Cybersecurity has become an important research and development area for academia, government, and industry in recent years. The advent of big data, social media and mobile technology growth and the coming of the internet of things (IoT) have led to new opportunities in cyber security and cyber forensic work. To counter this, a multidisciplinary effort involving stakeholders from cyber security, the legal profession, academia, public citizens, and law enforcement agencies is required. The 2nd Cybersecurity and Cyberforensics Conference (CCC 2017) brings together thought-leaders from these separate fields to discuss current and future approaches, technologies and legislation pertinent to the detection, prevention, investigation and prosecution of cybercrime and cyber attacks. The conference offers an interdisciplinary venue to discuss challenges, technologies, and emerging trends.
CCC 2017 invites researchers and practitioners from academia, industry and government, and accepts original, previously unpublished work. The scope of the conference is narrow to ensure a complementary match between capability and need. Papers should either be empirically or rationally based explorations of problems in cyber security and cyber forensic, or propose solutions and/or countermeasures to the most pressing cybercrime.
Attack strategy analysis & modelling
Cybercrime scenario analysis and reconstruction
Techniques for evidence collection, search, and analysis
Security & Social Networks
Anomaly detection of web-based attacks
Malicious Spam detection
Botnet Detection and prevention
Wireless Network Security and Forensics
Cloud Computing Security and the Forensics of Big Data
Privacy, ethical and legal issues
Forensic Investigation of the Internet of Things
Anti-Forensics and Data Hiding Techniques and Discoveries
Malware Analysis and Memory Forensic Techniques
Advanced Persistent Threats (APTs)
System Forensic Techniques for Windows, Linux, Mac, etc
File System Forensic Analysis
Hacking Techniques: Client-Side Attacks
Malicious Content Detection and Analysis Techniques
Societal Impact of Cybercrime
Defense against cyberterrorism
Monitoring and incident response
Tools and techniques for network forensics
Methodologies for digital forensics
Applications of Data Mining for Cybersecurity
Cybercrime detection and prevention
Mobile and embedded devices Forensics
Forensic software tools and applications
Cybercrime Profiling
Cybercrime: evolution, new trends and detection
Anti-malware techniques: detection, analysis, and prevention
Combating cybercrime: anti-phishing, anti-spam, anti-fraud
Privacy and anonymity technologies
Intrusion prevention, detection, and response
Cyberterrorism, Information Warfare & Critical Infrastructure Protection
ISO 27000
11月21日
2017
11月23日
2017
初稿截稿日期
注册截止日期
留言