International Conference on Law, Cyber Warfare, Terrorism and Security ICLCWTS

Date: 06 Nov 2023 to 07 Nov 2023
Venue: Cape Town,


Conference Tags: law security

CAcute situational awareness
Aircraft Environment
Art of war
Artificial immune recognition system security infrastructure
Association of Religions with Warfare
Biometrics
Case studies of cyber attacks in modern conflicts
Collaborative decision making
Compromise path analysis
Computers-as-weapons
Context free grammers
Corporate defence mechanisms
Counter-terrorism security policies, procedures and legislation
Critical national infrastructure protection
Cryptography : classical and malicious
Current Anti Virus Technologies
Cyber conflict
Cyber conflict frameworks
Cyber-fraud
Cyber-terrorism
Data and service integration
Data Integration
Data Loss
Defence steganography
Digital forensics
e-Health systems as part of a national critical infrastructure
e-Intelligence/counter-intelligence
Electro-magnetic pulse weapons
Ethical, political and social issues relating to information warfare
Firewalls
Gaussian empirical rule
Hacking and cracking
Human Factors
Image-processing
Influence campaigns
Information Assurance
Information operations
Information Security Architecture
Information Security Economy
Information security governance and management
Information warfare and security education
Information warfare policy
Information warfare techniques
Information warfare theory
Information, computer and network security
Infra-structure warfare
IT auditing and compliance
Legal issues concerned with information warfare and e-Crime
Machine Learning Risk
Malwares and antimalwares technologies
Mathematical-filtering
Military approaches
Military Culture Topography
Mobile Virus
National security policy
Natural computing
Network Address Translator
Network anomaly detection models
Networked Centric War
Non-traditional enemies
Particle swarm data mining
Patriotic hackers as an extension of state power
Perception management
Phishing and spam
Physical security
Potential military uses of cyber attacks
Psychological warfare
Public Key Infrastructure
Random numbers approximation sequence
Reflector attacks
RFID Virus
Risk Management
Security for small to medium enterprises
Security implications of “virtualised machines and services
Security of the virtual worlds
Security policy
SIMAD what can/should be done to protect against this threat?
SMEs - Small-to-medium Size Enterprises Security model
SQL Infections
Strategic leadership
Subliminal Channel
The Resilience and Susceptibility of "Service Oriented Architectures" (SOAs)
Theoretical cyber conflict scenarios
Threat Agents
Traffic classification
Unidirectional linguistic steganography
Virtual Intrusion Detection
Wireless Treats

For more info see: https://waset.org/law-cyber-warfare-terrorism-and-security-conference-in-november-2023-in-cape-town?utm_source=conferenceindex&utm_medium=referral&utm_campaign=listing