************************
> Paper due:  June 26, 2016
> ***************************************************************************
>
> The proposed conference will be held University of Salford, MediaCityUK,
> Manchester, United Kingdom, From July 26-28, 2016 which aims to enable
> researchers build connections between different digital applications.
>
> The conference welcomes papers on the following (but not limited to)
> research topics:
>
> **Cyber Security
> - Distributed and Pervasive Systems Security
> - Enterprise Systems Security
> - Formal Methods Application in Security
> - Hardware-Based security
> - Incident Handling and Penetration Testing
> - Legal Issues
> - Multimedia and Document Security
> - Operating Systems and Database Security
> - Privacy issues
> - SCADA and Embedded systems security
> - Secure Software Development, Architecture and Outsourcing
> - Security for Future Networks
> - Security in Cloud Computing
> - Security in Social Networks
> - Security of Web-based Applications and Services
> - Security protocols
> - VOIP, Wireless and Telecommunications Network Security
> **Digital Forensic
> - Anti-Forensics and Anti-Anti-Forensics Techniques
> - Cyber-Crimes
> - Data leakage, Data protection and Database forensics
> - Evidentiary Aspects of Digital Forensics
> - Executable Content and Content Filtering
> - File System and Memory Analysis Multimedia Forensic
> - Forensics of Virtual and Cloud Environments
> - Information Hiding
> - Investigation of Insider Attacks
> - Large-Scale Investigations
> - Malware forensics and Anti-Malware techniques
> - Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device
> Forensics
> - New threats and Non-Traditional approaches
> **Information Assurance and Security Management
> - Business Continuity & Disaster Recovery Planning
> - Corporate Governance
> - Critical Infrastructure Protection
> - Decidability and Complexity
> - Digital Rights Management and Intellectual Property Protection
> - Economics of Security
> - Fraud Management
> - Identity Management
> - Laws and Regulations
> - Security Policies and Trust Management
> - Threats, Vulnerabilities, and Risk Management
> **Cyber warfare and Physical Security
> - Surveillance Systems
> - Biometrics Applications
> - Cyber Warfare Trends and Approaches
> - Electronic Passports, National ID and Smart Card Security
> - Social engineering
> - Template Protection and Liveliness detection
> - Authentication and Access Control Systems
> - Biometrics standards and standardization
> - New theories and algorithms in biometrics
>
> ***************************************************************************
> The conference uses double-blind review by at least two reviewers,
> which means that both the reviewer and author identities are concealed
> from the reviewers, and vice versa, throughout the review process.
> To facilitate this, authors need to ensure that their manuscripts are
> prepared in a way that does not give away their identity.
>
> All the registered papers will be submitted to IEEE for potential inclusion
> to IEEE Xplore as well as other Abstracting and Indexing (A&I) databases.
> In addition, BEST registered papers will be published in one of the
> following
> special issues provided that the author do major improvements and extension
> within the time frame that will be set by the conference and his/her paper
> is approved by the chief editor:
>
> * International Journal of New Computer Architectures and their Applications
> (IJNCAA)
> * International Journal of Digital Information and Wireless Communications
> (IJDIWC)
> * International Journal of Cyber-Security and Digital Forensics (IJCSDF)
>
> _______________________________________________
> Mobile-l mailing list
> Mobile-l@lists.wikimedia.org
> https://lists.wikimedia.org/mailman/listinfo/mobile-l
>



-- 
Tilman Bayer
Senior Analyst
Wikimedia Foundation
IRC (Freenode): HaeB

_______________________________________________
Mobile-l mailing list
Mobile-l@lists.wikimedia.org
https://lists.wikimedia.org/mailman/listinfo/mobile-l

Reply via email to