CALL FOR PAPERS
The 2nd International Conference on Anti-Cyber Crimes (ICACC 2017) provides a forum for researchers of Anti-Cyber Crime related fields to present their papers to the vide audience that span experts of different scientific fields and security officials. The conference also provides the opportunity for budding researchers to discuss the main aspects and the latest results of Education and Research related to Anti-Cyber Crimes. The conference support and assist the authorities and agencies responsible for security, safety and law enforcement by providing a forum to share ideas of current and future technologies related to anti Cyber crimes. The conference expects an attendance of more than 200 delegates from 30 different countries. Any form of plagiarism including self plagiarism will be viewed seriously and will invite author disciplinary actions. All accepted papers that are presented in the conference will be published in the conference proceedings which will be possibly through IEEExplore. IEEE reserves the right to exclude a paper from distribution after the conference, including IEEE Xplore® Digital Library, if the paper is not presented by the author at the conference. Also the selected papers from the presented papers will possibly be recommended to Scopus indexed International Journals. The Prospective authors are encouraged to submit their original research contributions in the following research areas (but not limited to)
Cyber Biometrics |
Mobile and Web Security |
Cyber Forensics |
SCADA Security |
End Point Security |
Cloud Security |
Network Security |
Honeynet Technologies |
Vulnerability Assessment |
Malware Analysis |
Penetration Testing of Web Applications and Networks |
Computational Intelligence and cyber Crimes |
Organizational Strategies to deal Crimes |
Criminal Behavior & Classification |
Nature of Cyber Crimes |
Regulations of Crimes |
Hacking and Ethical hacking |
Intruder detection and Mitigation |
Image Processing for Crime Detection |
Internet Technologies & Cryptography |
Security Issues in Networks |
Watermarking & Stenography |
Technically Co-Sponsored by