International Conference on Law, Cyber Warfare, Terrorism and Security ICLCWTS

Date: 06 Nov 2023 to 07 Nov 2023
Venue: Cape Town, South Africa
The International Research Conference Aims and Objectives

The International Research Conference is a federated organization dedicated to bringing together a significant number of diverse scholarly events for presentation within the conference program. Events will run over a span of time during the conference depending on the number and length of the presentations. With its high quality, it provides an exceptional value for students, academics and industry researchers.

International Conference on Law, Cyber Warfare, Terrorism and Security aims to bring together leading academic scientists, researchers and research scholars to exchange and share their experiences and research results on all aspects of Law, Cyber Warfare, Terrorism and Security. It also provides a premier interdisciplinary platform for researchers, practitioners and educators to present and discuss the most recent innovations, trends, and concerns as well as practical challenges encountered and solutions adopted in the fields of Law, Cyber Warfare, Terrorism and Security.

Conference Tags: law security

Acute situational awareness
Aircraft Environment
Art of war
Artificial immune recognition system security infrastructure
Association of Religions with Warfare
Case studies of cyber attacks in modern conflicts
Collaborative decision making
Compromise path analysis
Context free grammers
Corporate defence mechanisms
Counter-terrorism security policies, procedures and legislation
Critical national infrastructure protection
Cryptography : classical and malicious
Current Anti Virus Technologies
Cyber conflict
Cyber conflict frameworks
Data and service integration
Data Integration
Data Loss
Defence steganography
Digital forensics
e-Health systems as part of a national critical infrastructure
Electro-magnetic pulse weapons
Ethical, political and social issues relating to information warfare
Gaussian empirical rule
Hacking and cracking
Human Factors
Influence campaigns
Information Assurance
Information operations
Information Security Architecture
Information Security Economy
Information security governance and management
Information warfare and security education
Information warfare policy
Information warfare techniques
Information warfare theory
Information, computer and network security
Infra-structure warfare
IT auditing and compliance
Legal issues concerned with information warfare and e-Crime
Machine Learning Risk
Malwares and antimalwares technologies
Military approaches
Military Culture Topography
Mobile Virus
National security policy
Natural computing
Network Address Translator
Network anomaly detection models
Networked Centric War
Non-traditional enemies
Particle swarm data mining
Patriotic hackers as an extension of state power
Perception management
Phishing and spam
Physical security
Potential military uses of cyber attacks
Psychological warfare
Public Key Infrastructure
Random numbers approximation sequence
Reflector attacks
RFID Virus
Risk Management
Security for small to medium enterprises
Security implications of “virtualised machines and services
Security of the virtual worlds
Security policy
SIMAD what can/should be done to protect against this threat?
SMEs - Small-to-medium Size Enterprises Security model
SQL Infections
Strategic leadership
Subliminal Channel
The Resilience and Susceptibility of "Service Oriented Architectures" (SOAs)
Theoretical cyber conflict scenarios
Threat Agents
Traffic classification
Unidirectional linguistic steganography
Virtual Intrusion Detection
Wireless Treats

For more info see: