• Email: wliu@aut.ac.nz
  • | Email: bcusack@aut.ac.nz

The conference welcomes papers on the following (but not limited to) research topics:

Cyber Security Stream:-

Distributed and Pervasive Systems Security
Formal Methods Application in Security
Incident Handling and Penetration Testing
Multimedia and Document Security
Privacy issues
Secure Software Development, Architecture and Outsourcing
Security in Cloud Computing
Security of Web-based Applications and Services
VOIP, Wireless and Telecommunications Network Security
Enterprise Systems Security
Hardware-Based security
Legal Issues
Operating Systems and Database Security
SCADA and Embedded systems security
Security for Future Networks
Security in Social Networks
Security protocols

 

Digital Forensics Stream:-

Anti-Forensics and Anti-Anti-Forensics Techniques
Data leakage, Data protection and Database forensics
Executable Content and Content Filtering
Forensics of Virtual and Cloud Environments
Investigation of Insider Attacks
Malware forensics and Anti-Malware techniques
New threats and Non-Traditional approaches
Cyber-Crimes
Evidentiary Aspects of Digital Forensics
File System and Memory Analysis Multimedia Forensic
Information Hiding
Large-Scale Investigations
Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics

 

Information Assurance and Security Management:-

eGovernment
Business Continuity & Disaster Recovery Planning
Critical Infrastructure Protection
Digital Rights Management and Intellectual Property Protection
Fraud Management
Laws and Regulations
Threats, Vulnerabilities, and Risk Management
Corporate Governance
Decidability and Complexity
Economics of Security
Identity Management
Security Policies and Trust Management