• Hosted by: GSM London
  • Date: 18th - 20th January 2017
  • Venue: 110 Middlesex St, London, E1 7HT

 

Proceedings of the event will be published as a Springer CCIS volume.
(Communications in Computer and Information Science)

11th ICGS3-17 is an IEEE sponsored event

 

 

About the Conference:

Following the successful, 10th ICGS3, we have much pleasure in announcing the 11th International conference on Global Security, Safety and Sustainability. In an era of unprecedented volatile, political and economic environment across the world, computer based systems face ever more increasing challenges, disputes and responsibilities and while the Internet has created a global platform for the exchange of ideas, goods and services, however, it has also created boundless opportunities for cyber-crime.

Therefore, the role of Information systems in facilitating secure economic transactions and maintaining steady and reliable sources of information that support politically stable and sustainable socio-economic systems is becoming increasingly critical.

As increasing number of large organizations and individuals use the Internet and its satellite mobile technologies, they are increasingly vulnerable to cyber-crime threats. It is therefore paramount that the security industry raises its game to combat these threats. This is an issue of global importance as law enforcement agencies all over the world are struggling to cope.

This Annual International Conference is an established platform in which security, safety and sustainability issues can be examined from several global perspectives through dialogue between academics, students, government representatives, chief executives, security professionals, and research scientists from the United Kingdom and from around the globe.

The three day conference will focus on the challenges of complexity, rapid pace of change and risk/opportunity issues associated with the 21st century living style, systems and infrastructures.

 

Topics:

The list of topics includes (but not limited to):

  • Systems Security, Safety and Sustainability Cyber Infrastructure protection
    • Internet of Things
    • Security and Systems assurance Frameworks
    • Safety & Security in System of Systems
    • Intelligent sensors for identity management
    • Trusted Systems and Devices
    • Geo-information and Geo-spatial Intelligence security systems (GIS)
    • Data and Telecommunication Networks security
    • Biometric Recognition systems and Biometry information exchange security
    • Networks Privacy Security
    • Memory Management and digital rights management units
    • Safety and Security Evaluation, Assessment and Certification
    • Modelling Approaches and Frameworks
    • Natural and physical resources security, protection of forest areas and management of large scale fire and events

  • The future of digital forensics
    • Cloud forensics
    • Computer forensics and anti-forensics
    • Mobile and handheld devices forensics
    • Chain of Custody, recovery, storage and preservation
    • Tools and applications
    • Incident response and investigation
    • Standards and procedures
    • Steganography
    • E-discovery and data analysis
    • Network traffic analysis
    • Case studies and best practices

  • Information Systems security management
    • Information systems
    • Information security management systems
    • Risk Management
    • Cyber risk management
    • Cyber resilience
    • Safety, reliability and risk analysis
    • Strategic approaches to security
    • Fraud management
    • IT Audit, Governance and Security
    • Compliance and certification
    • Risk assessment, methodologies and tools
    • Social media control, risk and governance

  • Cyber law and cyber arbitration
    • Legal and ethical aspects of digital forensics
    • Privacy (e.g. mail monitoring, location and mobility management, Web 2.0)
    • Data Protection
    • Confidentiality
    • e-Identification (e.g. Evolving EU legal framework, identity related rights)
    • Legal issues related to cloud computing
    • Jurisdiction (e.g. Cyberspace)
    • Electronic Commerce and virtual entities
    • Intellectual Property rights (e.g. copyright, trademarks)
    • Cyber crime

  • Secure Software Engineering
    • Security and Privacy design in traditional and cloud-based systems
    • Security and Privacy architecture and design for software and systems
    • Methods and models for Security and Privacy
    • Support tools for modelling Security and Privacy
    • Methods and tools for modelling Trust
    • Security and Privacy methods and tools for cloud forensics
    • Methods for security reengineering
    • Case studies in modelling secure and privacy-oriented Information Systems in cloud environments
    • Privacy Enhancing Technologies for the realization of trustworthy Information Systems
    • Human aspects in Security and Privacy
    • Security and Privacy Adaptation

  • Cyber Intelligence and operation
    • Cyber-crime detection and prevention
    • Cyber-criminology, Criminal data mining and threat Analysis and prediction
    • Crime information intelligence network
    • Cyber threat intelligence
    • Cyber War
    • Open source intelligence
    • Law Enforcement Agencies
    • Social media
    • Attack pattern recognition
    • Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) support systems
    • Cloud Computing Security
    • Enterprise Architecture Security
    • Security in Mobile Operating Environments
    • Enterprise Architecture Security
    • Mass interception communication solutions
    • Content Digitisation security and Mass Data Storage Banks protection
    • Counterintelligence Management

  • Remote system intelligence and counter measures
    • Access controls
    • Detection and remediation of security breaches
    • Business continuity planning
    • Disaster recovery planning
    • Black hat, White hat and grey hat hacking
    • Honeypots
    • Rootkits
    • Vulnerability assessments – lessons learned, Current operating system vulnerabilities and loopholes.
    • War driving
    • Wi-Fi vulnerabilities
    • The past, present and future of computer hacking
    • Technical measures for self-protection
    • Investigative/ mitigate methods and techniques to apprehend an offender
    • Computer forensic tools (types) used in investigating a crime scene, Data analysis and root cause
    • Forensics and assistance of hacked environment, tools (types) used in investigating a crime scene, Data analysis and root cause
    • Technical methods in collecting volatile and non- volatile information.
    • Legislation and evidence for prosecution

  • Cyber security education, training and awareness development
    • Skills to participate in a 21st century economy
    • Cybersecurity education and training development
    • Digital forensics Training and education
    • Certification
    • Cybersecurity Workforce Framework and implementations
    • Partnership function between academia, private sector training organisations and the governments
    • Cybersecrity awareness
    • Cyber security, resources programme and resources for schools
    • Improving cyberspace security through International partnership

 

Submissions

Full research papers limited to 12-15 pages should report on novel and completed work of important value to the community. The work should not be published or in submission anywhere else.

 

General Chair:

Prof. Hamid Jahankhani, UK
hamidj05@yahoo.co.uk