2nd International Conference on

Anti-Cyber Crime ICACC

King Khalid University, Abha, Kingdom of Saudi Arabia

26 to 27 March 2017

conf.kku.edu.sa/icacc

 

Conferences Page​

 

 

CALL FOR PAPERS

The 2nd International Conference on Anti-Cyber Crimes (ICACC 2017) provides a forum for researchers of Anti-Cyber Crime related fields to present their papers to the vide audience that span experts of different scientific fields and security officials. The conference also provides the opportunity for budding researchers to discuss the main aspects and the latest results of Education and Research related to Anti-Cyber Crimes. The conference support and assist the authorities and agencies responsible for security, safety and law enforcement by providing a forum to share ideas of current and future technologies related to anti Cyber crimes. The conference expects an attendance of more than 200 delegates from 30 different countries.  Any form of plagiarism including self plagiarism will be viewed seriously and will invite author disciplinary actions. All accepted papers that are presented in the conference will be published in the conference proceedings which will be possibly through IEEExplore. IEEE reserves the right to exclude a paper from distribution after the conference, including IEEE Xplore® Digital Library, if the paper is not presented by the author at the conference. Also the selected papers from the presented papers will possibly be recommended to Scopus indexed International Journals. The Prospective authors are encouraged to submit their original research contributions in the following research areas (but not limited to)

 

Cyber Biometrics

Mobile and Web Security

Cyber Forensics

SCADA Security

End Point Security

Cloud Security

Network Security

Honeynet Technologies

Vulnerability Assessment

Malware Analysis

Penetration Testing of Web Applications

and Networks

Computational Intelligence and cyber Crimes

Organizational Strategies to deal Crimes

Criminal Behavior & Classification

Nature of Cyber Crimes

Regulations of Crimes

Hacking and Ethical hacking

Intruder detection and Mitigation

Image Processing for Crime Detection

Internet Technologies & Cryptography

Security Issues in Networks

Watermarking & Stenography

 

 

 

Technically Co-Sponsored by

               ​          

 

               ​          

 

               ​