The International Research Conference Aims and Objectives
The International Research Conference is a federated organization dedicated to bringing together a significant number of diverse scholarly events for presentation
within the conference program. Events will run over a span of time during the conference depending on the number and length of the presentations.
With its high quality, it provides an exceptional value for students, academics and industry researchers.
ICCFIS 2022: 16. International Conference on Cyber Forensics and Information Security
aims to bring together leading academic scientists, researchers and research scholars to exchange and share their experiences and research results on all aspects of
Cyber Forensics and Information Security.
It also provides a premier interdisciplinary platform for researchers, practitioners and educators to present and discuss the most recent innovations,
trends, and concerns as well as practical challenges encountered and solutions adopted in the fields of Cyber Forensics and Information Security
Call for Contributions
Prospective authors are kindly encouraged to contribute to and help shape the conference through submissions of their research abstracts, papers and e-posters.
Also, high quality research contributions describing original and unpublished results of conceptual, constructive, empirical, experimental, or
theoretical work in all areas of Cyber Forensics and Information Security are cordially invited for presentation at the conference.
The conference solicits contributions of abstracts, papers and e-posters that address themes and topics of the conference, including figures, tables and references of
novel research materials.
Guidelines for Authors
Please ensure your submission meets the conference's strict guidelines for accepting scholarly papers.
Downloadable versions of the check list for
Full-Text Papers and
Abstract Papers.
Please refer to the
Paper Submission Guideline,
Abstract Submission Guideline and
Author Information
before submitting your paper.
Conference Proceedings
All submitted conference papers will be blind peer reviewed by three competent reviewers.
The peer-reviewed conference proceedings are indexed in the Open Science Index,
Google Scholar,
Semantic Scholar,
Zenedo,
OpenAIRE,
BASE,
WorldCAT,
Sherpa/RoMEO,
and other index databases. Impact Factor Indicators.
Special Journal Issues
ICCFIS 2022 has teamed up with the Special Journal Issue on
Cyber Forensics and Information Security.
A number of selected high-impact full text papers will also be considered for the special journal issues.
All submitted papers will have the opportunity to be considered for this Special Journal Issue.
The paper selection will be carried out during the peer review process as well as at the conference presentation stage.
Submitted papers must not be under consideration by any other journal or publication.
The final decision for paper selection will be made based on peer review reports by the Guest Editors and the Editor-in-Chief jointly.
Selected full-text papers will be published online free of charge.
Conference Sponsor and Exhibitor Opportunities
The Conference offers the opportunity to become a conference sponsor or exhibitor.
To participate as a sponsor or exhibitor, please download and complete the
Conference Sponsorship Request Form.
Selected Papers
-
Information Security Risk Management in IT-Based Process Virtualization: A Methodological Design Based on Action Research
Jefferson Camacho Mejía, Jenny Paola Forero Pachón, Luis Carlos Gómez Flórez
-
Digital Image Forensics: Discovering the History of Digital Images
Gurinder Singh, Kulbir Singh
-
A Multi-Science Study of Modern Synergetic War and Its Information Security Component
Alexander G. Yushchenko
-
Malware Detection in Mobile Devices by Analyzing Sequences of System Calls
Jorge Maestre Vidal, Ana Lucila Sandoval Orozco, Luis Javier García Villalba
-
Understanding Success Factors of an Information Security Management System Plan Phase Self-Implementation
Nurazean Maarop, Noorjan Mohd Mustapha, Rasimah Yusoff, Roslina Ibrahim, Norziha Megat Mohd Zainuddin
-
Deterministic Random Number Generator Algorithm for Cryptosystem Keys
Adi A. Maaita, Hamza A. A. Al_Sewadi
-
Culture Dimensions of Information Systems Security in Saudi Arabia National Health Services
Saleh Alumaran, Giampaolo Bella, Feng Chen
-
A New Graphical Password: Combination of Recall & Recognition Based Approach
Md. Asraful Haque, Babbar Imam
-
General Awareness of Teenagers in Information Security
Magdalena Naplavova, Tomas Ludik, Petr Hruza, Frantisek Bozek
-
Proposal of a Model Supporting Decision-Making on Information Security Risk Treatment
Ritsuko Kawasaki (Aiba), Takeshi Hiromatsu
-
Developing a Viral Artifact to Improve Employees’ Security Behavior
Stefan Bauer, Josef Frysak
-
Proposal of a Model Supporting Decision-Making Based On Multi-Objective Optimization Analysis on Information Security Risk Treatment
Ritsuko Kawasaki (Aiba), Takeshi Hiromatsu
-
Engagement of Young People in Social Networks: Awareness and Security
Lynette Drevin, Günther R. Drevin
-
Determinants of Information Security Affecting Adoption of Web-based Integrated Information Systems
Jaehun Joo, Mie-jung Kim, Ismatilla Normatov, Lyunhwa Kim
-
Protocol and Method for Preventing Attacks from the Web
Ryuya Uda
Cyber forensics
Information security
Cyber investigation and evidence
Cyber forensics education and research
Disk forensics
Network forensics
Mobile device forensics
Live forensics
Memory forensics
Multimedia forensics
Internet forensics
Cyber forensics tools.
Cyber forensics and law
Cybercrime investigation and analysis
Cyber forensics laboratories
Abstracts/Full-Text Paper Submission Deadline |
|
March 16, 2021 |
Notification of Acceptance/Rejection |
|
April 01, 2021 |
Final Paper (Camera Ready) Submission & Early Bird Registration Deadline |
|
May 20, 2022 |
Conference Dates |
|
June 21-22, 2022 |
James Nelson |
New Mexico State University, US |
Guoxiang Liu |
University of North Dakota, US |
Mengyu Qiao |
New Mexico Institute of Mining and Technology, US |
Chiedza Kambasha |
AKG SECURITIES, GB |
Suriakala M. |
Government Arts College for Men, IN |
Reza Naghizadeh Majid |
Seraj University, IR |
Heena Goswami |
Gujarat National Law University, IN |
Gabriela Moise |
Petroleum and Gas University, RO |
Ramveer Singh |
Greater Noida Institute of Technology, India, IN |
Sriman Narayana Iyengar |
Sreenidhi Institute of Science and Technology, IN |
Amarendra Babu Akella |
St.Martin Engineering College, IN |
Tun Myat Aung |
University of Computer Studies, MM |
Mohammed Alia |
Al Zaytoonah University of Jordan, JO |
Kareem Kamal A.ghany |
Beni-Suef University, EG |
Jordan Deliversky |
University of Library Studies and Information Technologies , BG |
Magdaléna Náplavová |
University of Defence, Czech Republic |
Stefan Bauer |
Vienna University of Economics and Business, Austria |
Ganthan Narayana Samy |
Universiti Teknologi Malaysia (UTM), MY |
Pritheega Magalingam |
University of Technology, Malaysia, MY |
Adi Maaita |
Isra University, Jordan |
Nurazean Maarop |
Universiti Teknologi Malaysia, Malaysia |
Kavitha Raju |
Shanmugha Arts, Science, Technology and Research Academy, IN |
Umesh Singh |
Vikram University Ujjain, IN |
Ajay Sharma |
SRM University, IN |
Li Xu |
Fujian Normal University, CN |
Mohemmed Sha |
Prince Sattam bin Abdulaziz University, SA |
Mohammed Salem Atoum |
Irbid National University, |
Khaleel Ahmad |
Maulana Azad National Urdu University, IN |
Souvik Bhattacharyya |
University Institute of Technology,The University of Burdwan, IN |
Hamza A. Al-Sewadi |
Faculty of IT, Isra University, JO |
Participation Type |
Early Registration Ticket Fees |
Registration Ticket Fees |
Non-Student Oral/Poster Presenter Registration |
€ 450 |
€ 500 |
Student Oral/Poster Presenter Registration |
€ 350 |
€ 400 |
Listener Registration |
€ 250 |
€ 300 |
Additional Paper Publication |
€ 100 |
All conference materials and services will be delivered digitally to the participant with the online conference management system.
Conference registration includes the following digital materials and services:
- e-certificates [for Authors: Certificate of Attendance and Presentation; for Listeners: Certificate of Attendance; for Chairs: Certificate of Attendance and Appreciation; for Presenters: Certificate of Best Presentation (if conferred based appraisal)]
- e-program
- e-book
- e-name badge
- e-receipt
- e-presentation
Presentation Types:
-
Physical presentation is an oral conferencing presentation that is made using digital technology including embedded digital elements ( texts, tables, graphs, or videos ) for PowerPoint sharing.
-
Digital presentation is a digital conferencing presentation that is made using digital technology including embedded digital elements ( texts, tables, graphs, or videos ) for PowerPoint sharing.
Early Bird Registration
Early Bird registration is valid until 2022-05-20 23:59:59
Online Credit Card Processing
Online payment option available for author
and listener delegates.
Conference participants can make online credit card payments for conference registration fees.