Hosted by: QA Higher Education and Northumbria University London

Date: 16 – 18 January 2019

Venue: London, TBC

About the Conference

Following the successful 11th ICGS3, we have much pleasure in announcing the 12th International conference on Global Security, Safety & Sustainability.

In an era of unprecedented volatile, political and economic environments across the world, computer based systems face ever-increasing challenges, disputes and responsibilities. Whilst the Internet has created a global platform for the exchange of ideas, goods and services – it has also, however, created boundless opportunities for cyber-crime.

Therefore, the role of information systems in facilitating secure economic transactions and maintaining steady and reliable sources of information that support politically stable and sustainable socio-economic systems is becoming increasingly critical.

As the number of large organizations and individuals using the Internet and its satellite mobile technologies increases, they are increasingly vulnerable to cyber-crime. It is therefore paramount that the security industry raises its game to combat these threats. This is an issue of global importance as law enforcement agencies the world over are struggling to cope.

This Annual International Conference is an established platform in which security, safety and sustainability issues can be examined from several global perspectives through dialogue between academics, students, government representatives, chief executives, security professionals, and research scientists from the United Kingdom and from around the globe.

The three-day conference will focus on the challenges of complexity, the rapid pace of change and risk/opportunity issues associated with the 21st century lifestyle, systems and infrastructures.

Important dates
Important dates
Submission deadline 11 June 2018
Peer review to be completed 20 July 2018
Camera ready/Authors Notification 3 September 2018
Author registration 14 September 2018
The ICGS3 Conference takes place 16 – 18 January 2019

The list of topics includes (but are not limited to):

Systems Security, Safety and Sustainability Cyber Infrastructure Protection

  • Internet of Things
  • SCADA and Ransomware
  • Transport Security
  • Cyber Warfare
  • Modelling Approaches, Security and Systems Assurance Frameworks
  • Safety & Security in System of Systems
  • Trusted Systems and Devices
  • Geo-information and Geo-spatial Intelligence Security Systems (GIS)
  • Networks Security
  • Digital Twins
  • Blockchain
  • Biometric Recognition Systems and Biometry Information Exchange Security
  • Networks Privacy Security
  • Safety and Security Evaluation, Assessment and Certification
  • Large Scale Systems Protection and Management of Major Events
  • Smart Cities

The Future of Digital Forensics 

  • Cloud Forensics
  • Computer Forensics and Anti-Forensics
  • Mobile and Handheld Device Forensics
  • Chain of Custody, Recovery, Storage and Preservation
  • Tools and Applications
  • Incident Response and Investigation
  • Standards and Procedures
  • Steganography
  • E-discovery and Data Analysis
  • Network Traffic Analysis
  • Case Studies and Best Practices
  • Legal Issues Related to Cloud Computing
  • Legal and Ethical Aspects of Digital Forensics
  • Computer Forensic Tools Used in Investigating a Crime Scene, Data Analysis and Root Cause
  • Forensics and Assistance of Hacked Environment, Tools (Types) Used in Investigating a Crime Scene, Data Analysis and Root Cause
  • Technical Methods in Collecting Volatile and Non-Volatile Information
  • Legislation and Evidence for Prosecution

Information Systems Security Management

  • Information Systems
  • Information Security Management Systems
  • Risk Management
  • Cyber Risk Management
  • Cyber Resilience
  • Safety, Reliability and Risk Analysis
  • Strategic Approaches to Security
  • Fraud Management
  • IT Audit, Governance and Security
  • Compliance and Certification
  • Risk Assessment, Methodologies and Tools
  • Social Media Control, Risk and Governance
  • Security and Privacy Architecture and Design For Software and Systems
  • Methods and Models for Security and Privacy
  • Support Tools For Modelling Security and Privacy
  • Methods and Tools For Modelling Trust
  • Human Aspects in Security and Privacy

Cyber Criminology 

  • Cyber-Criminology, Criminal Data Mining, Threat Analysis and Prediction
  • Crime and Social Media
  • Victimisation
  • Cyber Criminology, Theories and Models,
  • Psychology of the Cyber Criminals
  • Cybercrime Policing
  • Cybercrime Justice Models
  • The role of Big data
  • Dark Web/ Darknet
  • Jurisdiction
  • Hacking and Cracking
  • Cyber Bullying, Stoking Etc.
  • Cybercrime Punishment
  • E-Identification (e.g. Evolving EU Legal Framework, Identity Related Rights)
  • Augmented Reality

Cyber Intelligence and Operation

  • Cyber-Crime Detection and Prevention
  • Crime Information Intelligence Network
  • Cyber Threat Intelligence
  • Cyber War
  • Open Source Intelligence
  • Law Enforcement Agencies
  • Social Media
  • Attack Pattern Recognition
  • Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) Support Systems
  • Cloud Computing Security
  • Enterprise Architecture Security
  • Security in Mobile Operating Environments
  • Enterprise Architecture Security
  • Mass Interception Communication Solutions
  • Content Digitisation Security and Mass Data Storage Banks protection
  • Counterintelligence Management

Remote System Intelligence and Counter Measures

  • Access Controls
  • Detection and Remediation of Security Breaches
  • Business Continuity Planning
  • Disaster Recovery Planning
  • Black, White and Grey Hat Hacking
  • Honeypots
  • Rootkits
  • Vulnerability Assessments – Lessons Learned on Current Operating system Vulnerabilities and Loopholes
  • War Driving
  • Wi-Fi Vulnerabilities
  • The Past, Present and Future of Computer Hacking
  • Technical Measures for Self-Protection
  • Investigative, Mitigation Methods and Techniques to Apprehend an Offender

Full research papers limited to 12-15 pages should report on novel and completed work of important value to the community. The work should not be published or in submission anywhere else.

General Chair:

Professor Hamid Jahankhani, UK

hamid.jahankhani@northumbria.ac.uk

Programme Information

Keynote Speakers

  • Lord Alex Carlile, CBE, FRSA, QC (Baron Carlile of Berriew)
  • Aaron Parker – Maritime Systems Architect at Lockheed Martin, Portsmouth, UK

Registration

All authors must register by 14 September 2018 for their papers to be included in the Conference. 

Category Fee
Author Registration (one paper only) and general participation £280
PhD Student Registration (all PhD student registrations must be accompanied by a letter from their University confirming current PhD student status) £180
Student & Supervisor Joint Registration (one paper only) £380
Each additional paper per registered author £20
Late Registration (non-authors), Full Registration (after 15 November 2018) £380
Additional Gala Dinner ticket £50
Student Participation with no submissions (attendance of the conference sessions and access to refreshments during the breaks and lunch but not the conference’s gala dinner) £90

Authors and General Participation rates include: attendance to all sessions, proceedings, coffee breaks, 2 luncheons and conference banquet.

PhD Student rates apply to full time students who provide a declaration from the University, stating full time status. This information should be emailed to the organisers with the registration form, otherwise it will not be considered.

For registration, please email Professor Hamid Jahankhani at hamid.jahankhani@northumbria.ac.uk.

Committee

General Chair:

Professor Hamid Jahankhani, UK

hamid.jahankhani@northumbria.ac.uk

  • Dr Bobby L. Tait, University of South Africa, South Africa
  • Amie Taal, Stratagem Tech Solutions Ltd, UK
  • Professor Ali Hessami, Director Vega Systems, UK
  • Professor Sérgio Tenreiro de Magalhães, Catholic Univ. of Portugal, Braga, Portugal
  • Dr Arshad Jamal, QAHE and Northumbria University London, UK
  • Dr Mathews Z. Nkhoma, RMIT International University Vietnam, Ho Chi Minh City, Vietnam
  • Professor Babak Akhgar, Director of CENTRIC, Sheffield Hallam University, UK
  • Dr Amin Hosseinian-Far, University of Northampton, UK
  • Professor Gianluigi Me, Luiss University, Italy
  • Professor Vitor Sa, University of Minho, Braga, Portugal
  • Professor Antonio Mauro, Head of Security and Compliance Assurance, Octo Telematics S.p.A., Italy
  • Professor Mohammad Dastbaz, Deputy Vice-Chancellor, University of Suffolk, UK
  • Dr John McCarthy, Director, Oxford Systems, UK
  •  Dr Christos Douligeris, University of Piraeus, Greece
  • Professor Orhan Gemikonakl, Middlesex University, UK
  • Dr Omar S. Arabiat, Balqa Applied University, Jordan
  • Mr Konstantinos Kardaras, Technical Consultant, Greece
  • Dr Chafika Benzaid, Computer Security Division, CERIST, University of Sciences and Technology Houari Boumediene, Algeria
  • Dr Bobby Tait, University of South Africa, South Africa
  • Dr Fouad Khelifi, Northumbria University, UK
  • Dr Graham Sexton, Northumbria University, UK
  • Dr Kenneth Revett, University of Maryland College Park, Massachusetts, USA
  • Dr Ken Dick, Nebraska University Centre for Information Assurance, USA
  • Dr Elias Pimenidis, University of West of England, UK
  • Professor Henrique M.D. Santos, University of Minho, Portugal
  • Professor Alexander Sideridis, Agricultural University of Athens, Greece
  • Mr Ray Brown, QAHE and Northumbria University, UK
  • Professor Murdoch Watney, University of Johannesburg, South Africa
  • Dr Mamoun Alazab, Macquarie University, Australia
  • Dr Gregory Epiphaniou, Commercial Director, Wolverhampton Cyber Research Institute (WCRI), University of Wolverhampton, UK
  • Dr Haider Alkhateeb, Wolverhampton Cyber Research Institute (WCRI), University of Wolverhampton, UK
  • Dr Carlisle George, Middlesex University, UK
  • Professor Gianluigi Me, University of Rome LUISS “Guido Carli”, Italy
  • Professor Antonio Mauro, Head of Security and Compliance Assurance, Octo Telematics S.p.A., Italy
  • Dr John McCarthy, Director, Oxford Systems, UK
  • Dr Ameer Al -Nemrat, University of East London, UK
  • Mrs Sukhvinder Hara, Middlesex University, UK
  • Dr Ian Mitchell, Middlesex University, UK
  • Professor Ahmed Bouridane, Northumbria University, UK
  • Dr Amin Hosseinian-Far, University of Northampton, UK
  • Dr Reza Montasari, Birmingham City University, UK
  • Mr Ayman Ayman El Hajjar, QAHE and Northumbria University, UK
  • Dr George Weir, University of Strathclyde, UK
  • Dr Sufian Yousef, Anglia Ruskin University, UK
testimonial image
testimonial image

“Northumbria University has a good ranking among the universities in the UK, in particular the business school.”

Kenny Chok
MSc Business with Marketing Management

MSc Cyber Security
MSc Cyber Security

MSc Cyber Security

Find out more about our part-time MSc in Cyber Security programme. This programme has start dates in February, June and October each year and is taught via 12 weekend classroom sessions spread throughout 2 years.

Why Northumbria University?
Why Northumbria University?

Why Northumbria University?

Northumbria University offers the complete student experience. As a university we have been nationally recognised for many of our achievements which is reflected in our alumni that build outstanding careers after studying with us.

Quick contact