IMPACT SCORE JOURNAL RANKING CONFERENCE RANKING Conferences Journals Workshops Seminars SYMPOSIUMS MEETINGS BLOG LaTeX 5G Tutorial Free Tools
ISEHDF 2019 : International Symposium on Ethical Hacking and Digital Forensics
ISEHDF 2019 : International Symposium on Ethical Hacking and Digital Forensics

ISEHDF 2019 : International Symposium on Ethical Hacking and Digital Forensics

Ghana Technology University College
Event Date: May 29, 2019 - May 31, 2019
Abstract Submission Deadline: May 27, 2019
Submission Deadline: May 20, 2019
Notification of Acceptance: February 25, 2019
Camera Ready Version Due: May 27, 2019




Call for Papers

Call for Papers for May 2019: 2019 ISEHDF International Symposium on Ethical Hacking and Digital Forensics


International Symposium on Ethical Hacking and Digital Forensics ISEHDF 2019 is co-located with ICSIoT. Proceedings of full papers of the in IEEE Xplore, IEEE CSDL and other places such as Scopus, titles of papers will be made available in Web of Science linked to ResearcherID and Clarivate Analytics’Publons etc.. The Areas of the symposium are


 Dark web
 Deep Web
 Surface Web
 Disclosure of new Hacking Tools
 New Vulnerabilities and Zero Day Exploits
 Cyber Forensics
 Password Systems Vulnerability
 Lock picking & physical security exploitation
 Web Application & Network Security
 Antivirus/IDS/Firewall/filter evasion techniques
 Social Engineering
 Metasploit Framework
 Web Browser Exploitation
 Mobile Application Security and Exploitation
 Wireless Security
 Denial of Service Attacks
 Hardware Hacking/ SCADA Hacking
 Honeypots
 Fuzzing Techniques
 Open Source Security
 Cyber Laws, Cyber warfare, Cyber Ethics
 Anonimity in Internet
 Carding and Black Market Analysis
 Applied Cryptography and Cryptanalysis
 Digital Forensics
 Disclosure and Ethics
 Embedded Security (health devices, IoT, SCADA, home/personal devices...)
 Exploit Automation
 Hardware Vulnerabilities*
 Malware Creation, Analysis and Prevention
 Mobile Security
 Network Security, Intrusion Detection and Prevention
 Penetration Testing
 Reverse Engineering and Obfuscation
 Security and Privacy in Cloud, P2P Networks
 Vulnerability Discovery / Analysis
 Web Application Security
 Satellite Hacking
 Web Security
 Privacy
 Embedded Systems Technologies
 GSM, GPRS and CDMA Security
 RFID Security
 VoIP Security
 IOT vulnerabilities
 Lockpicking
 Wireless Security
 Exploitation
 IPv6 Security
 Attack and Defense Techniques
 Reverse Engineering
 Application Security, Testing, Fuzzing
 Code Auditing
 Virtualization Security
 Malicious Code
 Databases Security
 Packet Pungas
 Viruses, Worms, and Trojans
 e-crime, Phishing and Botnets
 Malware
 Crimeware
 e-voting madness
 Banking Security
 Phreaking
 Hardware hacking
 Cryptography
 SQL Injection
 Forensics & AntiForensics
 Formal and theoretical techniques of cyber security and forensics
 Legal and policy issues in cyber security and defense
 Availability, privacy, authentication, trust, access control, and key management
 Social networks security and forensics
 Intrusion Detection
 Incident response techniques in networked and distributed systems
 Security and privacy in wireless and mobile systems
 Cyber security engineering
 Risk analysis and management in cyber security
 Storage systems protection and forensics
 Economic and management aspects of cyber security and privacy
 Automated reasoning techniques of incidents and evidence analysis
 Evidentiary aspects and forensics of digital crimes
 Cyber scenarios modeling, analysis, and investigation
 Hypothetical reasoning in forensics and incident response
 Collaborative and distributed techniques for cyber defense and cyber investigation
 Active, adaptive, and intelligent defense systems
 Embedded security and device forensics
 Evidence preservation, management, storage and reassembly
 Anti-forensics and anti-anti forensics prevention, detection, and analysis
 Multimedia security and forensics
 Lightweight security techniques
 Large-scale security and investigation in large networks and Big Data
 Innovative forensic services
 Data visualization in forensic analysis
 Vulnerability analysis and assessment of cloud services
 Techniques for tracking and trace-back of attacks in networked and distributed systems
 Data hiding, extraction, and recovery technique
 Security and forensics in distributed, virtual, and cloud environments
 Cyber security architectures
 Machine Learning-aided analysis
 Graph-based detection
 Topic modelling
 Improvements of existing methods
 Decision Support Systems
 Novel datasets
 New data formats
 Digital Forensics data simulation
 Anonymised case data
 New data formats and taxonomies
 Cyber Threats Intelligence
 Network Forensics Readiness
 Malware Analysis & Detection
 Emails mining & Authorship Identification
 Social Network Mining
 Events correlations
 Access Logs analysis
 Mobile Forensics
 Fraud Detection
 Database Forensics
 IoT Forensics
 Blockchain technologies
 Industrial systems
 Secure collaborative platforms
 Distributed storage and processing
 Technologies for data streams
 Hardware and software architectures for large-scale data
 -etc


Proceedings of full papers of the International Symposium on Ethical Hacking and Digital Forensics ISEHDF 2019 will be added to 2019 ICSIoT conference full papers and will be submitted to IEEE Xplore, IEEE CSDL and other places such as Scopus, titles of papers will be made available in Web of Science linked to ResearcherID and Clarivate Analytics’ Publons etc.
Registration for Full Paper $300 (Short paper 3-4 pages and Full paper 5-6 pages IEEE Paper template http://icsiot.ghsociety.org/template.doc) This covers presentation and conference participation.
Registration for Abstract Only $100. (Title, Name of Authors, Affiliation, Abstract and Key words) This covers presentation and conference participation.
All selected papers further qualified for future advancement/improvement of work-done for Special Issues in reputable Journals and Book Chapters to be indexed in reputable places such as SCOPUS. Authors will be contacted in the future for submissions to these call for papers. All selected abstracts qualify for such invitations.
Submission link: https://cmt3.research.microsoft.com/CSIoT2019
Website : http://icsiot.ghsociety.org/
Deadline for full papers submission :
20th May 2019
Final notification of acceptance :
25th May 2019
Deadline for registration :
27th May 2019
Deadline for Camera-ready :
28th May 2019
Conference date : 29th to 31th May 2019
Venue : Ghana Technology University College, Accra Ghana.



Credits and Sources

[1] ISEHDF 2019 : International Symposium on Ethical Hacking and Digital Forensics


Check other Conferences, Workshops, Seminars, and Events


OTHER COMPUTING AND ENGINEERING EVENTS

IEEE AFRICON 2019: IEEE AFRICON
GIMPA Executive Conference Centre
Sep 25, 2019
ISMCICADT 2019: International Symposium on Military Communications, Intelligence, Crime Analysis and Defense Technologies
Ghana Technology University College
May 29, 2019
ISCWSA 2019: International Symposium on Cryptology, Watermarking , Steganography and their Applications
Ghana Technology University College
May 29, 2019
ISPS 2019: International Symposium on Privacy and Security
Ghana Technology University College
May 29, 2019
ISIoTS 2019: International Symposium on Internet of Things and Systems
Ghana Technology University College
May 29, 2019
SHOW ALL

OTHER APPLICATIONS OF COMPUTING EVENTS

IEEE AFRICON 2019: IEEE AFRICON
GIMPA Executive Conference Centre
Sep 25, 2019
ISMCICADT 2019: International Symposium on Military Communications, Intelligence, Crime Analysis and Defense Technologies
Ghana Technology University College
May 29, 2019
ISCWSA 2019: International Symposium on Cryptology, Watermarking , Steganography and their Applications
Ghana Technology University College
May 29, 2019
ISPS 2019: International Symposium on Privacy and Security
Ghana Technology University College
May 29, 2019
ISIoTS 2019: International Symposium on Internet of Things and Systems
Ghana Technology University College
May 29, 2019
SHOW ALL

OTHER COMPUTER COMMUNICATIONS EVENTS

IEEE AFRICON 2019: IEEE AFRICON
GIMPA Executive Conference Centre
Sep 25, 2019
ISMCICADT 2019: International Symposium on Military Communications, Intelligence, Crime Analysis and Defense Technologies
Ghana Technology University College
May 29, 2019
ISCWSA 2019: International Symposium on Cryptology, Watermarking , Steganography and their Applications
Ghana Technology University College
May 29, 2019
ISPS 2019: International Symposium on Privacy and Security
Ghana Technology University College
May 29, 2019
ISIoTS 2019: International Symposium on Internet of Things and Systems
Ghana Technology University College
May 29, 2019
SHOW ALL

OTHER CYBER SECURITY EVENTS

IEEE-iSSSC 2022: 2nd IEEE International Symposium on Sustainable Energy, Signal Processing and Cyber Security
GIET UNIVERSITY, GUNUPUR, ODISHA, INDIA
Dec 15, 2022
SPISCS 2023 2023: 2023 2nd International Conference on Signal Processing, Information System and Cyber Security (SPISCS 2023)
Qinghai, China
Jun 16, 2023
ADCO 2023: 10th International Conference on Advanced Computing
Toronto, Canada
Sep 23, 2023
ETCEA 2022: The International Conference on Emerging Trends in Computing and Engineering Applications
Dead Sea - Jordan
Nov 23, 2022
IEEE ICCWS 2022: IEEE International Conference on Cyber Warfare and Security (ICCWS)
Air University Islamabad, Pakistan
Dec 7, 2022
SHOW ALL