826true dots under 300true false 800http://sdiwc.net/conferences/2014/digitsec2014/wp-content/plugins/thethe-image-slider/style/skins/frame-white
  • 5000 fade false 60 bottom 30
    Slide9
  • 5000 fade false 60 bottom 30
    Slide3
  • 5000 fade false 60 bottom 30
    Slide2
  • 5000 fade false 60 bottom 30
    Slide5
  • 5000 fade false 60 bottom 30
    Slide8
  • 5000 fade false 60 bottom 30
    Slide3
  • 5000 fade false 60 bottom 30
    Slide4
  • 5000 fade false 60 bottom 30
    Slide7
  • 5000 fade false 60 bottom 30
    Slide8
The submission deadline has been extended to May 25, 2014

Home

You are invited to participate in The International Conference on Digital Security and Forensics (DigitalSec2014) that will be held at VSB-Technical University of Ostrava, Czech Republic on June 24-26, 2014. The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures.

The conference welcomes papers on the following (but not limited to) research topics:
Distributed and Pervasive Systems Security Enterprise Systems Security
Formal Methods Application in Security Hardware-Based security
Incident Handling and Penetration Testing Legal Issues
Multimedia and Document Security Operating Systems and Database Security
Privacy issues Secure Software Development, Architecture and Outsourcing
Security for Future Networks Security in Cloud Computing
Security in Social Networks Security of Web-based Applications and Services
Security protocols VOIP, Wireless and Telecommunications Network Security
SCADA and Embedded systems security Anti-cyberterrorism
Anti-Forensics and Anti-Anti-Forensics Techniques Cyber-Crimes
Data leakage, Data protection and Database forensics Evidentiary Aspects of Digital Forensics
Executable Content and Content Filtering File System and Memory Analysis Multimedia Forensic
Forensics of Virtual and Cloud Environments Information Hiding
Investigation of Insider Attacks Large-Scale Investigations
Malware forensics and Anti-Malware techniques New threats and Non-Traditional approaches
Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics
Computer Forensics Business Continuity & Disaster Recovery Planning
Corporate Governance Critical Infrastructure Protection
Decidability and Complexity Digital Rights Management and Intellectual Property Protection
Economics of Security Fraud Management
Identity Management Laws and Regulations
Security Policies and Trust Management Threats, Vulnerabilities, and Risk Management
Computer Crime Prevention and Detection Authentication and Access Control Systems
Biometrics Applications Biometrics standards and standardization
Cyber Peacefare Trends and Approaches Electronic Passports, National ID and Smart Card Security
New theories and algorithms in biometrics Social engineering
Surveillance Systems Template Protection and Liveliness detection
Computer Security Confidentiality Protection
Cryptography and Data Protection Forensics, Recognition Technologies and Applications
Network Security Security; Authentication and Cryptography for Wireless Networks

All registered papers will be included in SDIWC Digital Library, and in the proceedings of the conference.

All the submitted papers will be reviewed by a minimum of two reviewers. The published proceedings will be indexeded in ResearchBib, in addition, they will be reviewed for possible inclusion within the INSPEC, EI, DBLP, Microsoft Academic Research, ResearchGate, and Google Scholar Databases. In addition, ALL registered papers will be published in one of the following special issues provided that the author do major improvements and extension within the time frame that will be set by the conference and his/her paper is approved by the chief editor: