| |||||||||||||||
13-ICGS3 2021 : VIRTUAL 13th International Conference on Global Security, Safety & Sustainability, ICGS3-21 | |||||||||||||||
Link: https://london.northumbria.ac.uk/event/13th-international-conference-on-global-security-safety-sustainability/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
VIRTUAL 13th International Conference on Global Security, Safety & Sustainability, ICGS3-21
Cyber Security, Privacy and Freedom Protection in the Connected World https://london.northumbria.ac.uk/event/13th-international-conference-on-global-security-safety-sustainability/ For submission details please refer to the conference website The proceedings of the 13th ICGS3 will be published as published by Springer ‘Advanced Sciences and Technologies for Security Applications’ series. 13th ICGS3-21 will take place virtually and all the hardcopies of the proceedings will be sent to delegates after the event. Event date 14 and 15 January 2021 Event location Virtual Conference About the Conference Following the successful 12th ICGS3, we have much pleasure in announcing the 13th International conference on Global Security, Safety & Sustainability. 2020 will be remembered as a year of COVID-19 pandemic year with profound impact on our lives and challenging times for governments around the world with technology as a backbone of tools to assist us to work remotely while in self isolations and in total lockdown. Every individual and organisation are faced with the challenges of the adoption of technological change and understand that nothing will be the same for some time after and even when normality resumes. AI, blockchain, machine learning, IoT, IoMT, IIoT all are tested and applied at a very rapid turnaround as we go through the pandemic day after day. However, all this transformation can bring many associated risks regarding data, such as privacy, transparency, exploitation and ownership. Since the COVID-19 pandemic in January 2020, governments, and organisations; small or large have seen an increase in cyber-attacks. Hackers, through reconnaissance and some network intrusions, targeting nation states medical research facilities, healthcare organizations conducting research into the virus, financial sectors and so on. Early in April 2020, UK, and US security agencies sound COVID-19 threat alert “…Cybersecurity Infrastructure and Security Agency issued a joint warning that hacking groups associated with nation-state governments are exploiting the COVID-19 pandemic as part of their cyber operations…”. The advancement of Artificial Intelligence (AI), coupled with the prolificacy of the Internet of Things (IoT) devices are creating smart societies that are interconnected. The expansion of Big Data and volumetric meta data generated and collated by these mechanisms not only give greater depth of understanding but as change is coming at an unprecedented pace covid19 is drives the cultural changes and the public sector innovations to a new height of responsibilities. Further development and analysis of defence tactics and countermeasures are needed fast to understand security vulnerabilities which will be exploited by the cybercriminals by identifying newer technologies that can aid in protecting and securing data with a range of supporting processes to provide a higher level of cyber resilience. The ethical implications of connecting the physical and digital worlds, and presenting the reality of a truly interconnected society, presents the realisation of the concept of smart societies in reality. This Annual International Conference is an established platform in which security, safety and sustainability issues can be examined from several global perspectives through dialogue between academics, students, government representatives, chief executives, security professionals, and research scientists from the United Kingdom and from around the globe. The TWO-days Virtual conference will focus on the challenges of complexity, the rapid pace of change and risk/opportunity issues associated with the 21st century lifestyle, systems and infrastructures. Important dates Abstract Submission deadline 21 July 2020 Submission deadline 03 September 2020 Peer review to be completed 17 September 2020 Camera ready/Authors Notification 30 September 2020 Author registration 10 October 2020 The Virtual ICGS3 Conference takes place 14 – 15 January 2021 Topics The list of topics includes (but are not limited to): Cyber Defence • Systems Security, Safety and Sustainability • Cyber Infrastructure Protection • The advancement of Artificial Intelligence in cyber defence • Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) Support Systems • Augmented Humanity and cyborgs • Internet of everything things • Security of Medical Data for Smart Healthcare • SCADA and Ransomware • Cyber Warfare • Larger Scale Systems Protection and Resilience • Biohacking and bio-computing Threat/ Attack Vectors • Tactics, Techniques and Procedures • Predictive Control and Analysis of Cyber Attacks • Attack Vectors & APTS (Advanced Persistent Threats) • Red-teaming, Blue-teaming and Purple-teaming Strategies • Digital Twins • Intelligence Led penetration testing • Blockchain and smart contracts • Biometric Recognition Systems and Biometry Information Exchange Security • Big data – from criminals angle and law enforcers angle • 5G and Smart cities • Black, White and Grey Hat Hacking • Vulnerability Assessments – Lessons Learned on Current Operating system Vulnerabilities and Loopholes • War Driving • The Past, Present and Future of Computer Hacking Cyber Intelligence and Operation • Digital leadership and Governance • Cyber-Crime Detection and Prevention • Crime Information Intelligence Network • Cyber Threat Intelligence • Cyber War • Open Source Intelligence • Law Enforcement Agencies • Social Media • Attack Pattern Recognition • Enterprise Architecture Security • Counterintelligence Management • Digital footprint • Deepfake • Impact of technology on crime investigation (policing) Cyber Criminology • Domestic Abuse in smart societies • Cyber Criminology, Theories and Models • Psychology of the Cyber Criminals • Criminal Data Mining, Threat Analysis and Prediction • Crime and Social Media • Victimisation • Radicalisation, social media, Terrorist Threats • Cybercrime Justice Models • The role of Big data • Dark Web/ Darknet • Cyber Bullying, Stoking • Cybercrime Punishment • Virtual courtrooms and judges • The rule of law in digital era • Identity forgery, digital twins and digital data leakage Ethics in Smart and AI driven societies • Smart Societies and Data Exploitation • Human-Centric Society • Age of Artificial Intelligence (AI) • Moral and Ethical implications of Digital Societies • Privacy of Medical Data for Smart Healthcare • Data Ownership, GDPR, Digital foot print, privacy and transparency • Internet of Things (IOT) Interactions • Growth of Smart Wearables & Wearable Body Area Networks (WBAN) • Situational Awareness • Insider Threat – The Human Element Information Systems Security Management • Risk Management • Cyber Risk Management • Modelling Approaches, Security and Systems Assurance Frameworks • Cyber Resilience • Safety, Reliability and Risk Analysis • Safety and Security Evaluation, Assessment and Certification • Strategic Approaches to Security • Fraud Management • IT Audit, Governance and Security • Compliance and Certification • Risk Assessment, Methodologies and Tools • Social Media Control, Risk and Governance • Security and Privacy Architecture and Design For Software and Systems • Methods and Models for Security and Privacy • Support Tools for Modelling Security and Privacy • Methods and Tools for Modelling Trust • Human Aspects in Security and Privacy • Security in Connected world The Future of Digital Forensics • Biohacking and bio-computing attacks • Deepfake investigations • Online open source investigations (OSINT) • Device Forensics investigation including, mobile, IoT, IoMT, etc • Cyber Threat Intelligence • Cybersecurity Kill Chain • Data Encryption Algorithms • Biometrics and Cybersecurity • Wearables and Implantable • Socio-Technical Security: User Behaviour, Profiling and Modelling and Privacy by Design • Decoding Encrypted Data Using Cryptography • Hiding and Storing IoT Data in the Cloud • IoT Forensics Toolbox • Securing and Collecting IoT Devices at the Crime Scene • Forensic Acquisition and Analysis of Drone Data • Forensic Acquisition and Analysis of Wearables Data • Forensic Acquisition and Analysis of Home Assistant Data • Presenting Digital Evidence as an IoT Forensic Expert • Case Studies and Best Practices • Legal and Ethical aspects of Digital Forensics General Chair: For information please email: Professor Hamid Jahankhani, UK hamid.jahankhani@northumbria.ac.uk |
|