WorldCIS-2017

World Congress on Internet Security

INNOVATIVE IDEAS EMBRACES TECHNOLOGICAL ADVANCEMENT

Conference Venue

University of Cambridge
Cambridge
United Kingdom

Notification and Preliminary Call for Papers

The World Congress on Internet Security (WorldCIS) is Technical Co-Sponsored by IEEE UK/RI Computer Chapter. The WorldCIS is an international refereed conference dedicated to the advancement of the theory and practical implementation of security on the Internet and Computer Networks. The inability to properly secure the Internet, computer networks, protecting the Internet against emerging threats and vulnerabilities, and sustaining privacy and trust has been a key focus of research. The WorldCIS aims to provide a highly professional and comparative academic research forum that promotes collaborative excellence between academia and industry.

The objectives of the WorldCIS are to bridge the knowledge gap between academia and industry, promote research esteem and to fostering discussions on information technologies, information systems and global security applications. The WorldCIS-2017 invites speakers and researchers to submit papers that encompass conceptual analysis, design implementation and performance evaluation. All submitted papers are peer-reviewed (blind reviewed).

Undergraduates, Graduates/Postgraduates, researchers and Professionals who are working or studying Internet Security, Cyber Security, Information Security, Smart Cities, Access Control, Bio-metric System, Computer Forensics, Information Technology, Computer Science Laboratory, Ubi/Cloud Computing, Cloud Security, Internet Application, Internet of Things (IoT) and Technology, Multimedia and Web Services.

Professionals and researchers responsible for security governance of information, IT security, researchers in organizations that deploy compliance of cyber security standards and guidelines.

The information security engineers, technicians, IT security professionals, IT management, automation and control project managers, IT security auditors, compliance officers, cyber security planners, critical infrastructure protection specialists; vendors and assessors of security solutions.

We listened to all the great feedback we received from last year’s attendees and have incorporated some of their suggestions into WorldCIS-2017. Explore highly relevant sessions, led by industry’s and academic top experts. The sessions will giving you the ability to dive deeper into a topic, ask more questions and interact more with presenters. Attend Keynotes. Be inspired by presentations from thought leaders representing a wide range of disciplines within and outside the cyber security. Share a common interest to explore a specific security topic.

Full Paper

You are allowed a total of 6 pages for your paper (including all figures, tables, and references). If you are planning to submit a Full Paper, you do not need to submit an Extended Abstract.

Extended Abstract (Work in Progress)

The extended abstract should not exceed 2 pages (including introduction, body of knowledge and conclusion, supported by not more than 10 references). Please submit your extended abstract in PDF format at extendedabstract@worldcis.org

Proposals from those who would like to facilitate a panel discussion are welcomed. The proposals may address any of the topics falling within the scope of the conference themes. Panel Discussions provide an opportunity for public discussion amongst a selected group of panelists. Central to the success of a panel discussion is the choice of a good topic as the focus for discussion and panellists who bring differing perspectives and are confident in making clear arguments in a live situation. Panels should comprise of three to five scholars who present their arguments; a discussant offers critical comment on the arguments made and the discussion is opened up to the participating audience. The proposal must include:

  • Title
  • Panel Chair(s) (if necessary)
  • Speaker(s) Name, Affiliation and Email
  • Scope
  • Objective and motivation

The WorldCIS-2017 will set aside space for those who wish to pursue discussion of a particular topic or issue. Interested individuals should submit a proposal not more than 400 words, on or before August 10, 2017. In addition, the proposal should indicate the duration of the panel discussion (preferred duration is 90 minutes). All accepted Panel Discussion proposal will be published in the Conference Proceedings. If you are interested in organising Panel Discussion for the WorldCIS-2017, please email your proposal to the pandis@iworldcis.org. Submissions should be in MS Word format.

We understand that some presenters will not be able to make the trip to London to present their research paper, case study, work in progress and report, mainly due to financial and/or political restrictions on travel. The WorldCIS-2017 has therefore instituted a virtual presentation system to allow the authors of accepted papers the same publication opportunities as regular presenters. A research works submitted without the participant attending the Conference in person, but presented via video conferencing are refereed and published (if accepted) in the conference proceedings. You can submit a research paper, case study, work in progress and report for virtual presentation under the open call for papers via email to papers@worldcis.org

Topics in WorldCIS-2017

The topics in WorldCIS-2017 include but are not confined to the following areas:

  • Cyber Security
  • Surveillance Systems
  • Cyber Warfare Trends and Approaches
  • Social engineering
  • Template Protection and Liveliness detection
  • New theories and algorithms in biometrics
  • Formal Methods Application in Security
  • Operating Systems and Database Security
  • Enterprise Systems Security
  • SCADA and Embedded systems security
  • Distributed and Pervasive Systems Security
  • Secure Software Development
  • Accountability
  • Anonymity
  • Application security
  • Attacks and defenses
  • Authentication
  • Censorship and censorship-resistance
  • Distributed systems security
  • Embedded systems security
  • Intrusion detection
  • Language-based security
  • Malware
  • Metrics
  • Network security
  • Privacy-preserving
  • Resource usage control
  • Security for mobile computing
  • Security models
  • systems Protocol security
  • Secure information flow
  • Security and privacy policies
  • Security architectures
  • System security
  • Usability and security
  • Web security
  • Internet Architecture and Technologies
  • Anonymity and Privacy
  • Artificial Intelligence and Expert Systems
  • Network security
  • Broadband Access Technologies
  • Application Agents
  • Boundary Issues of Internet Security
  • Database Management
  • Data Models for Production Systems and Services
  • Big Data
  • Data Security and Provenance
  • Defence Systems Internet Security
  • Electronic voting
  • Embedded Systems
  • IPSec Quality of Service
  • Knowledge Management
  • Modeling and verifying
  • Security, Trust and Privacy
  • Self-Organizing Networks
  • Sensor nets and embedded systems
  • Service overlays
  • Switches and switching
  • Topology characterization and Inference
  • Traffic Measurement and Analysis
  • Traffic Engineering and Control
  • Virtual and Overlay Networks
  • Data leakage and Database forensics
  • Forensics of Virtual and Cloud Environments
  • Network Forensics and Traffic Analysis
  • Information Hiding
  • File System and Memory Analysis
  • Executable Content and Content Filtering
  • Anti-Forensics Techniques
  • Malware forensics
  • Evidentiary Aspects of Digital Forensics
  • Large-Scale Investigations
  • New threats and Non-Traditional approaches
  • Incident Handling and Penetration Testing
  • Biometrics
  • Chaos-based Data Security
  • Cryptography
  • Collaborative Learning
  • Cyber Security Congestion control
  • Content Distribution
  • Cross Layer Design and Optimization
  • Cyber-physical computing/networking
  • Distributed Systems Security
  • Information flow monitor
  • Language-based security
  • Network Security Issues and Protocols
  • Security Challenges and Content Authoring
  • Secure Communications
  • Authentication Techniques
  • MANET Security
  • Wireless Sensor Network Security
  • Organization Considerations in Security Policy
  • Digital Forensics and Crimes
  • Formulation and Implementations
  • Geographic information systems
  • Privacy Protection
  • Regulations
  • Quantitative Information Flow
  • Intelligent Multimedia and its Data Management
  • Multimedia Information Systems
  • Multimedia Security
  • Web Databases
  • Web Metrics and its Applications
  • Web Mining including Web Intelligence and Web 3.0.
  • XML and other extensible languages
  • Semantic Web and Ontology
  • Web services and performance
  • Secured Database Systems
  • Security in Data Mining
  • Defence Systems
  • Virtual Reality
  • Hardware-Based Security
  • Trust and trust management
  • Trust, Privacy and Data Security
  • Anonymity, Pseudonymity, and Unlinkability
  • data Correlation and Leakage Attacks
  • Privacy Enhancing Technologies
  • Wireless Privacy
  • User Profiling
  • Information Dissemination Control
  • Dynamic vs. Static Flow-Sensitive Security Analysis
  • Cyber Situation Awareness Tools and Techniques
  • Social Media Analysis
  • Collaborative Defences Approach
  • Risk Management, Governance and Compliance
  • Network Situation Awareness
  • Human Factor Cognitive
  • National and Critical Infrastructure Security Issues
  • Situation Awareness in Military Operations
  • Cyber Situation Awareness Frameworks
  • Fusion Centres
  • Situation Awareness Training
  • Decision Control
  • Preparedness and Readiness
  • Investigation Techniques
  • Digital Services
  • Protection of Digital Services
  • GeoIP Location Systems Attribution
  • Geo-Location of IP Networks
  • Geo-Location of Cyber Physical Systems
  • Geo-Location of Internet of Things (IoT)
  • GeoIP Enrichment Methods
  • GeoIP for Fraud Detection
  • Web Analytics
  • GeoIP Detection
  • Ad hoc Mobile Networks Security
  • Addressing and Location Management
  • Broadband Access Technologies
  • Blended Internet Security Methods
  • Boundary Issues of Internet Security
  • Capacity Planning
  • Cellular and Broadband Wireless Nets
  • Complex systems and complexity
  • Formal verification of privacy for RFID systems
  • Optical Networks
  • Middleware Support for Networking
  • Mobility Models and Systems
  • Multicast and Anycast
  • Multimedia Protocols and Networking
  • Network Applications and Services
  • Network Architectures
  • Network Simulation and Emulation
  • Novel Network Architectures
  • Network and Protocol Architectures
  • Peer-to-Peer Communications
  • Performance Evaluation
  • Power Control and Management
  • Protocols and Standards
  • Resource Allocation and Management
  • Wireless Mesh Networks and Protocols
  • Context-Awareness and its Data Mining for UbiCom
  • Data Grids
  • Distributed Information Systems
  • Forensics in Ubi-com
  • Human-Computer Interface and Interaction for UbiCom
  • Ubiquitous Systems
  • USN/RFID Service
  • UbiCom Service Business Model
  • Data Management for UbiCom
  • Peer to Peer Data Management
  • Ubiquitous Application
  • Delay/disruption tolerant networks
  • End Users
  • Enabling Technologies for the Internet
  • Implementation and Experimental Testbeds
  • Quality of Service Issues
  • Secure Virtual Infrastructure and Private Cloud
  • Cryptographic Enforcement of Multi-Tenancy
  • Cloud Requirements for PaaS and SaaS
  • Security Policy and Privacy Requirements
  • CloudAudit Protocol
  • Corporate Governance
  • Laws and Regulations
  • Threats, Vulnerabilities, and Risk Management
  • Disaster Recovery Planning
  • Critical Infrastructure Protection
  • Digital Rights Management
  • Security Policies and Trust Management
  • Identity Management
  • Decidability and Complexity
  • Economics of Security
  • Fraud Management
  • Smart Cities Strategic Sustainability Challenge
  • Cyber security challenges
  • Security Design and Applications
  • Collaborative Research and Future Technologies

Journal Publications

All the accepted papers will appear in the proceedings and modified version of selected papers will be published in special issues peer reviewed journals.

TOP
DON’T MISS OUT!
Subscribe To Newsletter
Be the first to get latest updates and exclusive content straight to your email inbox.
Stay Updated
Give it a try, you can unsubscribe anytime.