Image description

Tourist Attractions Nearby San Bernardino, California


Deadlines to Remember

 Submission(Extended)              March 25, 2015
 Acceptance            April 15, 2015
 Camera Ready            April 30, 2015 
 Registration (Early Bird)            April 30, 2015
 Conference            May 16-17,2015

Conference Proceedings

The proceedings will be reviewd for possible inclusion within the Scopus, ISI, EI, DBLP, Microsoft Academic Research, ResearchGate, and Google Scholar DatabasesAll the accepted papers will be included in IAASSE digital Library.


It is important that at least one author per accepted paper or participants register at the prescribed rates on or before the deadline. It is OPEN now!


The delegates from other countries who wish to attend the Conference can be provided Invitation letter for Visa.

A tour package to Tourist Aattractions nearby Redlands can be arranged on Demand & Paid basis.

Call For Papers

ICCS 2015 is an opportunity for academics, students, scholars, scientists and engineers from around the world who are involved in the study, management, development and implementation of systems and concepts to combat information warfare or to improve information systems security to come together and exchange ideas.This conference is trying to establish itself as a key event for the understanding of threats and risks to information systems, the development of a strong security culture, and incident investigation.

Please consider submitting to this conference.  We are interested in the entire range of concepts from theory to practice, including case studies, works-in-progress, and conceptual explorations. Topics for submissions may include, but are not limited to:


  • Cyberwarfare practice and theory
  • The politics of cyberwarfare, including conceptual cyberarms agreements
  • Cyber-exploitation execution and detection
  • Information security practice
  • Information security management
  • Dual-use technologies
  • Cyber conflict - Neural linguistic techniques in cyberwarfare
  • Patriotic hackers as an extension of state power
  • Potential military uses of cyber attacks
  • Case studies of cyber attacks in modern conflicts
  • Theoretical cyber conflict scenarios
  • Marketing managemnt for Cyber Security
  • Human Factors
  • Cyber-terrorism
  • Management control system in Cyber Security
  • Cyber security in Education
  • Financial factors & Consideration for Cyber Security
  • IReturn on Investment in Cyber Security
  • SMEs - Small-to-medium Size Enterprises Security model
  • Critical national infrastructure protection
  • Information warfare theory
  • Security implications of “virtualised machines and services
  • e-Health systems as part of a national critical infrastructure
  • Information warfare techniques
  • The Resilience and Susceptibility of "Service Oriented Architectures" (SOAs)
  • Information security governance and management
  • Information warfare and security education
  • Hacking
  • Research & Development in Cyber Security
  • e-Intelligence/counter-intelligence
  • Information Assurance
  • Privacy and Cryptography
  • Networked Centric War
  • Malware
  • Wireless Threats
  • Reflector attacks
  • UCE
  • Threat Agents – Insider threats
  • Cyber security personnel- Recruitment, retention and development
  • Cyber-fraud
  • Particle swarm data mining
  • Computers-as-weapons
  • Risk Management
  • Virtual Intrusion Detection
  • Electro-magnetic pulse weapons
  • Collaborative decision making
  • National security policy
  • Information operations
  • Security policy
  • Acute situational awareness
  • Strategic leadership
  • Firewalls
  • Aircraft Environment
  • Influence campaigns
  • Phishing and spam
  • Digital forensics
  • Psychological warfare
  • Current Anti Virus Technologies
  • Network anomaly detection models
  • Mobile Virus
  • Corporate defence mechanisms
  • Perception management
  • RFID Virus
  • Security for small to medium enterprises
  • Infra-structure warfare
  • SQL Infections
  • Information, computer and network security
  • Military Culture Topography
  • Data Loss
  • Security of the virtual worlds
  • Modern conflict
  • Managers’ beliefs and attitudes toward information and cyber security policy
  • SIMAD what can/should be done to protect against this threat?
  • Military approaches
  • ISO 27001
  • Unidirectional linguistic steganography
  • Compromise path analysis
  • Gaussian empirical rule
  • IT auditing and compliance
  • Defence steganography
  • Natural computing
  • Information Security Architecture
  • Data and service integration
  • Random numbers approximation sequence
  • Artificial immune recognition system security infrastructure
  • Legal issues concerned with information warfare and e-Crime