|Deadlines to Remember|
|Submission (Extended)||June 30, 2017|
|Acceptance||July 15, 2017|
|Registration (Early Bird)||July 25, 2017|
|Final Paper Submission||July 25, 2017|
|Conference||August 12-13, 2017|
|Download Brochure||Click Here|
|Online Submission||Click Here|
|Call For Papers||Click Here|
Dr CRS Kumar (Dept of Computer Science and Engineering, Defence Institute of Advanced Technology(DIAT), Pune- 411025 Email: [email protected] Phone: 9886741228)is currently Head of the Department of Computer Engineering and also Chairman of Data center in Defence Institute of Advanced Technology(DIAT), DRDO, Ministry of Defence. He has received PhD, M.Tech., MBA and B.E. degrees from reputed Universities/Institutes. His areas of interest are in Cyber Security, Network Security, Fault Tolerant Computing, Game Theory, Wireless Networking. He is a Fellow of IETE, Fellow of Institution of Engineers, Senior Member of IEEE and Distinguished Speaker of Computer Society of India.
Dr Kumar has worked in leading MNCs such as Philips, Infineon, L&T Infotech in senior positions. He has visited several countries such as Australia, Germany, France, Netherlands, USA, UK, HK for work/conference participation.. Dr Kumar is member of DIAT Academic council and AICTE-INAE Steering Committee. He is currently supervising 8 PhD students and 4 Master’s students. He is reciepient of several awards including “Distinguished HOD award” at TechNext India 2017, held at IIT Mumbai.
AbstractRansomware is the new malware which has fascinated public with innovative form of attacks. The Ransomware not only attacks the systems and makes them inaccessible, it also demands certain ransom payments from the victims. There are numerous instances of Ransomware such as Cryptolocker, Reveton, CryptoWall, Fusob etc. The Ransomware may be broadly classified as Encrypting, Non-Encrypting, Leakware and Mobile. Most prominent ransomware such as Cryptolocker, uses public key cryptography to encrypt the infected machine’s data. For decrypting the files, the Ransomware may demand money/cryptocurrency from the victim. In this presentation, after giving an overview of the Ransomware attacks with case studies, we discuss new development in attacks and countermeasures in detail. We explore the emerging threats and new challenges from Ransomware.
Judge Dr. Mohamed Chawkiholds a (Ph.D.) in law from the University of Lyon III in France for a dissertation on French; British and American cybercrime legal systems. This was followed by a 3-year post-doctoral research at the Faculty of Law, University of Aix-Marseille III, France. He is senior judge at the Council of State (Conseil d’Etat) and the Founder Chairman of the International Association of Cybercrime Prevention (AILCC), Paris, France. An association of international IT experts and legal scholars specializing in cyber law, privacy and security.He is the co-drafter of the African-Union Convention on Cybersecurity. He is also a member of the International Scientific and Professional Advisory Council of the United Nations Crime Prevention and Criminal Justice Program (ISPAC), a member of the European Society of Criminal Law, and a board member of Computer Crime Research Center (CCRC) in Ukraine. His research interest covers national security, cybercrime and data protection.
He holds over 25 prizes for this academic achievement and was awarded by the Medal of Excellence by the President of the Arab Republic of Egypt in 1998 , the international prize Claire l’Heureux Dubé from Canada in 2007 and the distinguished services medal from the government of Brazil in 2009.
The Internet of Things (IoT) refers to physical objects embedded with sensors and actuators that are connected to the Internet. Some examples include wearables such as fitness devices that can track users’ activities; smart home products; and smart cities with intelligent traffic management that are armed with sensors in roads and vehicles. It is estimated that Internet-connected devices will reach one trillion by 2025. These connected devices produce huge volumes of data, which creates opportunities and legal challenges at the same time.
The key legal issue to consider in respect of “things”/connected devices when supplying to consumers is compliance with the data protection regulatory framework. Data protection law in the EU is set to change in the next year with the new General Data Protection Regulation (GDPR) applying in all member states from 25 May 2018. The GDPR came into force on 24 May 2016 with a 2 year transition period. The GDPR will introduce developments to a number of areas of EU data protection law that are likely to have a direct impact on the way device manufacturers, application developers, social platforms and other entities involved in the IOT field design, devise and bring to market IOT-based devices, systems and applications. Accordingly, this paper seeks to address and analyse the legal challenges of the Internet of Things (IoT) taking the European Union (EU) as a case study.