<div dir="ltr"><div>InfoSec2017 Invitation</div><div><br></div><div>CALL FOR PAPERS and PARTICIPATION in The Third International Conference on Information Security and Cyber Forensics (INFOSEC2017) to be hosted by Faculty of Management, Comenius University in Bratislava, Slovakia on June 29-July 1, 2017. The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures.</div><div><br></div><div>Conference Website: <a href="http://sdiwc.net/conferences/3rd-international-conference-information-security-cyber-forensics/">http://sdiwc.net/conferences/3rd-international-conference-information-security-cyber-forensics/</a></div><div><br></div><div>Email: <a href="mailto:infosec17@sdiwc.net">infosec17@sdiwc.net</a></div><div><br></div><div>Submission Deadline: May 19, 2017</div><div><br></div><div>The conference welcomes papers on the following (but not limited to) research topics:</div><div><br></div><div>***Cyber Security</div><div>-Distributed and Pervasive Systems Security<span class="gmail-Apple-tab-span" style="white-space:pre">        </span></div><div>-Enterprise Systems Security</div><div>-Formal Methods Application in Security<span class="gmail-Apple-tab-span" style="white-space:pre">        </span></div><div>-Hardware-Based security</div><div>-Incident Handling and Penetration Testing<span class="gmail-Apple-tab-span" style="white-space:pre">        </span></div><div>-Legal Issues</div><div>-Multimedia and Document Security<span class="gmail-Apple-tab-span" style="white-space:pre">        </span></div><div>-Operating Systems and Database Security</div><div>-Privacy Issues<span class="gmail-Apple-tab-span" style="white-space:pre">        </span></div><div>-SCADA and Embedded systems security</div><div>-Secure Software Development, Architecture and Outsourcing<span class="gmail-Apple-tab-span" style="white-space:pre">        </span></div><div>-Security for Future Networks</div><div>-Security in Cloud Computing<span class="gmail-Apple-tab-span" style="white-space:pre">        </span></div><div>-Security in Social Networks</div><div>-Security of Web-based Applications and Services<span class="gmail-Apple-tab-span" style="white-space:pre">        </span></div><div>-Security protocols</div><div>-VOIP, Wireless and Telecommunications Network Security<span class="gmail-Apple-tab-span" style="white-space:pre">        </span></div><div><br></div><div>***Digital Forensic</div><div>-Anti-Forensics and Anti-Forensics Techniques<span class="gmail-Apple-tab-span" style="white-space:pre">        </span></div><div>-Cyber-Crimes</div><div>-Data leakage, Data protection and Database forensics<span class="gmail-Apple-tab-span" style="white-space:pre">        </span></div><div>-Evidentiary Aspects of Digital Forensics</div><div>-Executable Content and Content Filtering<span class="gmail-Apple-tab-span" style="white-space:pre">        </span></div><div>-File System and Memory Analysis Multimedia Forensic</div><div>-Forensics of Virtual and Cloud Environments<span class="gmail-Apple-tab-span" style="white-space:pre">        </span></div><div>-Information Hiding</div><div>-Investigation of Insider Attacks<span class="gmail-Apple-tab-span" style="white-space:pre">        </span></div><div>-Large-Scale Investigations</div><div>-Malware Forensics and Anti-Malware techniques<span class="gmail-Apple-tab-span" style="white-space:pre">        </span></div><div>-Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics</div><div>-New threats and Non-Traditional Approaches</div><div><br></div><div>***Information Assurance and Security Management</div><div>-Business Continuity & Disaster Recovery Planning<span class="gmail-Apple-tab-span" style="white-space:pre">        </span></div><div>-Corporate Governance</div><div>-Critical Infrastructure Protection<span class="gmail-Apple-tab-span" style="white-space:pre">        </span></div><div>-Decidability and Complexity</div><div>-Digital Rights Management and Intellectual Property </div><div>-Protection<span class="gmail-Apple-tab-span" style="white-space:pre">        </span>Economics of Security</div><div>-Fraud Management<span class="gmail-Apple-tab-span" style="white-space:pre">        </span></div><div>-Identity Management</div><div>-Laws and Regulations<span class="gmail-Apple-tab-span" style="white-space:pre">        </span></div><div>-Security Policies and Trust Management</div><div>-Threats, Vulnerabilities, and Risk Management<span class="gmail-Apple-tab-span" style="white-space:pre">        </span></div><div><br></div><div>***Cyber Peacefare and Physical Security</div><div>-Authentication and Access Control Systems<span class="gmail-Apple-tab-span" style="white-space:pre">        </span></div><div>-Biometrics Applications</div><div>-Biometrics standards and standardization<span class="gmail-Apple-tab-span" style="white-space:pre">        </span></div><div>-Cyber Peacefare Trends and Approaches</div><div>-Electronic Passports, National ID and Smart Card Security<span class="gmail-Apple-tab-span" style="white-space:pre">        </span></div><div>-New theories and algorithms in biometrics</div><div>-Social Engineering<span class="gmail-Apple-tab-span" style="white-space:pre">        </span></div><div>-Surveillance Systems</div><div>-Template Protection and Liveliness Detection<span class="gmail-Apple-tab-span" style="white-space:pre">        </span></div><div><div class="gmail_signature"><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div><font face="tahoma, sans-serif"><span style="font-size:12.8px"><br></span></font></div><div><font face="tahoma, sans-serif"><span style="font-size:12.8px"><br></span></font></div><div><font face="tahoma, sans-serif"><span style="font-size:12.8px"><br></span></font></div><div><font face="tahoma, sans-serif"><span style="font-size:12.8px"><br></span></font></div><div><font face="tahoma, sans-serif"><span style="font-size:12.8px">Best Regards,</span><br></font></div><div><div><font face="tahoma, sans-serif"><br></font></div><div><font face="tahoma, sans-serif"><br></font></div><div><font face="tahoma, sans-serif"><b>Sandra Evans</b></font></div><div><font face="tahoma, sans-serif"><br></font></div><div><font face="tahoma, sans-serif">Conference Manager,</font></div><div><font face="tahoma, sans-serif"><br></font></div><div><font face="tahoma, sans-serif"><br></font></div><div><font face="tahoma, sans-serif">The Society of Digital Information and Wireless Communications (SDIWC)</font></div><div><font face="tahoma, sans-serif">20/F, Tower 5, China Hong Kong City, </font></div><div><font face="tahoma, sans-serif">33 Canton Road, Tsim Sha Tsui, </font></div><div><font face="tahoma, sans-serif">Kowloon, Hong Kong</font></div><div><br></div><div><font face="tahoma, sans-serif">Email: <a href="mailto:sdiwc@sdiwc.net" target="_blank">sdiwc@sdiwc.net</a></font></div><div><font face="tahoma, sans-serif"><br></font></div><div><font face="tahoma, sans-serif">Phone Numbers :<span style="white-space:pre">        </span></font></div><div><font face="tahoma, sans-serif"><br></font></div><div><font face="tahoma, sans-serif">from outside USA<span style="white-space:pre">        </span>001-202-657-4603</font></div><div><font face="tahoma, sans-serif">from Inside <span style="white-space:pre">        </span>USA<span style="white-space:pre">        </span>202-657-4603</font></div></div><div><br></div><div><font face="verdana, sans-serif" color="#0000ff">See more of the upcoming SDIWC Conferences at: <a href="http://www.sdiwc.net" target="_blank">www.sdiwc.net</a></font></div><div><br></div></div></div></div></div></div></div></div></div></div></div>
</div>