Is it possible to block this spam? Note that this organization (SDIWC) is listed at http://scholarlyoa.com/publishers/ (cf. https://en.wikipedia.org/wiki/Predatory_open_access_publishing ).
On Wed, May 11, 2016 at 3:39 PM, Lubna Kanan <lubna.sd...@yahoo.com> wrote: > *************************************************************************** > We apologize for multiples copies. Please circulate this CFP among your > colleagues and students. > *************************************************************************** > > 2016 Fifth International Conference on Cyber Security, Cyber Warfare, > and Digital Forensic [CyberSec] > > July 26-28, 2016 > > Manchester, United Kingdom > > http://sdiwc.net/conferences/cybersec2016/ > > All registered papers will be submitted to IEEE for potential inclusion to > IEEE Xplore > > *************************************************************************** > Paper due: June 26, 2016 > *************************************************************************** > > The proposed conference will be held University of Salford, MediaCityUK, > Manchester, United Kingdom, From July 26-28, 2016 which aims to enable > researchers build connections between different digital applications. > > The conference welcomes papers on the following (but not limited to) > research topics: > > **Cyber Security > - Distributed and Pervasive Systems Security > - Enterprise Systems Security > - Formal Methods Application in Security > - Hardware-Based security > - Incident Handling and Penetration Testing > - Legal Issues > - Multimedia and Document Security > - Operating Systems and Database Security > - Privacy issues > - SCADA and Embedded systems security > - Secure Software Development, Architecture and Outsourcing > - Security for Future Networks > - Security in Cloud Computing > - Security in Social Networks > - Security of Web-based Applications and Services > - Security protocols > - VOIP, Wireless and Telecommunications Network Security > **Digital Forensic > - Anti-Forensics and Anti-Anti-Forensics Techniques > - Cyber-Crimes > - Data leakage, Data protection and Database forensics > - Evidentiary Aspects of Digital Forensics > - Executable Content and Content Filtering > - File System and Memory Analysis Multimedia Forensic > - Forensics of Virtual and Cloud Environments > - Information Hiding > - Investigation of Insider Attacks > - Large-Scale Investigations > - Malware forensics and Anti-Malware techniques > - Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device > Forensics > - New threats and Non-Traditional approaches > **Information Assurance and Security Management > - Business Continuity & Disaster Recovery Planning > - Corporate Governance > - Critical Infrastructure Protection > - Decidability and Complexity > - Digital Rights Management and Intellectual Property Protection > - Economics of Security > - Fraud Management > - Identity Management > - Laws and Regulations > - Security Policies and Trust Management > - Threats, Vulnerabilities, and Risk Management > **Cyber warfare and Physical Security > - Surveillance Systems > - Biometrics Applications > - Cyber Warfare Trends and Approaches > - Electronic Passports, National ID and Smart Card Security > - Social engineering > - Template Protection and Liveliness detection > - Authentication and Access Control Systems > - Biometrics standards and standardization > - New theories and algorithms in biometrics > > *************************************************************************** > The conference uses double-blind review by at least two reviewers, > which means that both the reviewer and author identities are concealed > from the reviewers, and vice versa, throughout the review process. > To facilitate this, authors need to ensure that their manuscripts are > prepared in a way that does not give away their identity. > > All the registered papers will be submitted to IEEE for potential inclusion > to IEEE Xplore as well as other Abstracting and Indexing (A&I) databases. > In addition, BEST registered papers will be published in one of the > following > special issues provided that the author do major improvements and extension > within the time frame that will be set by the conference and his/her paper > is approved by the chief editor: > > * International Journal of New Computer Architectures and their Applications > (IJNCAA) > * International Journal of Digital Information and Wireless Communications > (IJDIWC) > * International Journal of Cyber-Security and Digital Forensics (IJCSDF) > > _______________________________________________ > Mobile-l mailing list > Mobile-l@lists.wikimedia.org > https://lists.wikimedia.org/mailman/listinfo/mobile-l > -- Tilman Bayer Senior Analyst Wikimedia Foundation IRC (Freenode): HaeB _______________________________________________ Mobile-l mailing list Mobile-l@lists.wikimedia.org https://lists.wikimedia.org/mailman/listinfo/mobile-l