| |||||||||||||||
CyberSec 2013 : The Second International Conference on Cyber Security, Cyber Warfare and Digital Forensic | |||||||||||||||
Link: http://www.sdiwc.net/conferences/2013/Malaysia3 | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
The Second International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec2013)
The Asia Pacific University of Technology and Innovation (APU), Kuala Lumpur, Malaysia March 4-6, 2013 http://www.sdiwc.net/conferences/2013/Malaysia3 ======================================================================== The proposed conference on the above theme will be held at The Asia Pacific University of Technology and Innovation (APU), Kuala Lumpur, Malaysia, From March 4-6, 2013 which aims to enable researchers build connections between different digital applications. The conference welcomes papers on the following (but not limited to) research topics: * Cyber Security - Privacy issues - Formal Methods Application in Security - Incident Handling and Penetration Testing - Operating Systems and Database Security - Security in Cloud Computing - Security in Social Networks - Multimedia and Document Security - Hardware-Based security - VOIP, Wireless and Telecommunications Network Security - Security of Web-based Applications and Services - Enterprise Systems Security - SCADA and Embedded systems security - Distributed and Pervasive Systems Security - Secure Software Development, Architecture and Outsourcing - Security for Future Networks - Security protocols - Legal Issues * Digital Forensic - Data leakage, Data protection and Database forensics - Forensics of Virtual and Cloud Environments - Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics - Information Hiding - File System and Memory Analysis Multimedia Forensic - Executable Content and Content Filtering - Anti-Forensics and Anti-Anti-Forensics Techniques - Malware forensics and Anti-Malware techniques - Evidentiary Aspects of Digital Forensics - Investigation of Insider Attacks - Cyber-Crimes - Large-Scale Investigations - New threats and Non-Traditional approaches * Information Assurance and Security Management - Corporate Governance - Laws and Regulations - Threats, Vulnerabilities, and Risk Management - Business Continuity & Disaster Recovery Planning - Critical Infrastructure Protection - Digital Rights Management and Intellectual Property Protection - Security Policies and Trust Management - Identity Management - Decidability and Complexity - Economics of Security - Fraud Management * Cyber warfare and Physical Security - Surveillance Systems - Cyber Warfare Trends and Approaches - Social engineering - Authentication and Access Control Systems - Biometrics Applications - Electronic Passports, National ID and Smart Card Security - Template Protection and Liveliness detection - Biometrics standards and standardization - New theories and algorithms in biometrics Researchers are encouraged to submit their work electronically. All papers will be fully refereed by a minimum of two specialized referees. Before final acceptance, all referees comments must be considered. Important Dates ============== Submission Date : Dec 15, 2012 Notification of acceptance: Jan 01, 2013 Camera Ready submission : Jan. 15, 2013 Registration : Jan. 15, 2013 Conference dates : March 4-6, 2013 |
|