Done. On Wed, May 11, 2016 at 9:58 PM, Tilman Bayer <tba...@wikimedia.org> wrote:
> Is it possible to block this spam? > > Note that this organization (SDIWC) is listed at > http://scholarlyoa.com/publishers/ (cf. > https://en.wikipedia.org/wiki/Predatory_open_access_publishing ). > > On Wed, May 11, 2016 at 3:39 PM, Lubna Kanan <lubna.sd...@yahoo.com> > wrote: > > > *************************************************************************** > > We apologize for multiples copies. Please circulate this CFP among your > > colleagues and students. > > > *************************************************************************** > > > > 2016 Fifth International Conference on Cyber Security, Cyber Warfare, > > and Digital Forensic [CyberSec] > > > > July 26-28, 2016 > > > > Manchester, United Kingdom > > > > http://sdiwc.net/conferences/cybersec2016/ > > > > All registered papers will be submitted to IEEE for potential inclusion > to > > IEEE Xplore > > > > > *************************************************************************** > > Paper due: June 26, 2016 > > > *************************************************************************** > > > > The proposed conference will be held University of Salford, MediaCityUK, > > Manchester, United Kingdom, From July 26-28, 2016 which aims to enable > > researchers build connections between different digital applications. > > > > The conference welcomes papers on the following (but not limited to) > > research topics: > > > > **Cyber Security > > - Distributed and Pervasive Systems Security > > - Enterprise Systems Security > > - Formal Methods Application in Security > > - Hardware-Based security > > - Incident Handling and Penetration Testing > > - Legal Issues > > - Multimedia and Document Security > > - Operating Systems and Database Security > > - Privacy issues > > - SCADA and Embedded systems security > > - Secure Software Development, Architecture and Outsourcing > > - Security for Future Networks > > - Security in Cloud Computing > > - Security in Social Networks > > - Security of Web-based Applications and Services > > - Security protocols > > - VOIP, Wireless and Telecommunications Network Security > > **Digital Forensic > > - Anti-Forensics and Anti-Anti-Forensics Techniques > > - Cyber-Crimes > > - Data leakage, Data protection and Database forensics > > - Evidentiary Aspects of Digital Forensics > > - Executable Content and Content Filtering > > - File System and Memory Analysis Multimedia Forensic > > - Forensics of Virtual and Cloud Environments > > - Information Hiding > > - Investigation of Insider Attacks > > - Large-Scale Investigations > > - Malware forensics and Anti-Malware techniques > > - Network Forensics and Traffic Analysis Hardware Vulnerabilities and > Device > > Forensics > > - New threats and Non-Traditional approaches > > **Information Assurance and Security Management > > - Business Continuity & Disaster Recovery Planning > > - Corporate Governance > > - Critical Infrastructure Protection > > - Decidability and Complexity > > - Digital Rights Management and Intellectual Property Protection > > - Economics of Security > > - Fraud Management > > - Identity Management > > - Laws and Regulations > > - Security Policies and Trust Management > > - Threats, Vulnerabilities, and Risk Management > > **Cyber warfare and Physical Security > > - Surveillance Systems > > - Biometrics Applications > > - Cyber Warfare Trends and Approaches > > - Electronic Passports, National ID and Smart Card Security > > - Social engineering > > - Template Protection and Liveliness detection > > - Authentication and Access Control Systems > > - Biometrics standards and standardization > > - New theories and algorithms in biometrics > > > > > *************************************************************************** > > The conference uses double-blind review by at least two reviewers, > > which means that both the reviewer and author identities are concealed > > from the reviewers, and vice versa, throughout the review process. > > To facilitate this, authors need to ensure that their manuscripts are > > prepared in a way that does not give away their identity. > > > > All the registered papers will be submitted to IEEE for potential > inclusion > > to IEEE Xplore as well as other Abstracting and Indexing (A&I) databases. > > In addition, BEST registered papers will be published in one of the > > following > > special issues provided that the author do major improvements and > extension > > within the time frame that will be set by the conference and his/her > paper > > is approved by the chief editor: > > > > * International Journal of New Computer Architectures and their > Applications > > (IJNCAA) > > * International Journal of Digital Information and Wireless > Communications > > (IJDIWC) > > * International Journal of Cyber-Security and Digital Forensics (IJCSDF) > > > > _______________________________________________ > > Mobile-l mailing list > > Mobile-l@lists.wikimedia.org > > https://lists.wikimedia.org/mailman/listinfo/mobile-l > > > > > > -- > Tilman Bayer > Senior Analyst > Wikimedia Foundation > IRC (Freenode): HaeB > > _______________________________________________ > Mobile-l mailing list > Mobile-l@lists.wikimedia.org > https://lists.wikimedia.org/mailman/listinfo/mobile-l >
_______________________________________________ Mobile-l mailing list Mobile-l@lists.wikimedia.org https://lists.wikimedia.org/mailman/listinfo/mobile-l