Done.

On Wed, May 11, 2016 at 9:58 PM, Tilman Bayer <tba...@wikimedia.org> wrote:

> Is it possible to block this spam?
>
> Note that this organization (SDIWC) is listed at
> http://scholarlyoa.com/publishers/ (cf.
> https://en.wikipedia.org/wiki/Predatory_open_access_publishing ).
>
> On Wed, May 11, 2016 at 3:39 PM, Lubna Kanan <lubna.sd...@yahoo.com>
> wrote:
> >
> ***************************************************************************
> > We apologize for multiples copies. Please circulate this CFP among your
> > colleagues and students.
> >
> ***************************************************************************
> >
> > 2016 Fifth International Conference on Cyber Security, Cyber Warfare,
> > and Digital Forensic [CyberSec]
> >
> > July 26-28, 2016
> >
> > Manchester, United Kingdom
> >
> > http://sdiwc.net/conferences/cybersec2016/
> >
> > All registered papers will be submitted to IEEE for potential inclusion
> to
> > IEEE Xplore
> >
> >
> ***************************************************************************
> > Paper due:  June 26, 2016
> >
> ***************************************************************************
> >
> > The proposed conference will be held University of Salford, MediaCityUK,
> > Manchester, United Kingdom, From July 26-28, 2016 which aims to enable
> > researchers build connections between different digital applications.
> >
> > The conference welcomes papers on the following (but not limited to)
> > research topics:
> >
> > **Cyber Security
> > - Distributed and Pervasive Systems Security
> > - Enterprise Systems Security
> > - Formal Methods Application in Security
> > - Hardware-Based security
> > - Incident Handling and Penetration Testing
> > - Legal Issues
> > - Multimedia and Document Security
> > - Operating Systems and Database Security
> > - Privacy issues
> > - SCADA and Embedded systems security
> > - Secure Software Development, Architecture and Outsourcing
> > - Security for Future Networks
> > - Security in Cloud Computing
> > - Security in Social Networks
> > - Security of Web-based Applications and Services
> > - Security protocols
> > - VOIP, Wireless and Telecommunications Network Security
> > **Digital Forensic
> > - Anti-Forensics and Anti-Anti-Forensics Techniques
> > - Cyber-Crimes
> > - Data leakage, Data protection and Database forensics
> > - Evidentiary Aspects of Digital Forensics
> > - Executable Content and Content Filtering
> > - File System and Memory Analysis Multimedia Forensic
> > - Forensics of Virtual and Cloud Environments
> > - Information Hiding
> > - Investigation of Insider Attacks
> > - Large-Scale Investigations
> > - Malware forensics and Anti-Malware techniques
> > - Network Forensics and Traffic Analysis Hardware Vulnerabilities and
> Device
> > Forensics
> > - New threats and Non-Traditional approaches
> > **Information Assurance and Security Management
> > - Business Continuity & Disaster Recovery Planning
> > - Corporate Governance
> > - Critical Infrastructure Protection
> > - Decidability and Complexity
> > - Digital Rights Management and Intellectual Property Protection
> > - Economics of Security
> > - Fraud Management
> > - Identity Management
> > - Laws and Regulations
> > - Security Policies and Trust Management
> > - Threats, Vulnerabilities, and Risk Management
> > **Cyber warfare and Physical Security
> > - Surveillance Systems
> > - Biometrics Applications
> > - Cyber Warfare Trends and Approaches
> > - Electronic Passports, National ID and Smart Card Security
> > - Social engineering
> > - Template Protection and Liveliness detection
> > - Authentication and Access Control Systems
> > - Biometrics standards and standardization
> > - New theories and algorithms in biometrics
> >
> >
> ***************************************************************************
> > The conference uses double-blind review by at least two reviewers,
> > which means that both the reviewer and author identities are concealed
> > from the reviewers, and vice versa, throughout the review process.
> > To facilitate this, authors need to ensure that their manuscripts are
> > prepared in a way that does not give away their identity.
> >
> > All the registered papers will be submitted to IEEE for potential
> inclusion
> > to IEEE Xplore as well as other Abstracting and Indexing (A&I) databases.
> > In addition, BEST registered papers will be published in one of the
> > following
> > special issues provided that the author do major improvements and
> extension
> > within the time frame that will be set by the conference and his/her
> paper
> > is approved by the chief editor:
> >
> > * International Journal of New Computer Architectures and their
> Applications
> > (IJNCAA)
> > * International Journal of Digital Information and Wireless
> Communications
> > (IJDIWC)
> > * International Journal of Cyber-Security and Digital Forensics (IJCSDF)
> >
> > _______________________________________________
> > Mobile-l mailing list
> > Mobile-l@lists.wikimedia.org
> > https://lists.wikimedia.org/mailman/listinfo/mobile-l
> >
>
>
>
> --
> Tilman Bayer
> Senior Analyst
> Wikimedia Foundation
> IRC (Freenode): HaeB
>
> _______________________________________________
> Mobile-l mailing list
> Mobile-l@lists.wikimedia.org
> https://lists.wikimedia.org/mailman/listinfo/mobile-l
>
_______________________________________________
Mobile-l mailing list
Mobile-l@lists.wikimedia.org
https://lists.wikimedia.org/mailman/listinfo/mobile-l

Reply via email to