CSCI 2024
The 2024 International Conference on
Computational Science and Computational Intelligence (CSCI)
December 11-13, 2024, Las Vegas, USA
Prologue:
Cyber Warfare adds an additional dimension to warfare. Generally, it involves the battlespace use and targeting of computers and networks in warfare. Cyber Warfare strategies include both offensive and defensive operations pertaining to the threat of cyberattacks, espionage, sabotage, disruptions to infrastructures, theft of critical information, and publishing deliberate misinformation (fake news and fabricated news) spread via traditional media and online social media with the intend to mislead in order to disrupt the political processes of nations. The methods and technologies utilized in Cyber Warfare can be countered using Cyber Defense strategies. Cyber Defense strategies involve the heavy and targeted use of Cyber Security. Topics of interest include:
- Cyber Warfare Technologies and Strategies
- Cyber Defense Technologies and Strategies
- Authorization Infrastructures
- Autonomous Security Methods
- Novel Biometric Methods
- Cloud Security
- Forensic Technologies
- Cryptography and Formal Methods
- Trapping Technologies
- Data Protection Methods
- Security and Reverse Engineering
- Vulnerability Analysis
- Steganography and Steganalysis
- Identity Management
- Security Policies
- Legislation and Regulatory Approaches for Enhancing Security
- Safe Computing
- Identification and Prevention of Online Scams
- Mobile Protection Techniques
- Security Risk Analysis, Management and Trade-offs
- Identity, Privacy and Trust Management
- Security by Design
- Incident Response Methods
- Cybercrime and Underground Economy - Identification and Prevention
- Detection of Malicious Software
- Novel Security Tools
- Lifecycle Security Management and Identification of the Weakest Links
- Internet Security
- Network Security
- Computer Security
- Prevention of Cyber Attacks on Critical Infrastructures
- Methodologies in Reducing National Vulnerability to Cyber Attacks
- Methods for Minimizing Damage and Recovery Time from Cyber Attacks
- Prevention of Fake and Fabricated News - Media Trust Management
- Cyber Warfare and Attack Prevention during Elections
- Secure Voting Systems
- Securing Electric Power Grids + Smart Grids
- Securing Communication Systems
- Cyber Counter-intelligence
- Tools in Cyber Warfare and Cyber Defense Arsenal
- Innovative Tools for Cyber Defense Technologies
- Cyber Weapons
- Cyber Space and Security
- Threats from Social Media
- Crime and Terrorism
- IT and Countering Violent Extremism
- Global Security
- Data Analytics and Cyber Warfare
- Prevention of Bad Data Injection
- Advanced Persistent Threat (APT) and Prevention
- Data Exfiltration
- Tools for Countering Attacks by Viruses, Worms, Malware, Phishing, SQL Injection Attack, Cross-Site Scripting, Session Hijacking, Trojan Horses, Rootkits, Botnets, ...
- Security and Social Engineering
- Tools for Countering Logic Bomb, Time Bomb, Distributed Denial-of-Service Attack, ...
- Methodologies to Address System and Data Vulnerabilities
- Novel Patching Techniques
- Next Generation Firewalls
- Intrusion Detection Techniques
- Terrorism Databases and Resources
- Terrorist Networks
- Threat Assessment
- Cyber Vandalism and Defense
- Cyber Security and Terrorism
- Counter-terrorism
- Cyber Tools and Identification of Propaganda
- Security Education and Training