CyberSec 2013 - The Second International Conference on Cyber Security, Cyber Warfare and Digital Forensic
Date2013-03-04 - 2013-03-06
Deadline2012-11-01
VenueKuala Lumpur, Malaysia
KeywordsCyber Security; Computer Science; Digital Information
Topics/Call fo Papers
The Second International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec2013)
The Asia Pacific University of Technology and Innovation (APU), Kuala Lumpur, Malaysia
March 4-6, 2013
http://www.sdiwc.net/conferences/2013/Malaysia3
It is planned to publish all the accepted papers in "the “Communications in Computer and Information Science” (CCIS) Series of Springer" which is abstracted/indexed in ISI Proceedings and Scopus.
========================================================================
The proposed conference on the above theme will be held at The Asia Pacific University of Technology and Innovation (APU), Kuala Lumpur, Malaysia, From March 4-6, 2013 which aims to enable researchers build connections between different digital applications.
The conference welcomes papers on the following (but not limited to) research topics:
* Cyber Security
- Privacy issues
- Formal Methods Application in Security
- Incident Handling and Penetration Testing
- Operating Systems and Database Security
- Security in Cloud Computing
- Security in Social Networks
- Multimedia and Document Security
- Hardware-Based security
- VOIP, Wireless and Telecommunications Network Security
- Security of Web-based Applications and Services
- Enterprise Systems Security
- SCADA and Embedded systems security
- Distributed and Pervasive Systems Security
- Secure Software Development, Architecture and Outsourcing
- Security for Future Networks
- Security protocols
- Legal Issues
* Digital Forensic
- Data leakage, Data protection and Database forensics
- Forensics of Virtual and Cloud Environments
- Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics
- Information Hiding
- File System and Memory Analysis Multimedia Forensic
- Executable Content and Content Filtering
- Anti-Forensics and Anti-Anti-Forensics Techniques
- Malware forensics and Anti-Malware techniques
- Evidentiary Aspects of Digital Forensics
- Investigation of Insider Attacks
- Cyber-Crimes
- Large-Scale Investigations
- New threats and Non-Traditional approaches
* Information Assurance and Security Management
- Corporate Governance
- Laws and Regulations
- Threats, Vulnerabilities, and Risk Management
- Business Continuity & Disaster Recovery Planning
- Critical Infrastructure Protection
- Digital Rights Management and Intellectual Property Protection
- Security Policies and Trust Management
- Identity Management
- Decidability and Complexity
- Economics of Security
- Fraud Management
* Cyber warfare and Physical Security
- Surveillance Systems
- Cyber Warfare Trends and Approaches
- Social engineering
- Authentication and Access Control Systems
- Biometrics Applications
- Electronic Passports, National ID and Smart Card Security
- Template Protection and Liveliness detection
- Biometrics standards and standardization
- New theories and algorithms in biometrics
Researchers are encouraged to submit their work electronically. All papers will be fully refereed by a minimum of two specialized referees. Before final acceptance, all referees comments must be considered.
Important Dates
==============
Submission Date : Nov. 1, 2012
Notification of acceptance: Dec. 1, 2012
Camera Ready submission : Dec. 15, 2012
Registration : Dec. 15, 2012
Conference dates : March 4-6, 2013
The Asia Pacific University of Technology and Innovation (APU), Kuala Lumpur, Malaysia
March 4-6, 2013
http://www.sdiwc.net/conferences/2013/Malaysia3
It is planned to publish all the accepted papers in "the “Communications in Computer and Information Science” (CCIS) Series of Springer" which is abstracted/indexed in ISI Proceedings and Scopus.
========================================================================
The proposed conference on the above theme will be held at The Asia Pacific University of Technology and Innovation (APU), Kuala Lumpur, Malaysia, From March 4-6, 2013 which aims to enable researchers build connections between different digital applications.
The conference welcomes papers on the following (but not limited to) research topics:
* Cyber Security
- Privacy issues
- Formal Methods Application in Security
- Incident Handling and Penetration Testing
- Operating Systems and Database Security
- Security in Cloud Computing
- Security in Social Networks
- Multimedia and Document Security
- Hardware-Based security
- VOIP, Wireless and Telecommunications Network Security
- Security of Web-based Applications and Services
- Enterprise Systems Security
- SCADA and Embedded systems security
- Distributed and Pervasive Systems Security
- Secure Software Development, Architecture and Outsourcing
- Security for Future Networks
- Security protocols
- Legal Issues
* Digital Forensic
- Data leakage, Data protection and Database forensics
- Forensics of Virtual and Cloud Environments
- Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics
- Information Hiding
- File System and Memory Analysis Multimedia Forensic
- Executable Content and Content Filtering
- Anti-Forensics and Anti-Anti-Forensics Techniques
- Malware forensics and Anti-Malware techniques
- Evidentiary Aspects of Digital Forensics
- Investigation of Insider Attacks
- Cyber-Crimes
- Large-Scale Investigations
- New threats and Non-Traditional approaches
* Information Assurance and Security Management
- Corporate Governance
- Laws and Regulations
- Threats, Vulnerabilities, and Risk Management
- Business Continuity & Disaster Recovery Planning
- Critical Infrastructure Protection
- Digital Rights Management and Intellectual Property Protection
- Security Policies and Trust Management
- Identity Management
- Decidability and Complexity
- Economics of Security
- Fraud Management
* Cyber warfare and Physical Security
- Surveillance Systems
- Cyber Warfare Trends and Approaches
- Social engineering
- Authentication and Access Control Systems
- Biometrics Applications
- Electronic Passports, National ID and Smart Card Security
- Template Protection and Liveliness detection
- Biometrics standards and standardization
- New theories and algorithms in biometrics
Researchers are encouraged to submit their work electronically. All papers will be fully refereed by a minimum of two specialized referees. Before final acceptance, all referees comments must be considered.
Important Dates
==============
Submission Date : Nov. 1, 2012
Notification of acceptance: Dec. 1, 2012
Camera Ready submission : Dec. 15, 2012
Registration : Dec. 15, 2012
Conference dates : March 4-6, 2013
Other CFPs
- 2012 International Conference on Applied Mechanics, Materials and Manufacturing (ICA3M 2012)
- 2012 Next Generation Networks and Services Conference (NGNS)
- International Death, Grief and Bereavement Conference 2013
- Eighth International Conference on Higher Education and Disability
- 2013 3rd International Conference on Future Environment and Energy (ICFEE 2013)
Last modified: 2012-08-15 07:27:56