The International Research Conference Aims and Objectives
The International Research Conference is a federated organization dedicated to bringing together a significant number of diverse scholarly events for presentation
within the conference program. Events will run over a span of time during the conference depending on the number and length of the presentations.
With its high quality, it provides an exceptional value for students, academics and industry researchers.
ICSDFCC 2022: 16. International Conference on Security and Digital Forensics of Cloud Computing
aims to bring together leading academic scientists, researchers and research scholars to exchange and share their experiences and research results on all aspects of
Security and Digital Forensics of Cloud Computing.
It also provides a premier interdisciplinary platform for researchers, practitioners and educators to present and discuss the most recent innovations,
trends, and concerns as well as practical challenges encountered and solutions adopted in the fields of Security and Digital Forensics of Cloud Computing
Call for Contributions
Prospective authors are kindly encouraged to contribute to and help shape the conference through submissions of their research abstracts, papers and e-posters.
Also, high quality research contributions describing original and unpublished results of conceptual, constructive, empirical, experimental, or
theoretical work in all areas of Security and Digital Forensics of Cloud Computing are cordially invited for presentation at the conference.
The conference solicits contributions of abstracts, papers and e-posters that address themes and topics of the conference, including figures, tables and references of
novel research materials.
Guidelines for Authors
Please ensure your submission meets the conference's strict guidelines for accepting scholarly papers.
Downloadable versions of the check list for
Full-Text Papers and
Abstract Papers.
Please refer to the
Paper Submission Guideline,
Abstract Submission Guideline and
Author Information
before submitting your paper.
Conference Proceedings
All submitted conference papers will be blind peer reviewed by three competent reviewers.
The peer-reviewed conference proceedings are indexed in the Open Science Index,
Google Scholar,
Semantic Scholar,
Zenedo,
OpenAIRE,
BASE,
WorldCAT,
Sherpa/RoMEO,
and other index databases. Impact Factor Indicators.
Special Journal Issues
ICSDFCC 2022 has teamed up with the Special Journal Issue on
Security and Digital Forensics of Cloud Computing.
A number of selected high-impact full text papers will also be considered for the special journal issues.
All submitted papers will have the opportunity to be considered for this Special Journal Issue.
The paper selection will be carried out during the peer review process as well as at the conference presentation stage.
Submitted papers must not be under consideration by any other journal or publication.
The final decision for paper selection will be made based on peer review reports by the Guest Editors and the Editor-in-Chief jointly.
Selected full-text papers will be published online free of charge.
Conference Sponsor and Exhibitor Opportunities
The Conference offers the opportunity to become a conference sponsor or exhibitor.
To participate as a sponsor or exhibitor, please download and complete the
Conference Sponsorship Request Form.
Selected Papers
-
Exploring the Need to Study the Efficacy of VR Training Compared to Traditional Cybersecurity Training
Shaila Rana, Wasim Alhamdani
-
CybeRisk Management in Banks: An Italian Case Study
E. Cenderelli, E. Bruno, G. Iacoviello, A. Lazzini
-
The Forensic Swing of Things: The Current Legal and Technical Challenges of IoT Forensics
Pantaleon Lutta, Mohamed Sedky, Mohamed Hassan
-
Malicious Vehicle Detection Using Monitoring Algorithm in Vehicular Adhoc Networks
S. Padmapriya
-
A Socio-Technical Approach to Cyber-Risk Assessment
Kitty Kioskli, Nineta Polemi
-
Keyloggers Prevention with Time-Sensitive Obfuscation
Chien-Wei Hung, Fu-Hau Hsu, Chuan-Sheng Wang, Chia-Hao Lee
-
Computational Approaches for Ballistic Impact Response of Stainless Steel 304
A. Mostafa
-
A Research on Determining the Viability of a Job Board Website for Refugees in Kenya
Prince Mugoya, Collins Oduor Ondiek, Patrick Kanyi Wamuyu
-
Influence of Security on Fan Attendance during Nigeria Professional Football League Matches
B. O. Diyaolu
-
Authentication of Physical Objects with Dot-Based 2D Code
Michał Glet, Kamil Kaczyński
-
Leveraging Li-Fi to Enhance Security and Performance of Medical Devices
Trevor Kroeger, Hayden Williams, Edward Holzinger, David Coleman, Brian Haberman
-
Awareness Level of Green Computing among Computer Users in Kebbi State, Nigeria
A. Mubarak, A. I. Augie
-
Secure Socket Layer in the Network and Web Security
Roza Dastres, Mohsen Soori
-
Judicial Review of Indonesia's Position as the First Archipelagic State to implement the Traffic Separation Scheme to Establish Maritime Safety and Security
Rosmini Yanti, Safira Aviolita, Marsetio
-
Decentralised Edge Authentication in the Industrial Enterprise IoT Space
C. P. Autry, A.W. Roscoe
Anti and Counter Forensics
Big Data and Digital Forensics
Business Applications of Digital Forensics
Civil/Criminal Litigation Support
Cloud Forensics
Computer Forensics and Cybersecurity
Computer Forensics and Security
Computer Security and Digital Forensics
Curriculum
Cyber Crime Investigations
Cyber Criminal Psychology and Profiling
Cyber Culture and Cyber Terrorism
Cyber Forensics
Cybercrime Investigations
Cybersecurity and Digital Forensics
Data Hiding and Recovery
Data Hiding and Steganography
Database Forensics
Digital Forensic and Information Security
Digital Forensic Investigation
Digital Forensic Science
Digital Forensic Tool Testing and validation
Digital Forensic Trends
Digital Forensics
Digital Forensics and Cybersecurity
Digital Forensics and Data Analytics
Digital Forensics and Error Rates
Digital Forensics and Incident Response
Digital Forensics and Law
Digital Forensics Case Studies
Digital Forensics in Information Security
Digital Forensics Novel Algorithms
Digital Forensics Process and Procedures
Digital Forensics Process model
Digital Forensics Standardization and Accreditation
Digital Forensics Techniques and Tools
Digital Forensics Tool Testing and Validation Process
Digital Forensics Training and Education
Digital Forensics Trends
Digital Forensics Triage
Digital Forensics, Security and Law
Digital Security and Forensics
e-Discovery
Ethical Hacking
Hacking
Incident Response
Incident Response and Digital Forensics
Information Security and Digital Forensics
Information Systems and Crime Analysis
Information warfare and critical infrastructure protection
Information/Cyber Warfare and Critical Infrastructure Protection
Law Enforcement and Digital Forensics
Legal, Ethical and Policy Issues related to Digital Forensics
Machine Learning and Digital Forensics
Malware and Botnets
Mobile and Multimedia Forensics
Mobile Digital Forensics
Mobile/Handheld Device and Multimedia Forensics
Money Laundering
Network Forensics
Online Fraud
Software and Media Piracy
Abstracts/Full-Text Paper Submission Deadline |
|
January 28, 2021 |
Notification of Acceptance/Rejection |
|
February 11, 2021 |
Final Paper (Camera Ready) Submission & Early Bird Registration Deadline |
|
July 22, 2022 |
Conference Dates |
|
August 23-24, 2022 |
Kamal Alezabi |
UCSI University, MY |
Arafat Aldhaqm |
University of Technology, Malaysia, MY |
Yana Mazwin Mohmad Hassim |
Universiti Tun Hussein Onn Malaysia (UTHM), MY |
Tze Jin Wong |
Universiti Putra Malaysia, Bintulu Campus, MY |
Ganthan Narayana Samy |
Universiti Teknologi Malaysia (UTM), MY |
Pritheega Magalingam |
University of Technology, Malaysia, MY |
Babak Bashari Rad |
Asia Pacific University of Technology and Innovation, MY |
Nasim Ahmed |
Universiti Malaysia Perlis, MY |
Zailani Abdullah |
Universiti Malaysia Kelantan, MY |
Ashraf Osman |
Universiti Teknologi Malaysia (UTM), MY |
Pardis Moslemzadeh Tehrani |
National University of Malaysia, MY |
Risyawati Mohamed Ismail |
Universiti Utara Malaysia, MY |
Ganeshsree Selvachandran |
UCSI University, MY |
Hamid Jalab |
University of Malaya, MY |
Ganthan Narayana Samy |
Universiti Teknologi Malaysia, MY |
Dewi Nasien |
Universiti of Teknologi Malaysia, MY |
Erne Suzila Kassim |
Universiti Teknologi MARA, MY |
Mazdak Zamani |
Universiti Teknologi Malaysia, MY |
Madihah Mohd Saudi |
Universiti Sains Islam Malaysia(USIM), MY |
Zuraini Ismail |
Universiti Teknologi Malaysia, MY |
Zalilah Shariff |
Universiti Putra Malaysia, MY |
Bharanidharan Shanmugam |
Universiti Teknologi Malaysia, MY |
Sobihatun Nur Abdul Salam |
Universiti Utara Malaysia, MY |
Siti Mariyam Shamsuddin |
Universiti Teknologi Malaysia, MY |
Mohammad Ghulam Rahman |
Universiti Sains Malaysia, MY |
Hatim M Tahir |
universiti utara malaysia, MY |
Nadai Al - Saidi |
University Putra Malaysia, MY |
Khaled Suwais |
Universiti Sains Malaysia, MY |
Ahmed Haidar |
University Malaysia Pahang, MY |
Mohammad Azamathulla Hazi |
Univesiti Sains Malaysia, MY |
Participation Type |
Early Registration Fees |
Registration Fees |
Non-Student Oral/Poster Presenter Registration |
€ 450 |
€ 500 |
Student Oral/Poster Presenter Registration |
€ 350 |
€ 400 |
Listener Registration |
€ 250 |
€ 300 |
Additional Paper Publication |
€ 100 |
All conference materials and services will be delivered digitally to the participant with the online conference management system.
Conference registration includes the following digital materials and services:
- e-certificates [for Authors: Certificate of Attendance and Presentation; for Listeners: Certificate of Attendance; for Chairs: Certificate of Attendance and Appreciation; for Presenters: Certificate of Best Presentation (if conferred based appraisal)]
- e-program
- e-book
- e-name badge
- e-receipt
- e-presentation
Presentation Types:
-
Physical presentation is an oral conferencing presentation that is made using digital technology including embedded digital elements ( texts, tables, graphs, or videos ) for PowerPoint sharing.
-
Digital presentation is a digital conferencing presentation that is made using digital technology including embedded digital elements ( texts, tables, graphs, or videos ) for PowerPoint sharing.
Early Bird Registration
Early Bird registration is valid until 2022-07-22 23:59:59
Online Credit Card Processing
Online payment option available for author
and listener delegates.
Conference participants can make online credit card payments for conference registration fees.