会議情報
ICCICS 2014: International Conference on Cyber-Crime Investigation and Cyber Security
会議のウェブサイトを表示するにはログインしてください
提出日: |
2014-11-02 Extended |
通知日: |
2014-11-04 |
会議日: |
2014-11-17 |
場所: |
Kuala Lumpur, Malaysia |
閲覧: 13218 追跡: 1 出席: 0
論文募集
You are invited to participate in The International Conference on Cyber-Crime Investigation and Cyber Security (ICCICS2014) that will be held in Asia Pacific University of Technology and Innovation (APU), Kuala Lumpur, Malaysia on November 17-19, 2014 as part of The Third World Congress on Computing and Information Technology (WCIT). The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures.
The conference welcomes papers on the following (but not limited to) research topics:
Business Applications of Digital Forensics
Civil Litigation Support
Cyber Crime Investigations
Cyber Criminal Psychology and Profiling
Cyber Culture & Cyber Terrorism
Digital Forensic Case Studies
Digital Forensic Processes and Workflow Models
Digital Forensics & Law
Digital Forensics Process & Procedures
Digital Forensics Standardization & Accreditation
Digital Forensics Techniques and Tools
E-Discovery
Embedded Device Forensics
Hacking
Incident Response
Information Warfare & Critical Infrastructure Protection
Legal, Ethical and Policy Issues Related to Digital Forensics
Malware & Botnets
Mobile / Handheld Device & Multimedia Forensics
Money Laundering
Network and Cloud Forensics
Online Fraud
Sexual Abuse of Children On Internet
Software & Media Piracy
Theoretical Foundations of Digital Forensics
Theories, Techniques and Tools for Extracting, Analyzing and Preserving Digital Evidence
The conference welcomes papers on the following (but not limited to) research topics:
Business Applications of Digital Forensics
Civil Litigation Support
Cyber Crime Investigations
Cyber Criminal Psychology and Profiling
Cyber Culture & Cyber Terrorism
Digital Forensic Case Studies
Digital Forensic Processes and Workflow Models
Digital Forensics & Law
Digital Forensics Process & Procedures
Digital Forensics Standardization & Accreditation
Digital Forensics Techniques and Tools
E-Discovery
Embedded Device Forensics
Hacking
Incident Response
Information Warfare & Critical Infrastructure Protection
Legal, Ethical and Policy Issues Related to Digital Forensics
Malware & Botnets
Mobile / Handheld Device & Multimedia Forensics
Money Laundering
Network and Cloud Forensics
Online Fraud
Sexual Abuse of Children On Internet
Software & Media Piracy
Theoretical Foundations of Digital Forensics
Theories, Techniques and Tools for Extracting, Analyzing and Preserving Digital Evidence
最終更新 Dou Sun 2014-10-31
関連会議
| CCF | CORE | QUALIS | 省略名 | 完全な名前 | 提出日 | 通知日 | 会議日 |
|---|---|---|---|---|---|---|---|
| b | b3 | ICISS | International Conference on Information Systems Security | 2026-07-10 | 2026-09-10 | 2026-12-16 | |
| a | a* | a1 | CCS | ACM Conference on Computer and Communications Security | 2026-04-22 | 2026-07-17 | 2026-11-15 |
| c | b | b1 | SOUPS | International Symposium On Usable Privacy and Security | 2026-02-12 | 2026-05-19 | 2026-08-23 |
| c | b | b1 | AsiaCCS | ACM ASIA Conference on Computer and Communications Security | 2025-12-12 | 2026-03-10 | 2026-06-01 |
| c | b | a2 | ISC | Information Security Conference | 2025-06-04 | 2025-07-29 | 2025-10-20 |
| c | b3 | CIS | International Conference on Computational Intelligence and Security | 2020-08-05 | 2020-08-31 | 2020-11-27 | |
| c | CRITIS | International Conference on Critical Information Infrastructures Security | 2018-04-30 | 2018-06-18 | 2018-09-24 | ||
| c | IAS | International Conference on Information Assurance and Security | 2015-10-21 | 2015-11-10 | 2015-12-07 | ||
| b2 | CICC | IEEE Custom Integrated Circuits Conference | 2015-05-04 | 2015-09-28 | |||
| b4 | MINES | International Conference on Multimedia Information Networking and Security | 2013-07-20 | 2013-07-25 | 2013-11-01 |
関連仕訳帳
| CCF | 完全な名前 | インパクト ・ ファクター | 出版社 | ISSN |
|---|---|---|---|---|
| a | IEEE Transactions on Information Forensics and Security | 8.0 | IEEE | 1556-6013 |
| Journal of Enterprise Information Management | 6.4 | Emerald | 1741-0398 | |
| Enterprise Information Systems | 3.9 | Taylor & Francis | 1751-7575 | |
| International Journal of Information Security | 3.2 | Springer | 1615-5262 | |
| c | Journal of Cybersecurity | 3.2 | Oxford University Press | 2057-2093 |
| ACM Transactions on Privacy and Security | 2.8 | ACM | 2471-2566 | |
| c | EURASIP Journal on Information Security | 2.1 | Springer | 1687-417X |
| c | IET Information Security | 1.300 | IET | 1751-8709 |
| c | International Journal of Information Security and Privacy | 0.800 | Idea Group Inc | 1930-1650 |
| c | International Journal of Cooperative Information Systems | 0.500 | World Scientific | 0218-8430 |