| |||||||||||||||
CyberSec 2012 : The International Conference on Cyber Security, Cyber Warfare and Digital Forensic | |||||||||||||||
Link: http://www.sdiwc.net/CyberSec2012/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
The International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec2012)
University Putra Malaysia, Kuala Lumpur, Malaysia June 26-28, 2012 http://www.sdiwc.net/conferences/2012/CyberSec2012/ The CyberSec2012 is technically co-sponsored by IEEE Malaysia Chapter and All papers will be submitted to IEEE for potential inclusion to IEEE Xplore and Ei Compendex. ======================================================================== The proposed conference on the above theme will be held at University Putra Malaysia, Kuala Lumpur, Malaysia, From June 26-28, 2012 which aims to enable researchers to build connections between different digital applications. The conference welcomes papers on the following (but not limited to) research topics: *Cyber Security -Privacy issues -Formal Methods Application in Security -Incident Handling and Penetration Testing -Operating Systems and Database Security -Security in Cloud Computing -Security in Social Networks -Multimedia and Document Security -Hardware-Based security -VOIP, Wireless and Telecommunications Network Security -Security of Web-based Applications and Services -Enterprise Systems Security -SCADA and Embedded systems security -Distributed and Pervasive Systems Security -Secure Software Development, Architecture and Outsourcing -Security for Future Networks -Security protocols -Legal Issues *Digital Forensic -Data leakage, Data protection and Database forensics -Forensics of Virtual and Cloud Environments -Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics -Information Hiding -File System and Memory Analysis Multimedia Forensic -Executable Content and Content Filtering -Anti-Forensics and Anti-Anti-Forensics Techniques -Malware forensics and Anti-Malware techniques -Evidentiary Aspects of Digital Forensics -Investigation of Insider Attacks -Cyber-Crimes -Large-Scale Investigations -New threats and Non-Traditional approaches *Information Assurance and Security Management -Corporate Governance -Laws and Regulations -Threats, Vulnerabilities, and Risk Management -Business Continuity & Disaster Recovery Planning -Critical Infrastructure Protection -Digital Rights Management and Intellectual Property Protection -Security Policies and Trust Management -Identity Management -Decidability and Complexity -Economics of Security -Fraud Management *Cyber warfare and Physical Security -Surveillance Systems -Cyber Warfare Trends and Approaches -Social engineering -Authentication and Access Control Systems -Biometrics Applications -Electronic Passports, National ID and Smart Card Security -Template Protection and Liveliness detection -Biometrics standards and standardization -New theories and algorithms in biometrics Researchers are encouraged to submit their work electronically. All papers will be fully refereed by a minimum of two specialized referees. Before final acceptance, all referees comments must be considered. Important Dates ============== Submission Date : May 12, 2012 Notification of acceptance: May 20, 2012 Camera Ready submission : May 30, 2012 Registration : May 30, 2012 Conference dates : June 26-28, 2012 |
|