Conference Information
ICCICS 2014: International Conference on Cyber-Crime Investigation and Cyber Security
Please Login to view website of conference
Submission Date: |
2014-11-02 Extended |
Notification Date: |
2014-11-04 |
Conference Date: |
2014-11-17 |
Location: |
Kuala Lumpur, Malaysia |
Viewed: 13214 Tracked: 1 Attend: 0
Call For Papers
You are invited to participate in The International Conference on Cyber-Crime Investigation and Cyber Security (ICCICS2014) that will be held in Asia Pacific University of Technology and Innovation (APU), Kuala Lumpur, Malaysia on November 17-19, 2014 as part of The Third World Congress on Computing and Information Technology (WCIT). The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures.
The conference welcomes papers on the following (but not limited to) research topics:
Business Applications of Digital Forensics
Civil Litigation Support
Cyber Crime Investigations
Cyber Criminal Psychology and Profiling
Cyber Culture & Cyber Terrorism
Digital Forensic Case Studies
Digital Forensic Processes and Workflow Models
Digital Forensics & Law
Digital Forensics Process & Procedures
Digital Forensics Standardization & Accreditation
Digital Forensics Techniques and Tools
E-Discovery
Embedded Device Forensics
Hacking
Incident Response
Information Warfare & Critical Infrastructure Protection
Legal, Ethical and Policy Issues Related to Digital Forensics
Malware & Botnets
Mobile / Handheld Device & Multimedia Forensics
Money Laundering
Network and Cloud Forensics
Online Fraud
Sexual Abuse of Children On Internet
Software & Media Piracy
Theoretical Foundations of Digital Forensics
Theories, Techniques and Tools for Extracting, Analyzing and Preserving Digital Evidence
The conference welcomes papers on the following (but not limited to) research topics:
Business Applications of Digital Forensics
Civil Litigation Support
Cyber Crime Investigations
Cyber Criminal Psychology and Profiling
Cyber Culture & Cyber Terrorism
Digital Forensic Case Studies
Digital Forensic Processes and Workflow Models
Digital Forensics & Law
Digital Forensics Process & Procedures
Digital Forensics Standardization & Accreditation
Digital Forensics Techniques and Tools
E-Discovery
Embedded Device Forensics
Hacking
Incident Response
Information Warfare & Critical Infrastructure Protection
Legal, Ethical and Policy Issues Related to Digital Forensics
Malware & Botnets
Mobile / Handheld Device & Multimedia Forensics
Money Laundering
Network and Cloud Forensics
Online Fraud
Sexual Abuse of Children On Internet
Software & Media Piracy
Theoretical Foundations of Digital Forensics
Theories, Techniques and Tools for Extracting, Analyzing and Preserving Digital Evidence
Last updated by Dou Sun in 2014-10-31
Related Conferences
Related Journals
| CCF | Full Name | Impact Factor | Publisher | ISSN |
|---|---|---|---|---|
| a | IEEE Transactions on Information Forensics and Security | 8.0 | IEEE | 1556-6013 |
| Journal of Enterprise Information Management | 6.4 | Emerald | 1741-0398 | |
| Enterprise Information Systems | 3.9 | Taylor & Francis | 1751-7575 | |
| International Journal of Information Security | 3.2 | Springer | 1615-5262 | |
| c | Journal of Cybersecurity | 3.2 | Oxford University Press | 2057-2093 |
| ACM Transactions on Privacy and Security | 2.8 | ACM | 2471-2566 | |
| c | EURASIP Journal on Information Security | 2.1 | Springer | 1687-417X |
| c | IET Information Security | 1.300 | IET | 1751-8709 |
| c | International Journal of Information Security and Privacy | 0.800 | Idea Group Inc | 1930-1650 |
| c | International Journal of Cooperative Information Systems | 0.500 | World Scientific | 0218-8430 |