IMPACT SCORE JOURNAL RANKING CONFERENCE RANKING Conferences Journals Workshops Seminars SYMPOSIUMS MEETINGS BLOG LaTeX 5G Tutorial Free Tools
ISEHDF 2019 : International Symposium on Ethical Hacking and Digital Forensics
ISEHDF 2019 : International Symposium on Ethical Hacking and Digital Forensics

ISEHDF 2019 : International Symposium on Ethical Hacking and Digital Forensics

Ghana Technology University College
Event Date: May 29, 2019 - May 31, 2019
Abstract Submission Deadline: May 27, 2019
Submission Deadline: May 20, 2019
Notification of Acceptance: February 25, 2019
Camera Ready Version Due: May 27, 2019




Call for Papers

Call for Papers for May 2019: 2019 ISEHDF International Symposium on Ethical Hacking and Digital Forensics


International Symposium on Ethical Hacking and Digital Forensics ISEHDF 2019 is co-located with ICSIoT. Proceedings of full papers of the in IEEE Xplore, IEEE CSDL and other places such as Scopus, titles of papers will be made available in Web of Science linked to ResearcherID and Clarivate Analytics’Publons etc.. The Areas of the symposium are


 Dark web
 Deep Web
 Surface Web
 Disclosure of new Hacking Tools
 New Vulnerabilities and Zero Day Exploits
 Cyber Forensics
 Password Systems Vulnerability
 Lock picking & physical security exploitation
 Web Application & Network Security
 Antivirus/IDS/Firewall/filter evasion techniques
 Social Engineering
 Metasploit Framework
 Web Browser Exploitation
 Mobile Application Security and Exploitation
 Wireless Security
 Denial of Service Attacks
 Hardware Hacking/ SCADA Hacking
 Honeypots
 Fuzzing Techniques
 Open Source Security
 Cyber Laws, Cyber warfare, Cyber Ethics
 Anonimity in Internet
 Carding and Black Market Analysis
 Applied Cryptography and Cryptanalysis
 Digital Forensics
 Disclosure and Ethics
 Embedded Security (health devices, IoT, SCADA, home/personal devices...)
 Exploit Automation
 Hardware Vulnerabilities*
 Malware Creation, Analysis and Prevention
 Mobile Security
 Network Security, Intrusion Detection and Prevention
 Penetration Testing
 Reverse Engineering and Obfuscation
 Security and Privacy in Cloud, P2P Networks
 Vulnerability Discovery / Analysis
 Web Application Security
 Satellite Hacking
 Web Security
 Privacy
 Embedded Systems Technologies
 GSM, GPRS and CDMA Security
 RFID Security
 VoIP Security
 IOT vulnerabilities
 Lockpicking
 Wireless Security
 Exploitation
 IPv6 Security
 Attack and Defense Techniques
 Reverse Engineering
 Application Security, Testing, Fuzzing
 Code Auditing
 Virtualization Security
 Malicious Code
 Databases Security
 Packet Pungas
 Viruses, Worms, and Trojans
 e-crime, Phishing and Botnets
 Malware
 Crimeware
 e-voting madness
 Banking Security
 Phreaking
 Hardware hacking
 Cryptography
 SQL Injection
 Forensics & AntiForensics
 Formal and theoretical techniques of cyber security and forensics
 Legal and policy issues in cyber security and defense
 Availability, privacy, authentication, trust, access control, and key management
 Social networks security and forensics
 Intrusion Detection
 Incident response techniques in networked and distributed systems
 Security and privacy in wireless and mobile systems
 Cyber security engineering
 Risk analysis and management in cyber security
 Storage systems protection and forensics
 Economic and management aspects of cyber security and privacy
 Automated reasoning techniques of incidents and evidence analysis
 Evidentiary aspects and forensics of digital crimes
 Cyber scenarios modeling, analysis, and investigation
 Hypothetical reasoning in forensics and incident response
 Collaborative and distributed techniques for cyber defense and cyber investigation
 Active, adaptive, and intelligent defense systems
 Embedded security and device forensics
 Evidence preservation, management, storage and reassembly
 Anti-forensics and anti-anti forensics prevention, detection, and analysis
 Multimedia security and forensics
 Lightweight security techniques
 Large-scale security and investigation in large networks and Big Data
 Innovative forensic services
 Data visualization in forensic analysis
 Vulnerability analysis and assessment of cloud services
 Techniques for tracking and trace-back of attacks in networked and distributed systems
 Data hiding, extraction, and recovery technique
 Security and forensics in distributed, virtual, and cloud environments
 Cyber security architectures
 Machine Learning-aided analysis
 Graph-based detection
 Topic modelling
 Improvements of existing methods
 Decision Support Systems
 Novel datasets
 New data formats
 Digital Forensics data simulation
 Anonymised case data
 New data formats and taxonomies
 Cyber Threats Intelligence
 Network Forensics Readiness
 Malware Analysis & Detection
 Emails mining & Authorship Identification
 Social Network Mining
 Events correlations
 Access Logs analysis
 Mobile Forensics
 Fraud Detection
 Database Forensics
 IoT Forensics
 Blockchain technologies
 Industrial systems
 Secure collaborative platforms
 Distributed storage and processing
 Technologies for data streams
 Hardware and software architectures for large-scale data
 -etc


Proceedings of full papers of the International Symposium on Ethical Hacking and Digital Forensics ISEHDF 2019 will be added to 2019 ICSIoT conference full papers and will be submitted to IEEE Xplore, IEEE CSDL and other places such as Scopus, titles of papers will be made available in Web of Science linked to ResearcherID and Clarivate Analytics’ Publons etc.
Registration for Full Paper $300 (Short paper 3-4 pages and Full paper 5-6 pages IEEE Paper template http://icsiot.ghsociety.org/template.doc) This covers presentation and conference participation.
Registration for Abstract Only $100. (Title, Name of Authors, Affiliation, Abstract and Key words) This covers presentation and conference participation.
All selected papers further qualified for future advancement/improvement of work-done for Special Issues in reputable Journals and Book Chapters to be indexed in reputable places such as SCOPUS. Authors will be contacted in the future for submissions to these call for papers. All selected abstracts qualify for such invitations.
Submission link: https://cmt3.research.microsoft.com/CSIoT2019
Website : http://icsiot.ghsociety.org/
Deadline for full papers submission :
20th May 2019
Final notification of acceptance :
25th May 2019
Deadline for registration :
27th May 2019
Deadline for Camera-ready :
28th May 2019
Conference date : 29th to 31th May 2019
Venue : Ghana Technology University College, Accra Ghana.



Credits and Sources

[1] ISEHDF 2019 : International Symposium on Ethical Hacking and Digital Forensics


Check other Conferences, Workshops, Seminars, and Events


OTHER COMPUTING AND ENGINEERING EVENTS

IEEE AFRICON 2019: IEEE AFRICON
GIMPA Executive Conference Centre
Sep 25, 2019
ISMCICADT 2019: International Symposium on Military Communications, Intelligence, Crime Analysis and Defense Technologies
Ghana Technology University College
May 29, 2019
ISCWSA 2019: International Symposium on Cryptology, Watermarking , Steganography and their Applications
Ghana Technology University College
May 29, 2019
ISPS 2019: International Symposium on Privacy and Security
Ghana Technology University College
May 29, 2019
ISIoTS 2019: International Symposium on Internet of Things and Systems
Ghana Technology University College
May 29, 2019
SHOW ALL

OTHER APPLICATIONS OF COMPUTING EVENTS

IEEE AFRICON 2019: IEEE AFRICON
GIMPA Executive Conference Centre
Sep 25, 2019
ISMCICADT 2019: International Symposium on Military Communications, Intelligence, Crime Analysis and Defense Technologies
Ghana Technology University College
May 29, 2019
ISCWSA 2019: International Symposium on Cryptology, Watermarking , Steganography and their Applications
Ghana Technology University College
May 29, 2019
ISPS 2019: International Symposium on Privacy and Security
Ghana Technology University College
May 29, 2019
ISIoTS 2019: International Symposium on Internet of Things and Systems
Ghana Technology University College
May 29, 2019
SHOW ALL

OTHER COMPUTER COMMUNICATIONS EVENTS

IEEE AFRICON 2019: IEEE AFRICON
GIMPA Executive Conference Centre
Sep 25, 2019
ISMCICADT 2019: International Symposium on Military Communications, Intelligence, Crime Analysis and Defense Technologies
Ghana Technology University College
May 29, 2019
ISCWSA 2019: International Symposium on Cryptology, Watermarking , Steganography and their Applications
Ghana Technology University College
May 29, 2019
ISPS 2019: International Symposium on Privacy and Security
Ghana Technology University College
May 29, 2019
ISIoTS 2019: International Symposium on Internet of Things and Systems
Ghana Technology University College
May 29, 2019
SHOW ALL

OTHER CYBER SECURITY EVENTS

ICCSIE 2024: 9th International Conference on Cyber Security and Information Engineering
Kuala Lumpur, Malaysia
Sep 15, 2024
APWG eCrime 2024: APWG Symposium on Electronic Crime Research - Sept 24-26 - Boston
Boston
Sep 24, 2024
ITADATA 2024: The 3rd Italian Conference on Big Data and Data Science
Pisa, Italy
Sep 17, 2024
ICITEICS 2024: International Conference on Information Technology, Electronics and Intelligent Communication Systems
Bangalore, India
Jun 28, 2024
LCN MarCaS 2024: 2nd IEEE LCN Special Track on Maritime Communication and Security (MarCaS)
Caen, Normandy, France
Oct 8, 2024
SHOW ALL