posted by user: CyberSec || 8043 views || tracked by 12 users: [display]

CyberSec 2012 : The International Conference on Cyber Security, Cyber Warfare and Digital Forensic

FacebookTwitterLinkedInGoogle

Link: http://www.sdiwc.net/CyberSec2012/
 
When Jun 26, 2012 - Jun 28, 2012
Where Kuala Lumpur, Malaysia
Submission Deadline May 12, 2012
Notification Due May 20, 2012
Final Version Due May 30, 2012
Categories    cyber security   security in social networks   digital communications   cyber warfare
 

Call For Papers

The International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec2012)
University Putra Malaysia, Kuala Lumpur, Malaysia
June 26-28, 2012
http://www.sdiwc.net/conferences/2012/CyberSec2012/

The CyberSec2012 is technically co-sponsored by IEEE Malaysia Chapter and All papers will be submitted to IEEE for potential inclusion to IEEE Xplore and Ei Compendex.
========================================================================
The proposed conference on the above theme will be held at University Putra Malaysia, Kuala Lumpur, Malaysia, From June 26-28, 2012 which aims to enable researchers to build connections between different digital applications.

The conference welcomes papers on the following (but not limited to) research topics:

*Cyber Security
-Privacy issues
-Formal Methods Application in Security
-Incident Handling and Penetration Testing
-Operating Systems and Database Security
-Security in Cloud Computing
-Security in Social Networks
-Multimedia and Document Security
-Hardware-Based security
-VOIP, Wireless and Telecommunications Network Security
-Security of Web-based Applications and Services
-Enterprise Systems Security
-SCADA and Embedded systems security
-Distributed and Pervasive Systems Security
-Secure Software Development, Architecture and Outsourcing
-Security for Future Networks
-Security protocols
-Legal Issues

*Digital Forensic
-Data leakage, Data protection and Database forensics
-Forensics of Virtual and Cloud Environments
-Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics
-Information Hiding
-File System and Memory Analysis Multimedia Forensic
-Executable Content and Content Filtering
-Anti-Forensics and Anti-Anti-Forensics Techniques
-Malware forensics and Anti-Malware techniques
-Evidentiary Aspects of Digital Forensics
-Investigation of Insider Attacks
-Cyber-Crimes
-Large-Scale Investigations
-New threats and Non-Traditional approaches

*Information Assurance and Security Management
-Corporate Governance
-Laws and Regulations
-Threats, Vulnerabilities, and Risk Management
-Business Continuity & Disaster Recovery Planning
-Critical Infrastructure Protection
-Digital Rights Management and Intellectual Property Protection
-Security Policies and Trust Management
-Identity Management
-Decidability and Complexity
-Economics of Security
-Fraud Management

*Cyber warfare and Physical Security
-Surveillance Systems
-Cyber Warfare Trends and Approaches
-Social engineering
-Authentication and Access Control Systems
-Biometrics Applications
-Electronic Passports, National ID and Smart Card Security
-Template Protection and Liveliness detection
-Biometrics standards and standardization
-New theories and algorithms in biometrics

Researchers are encouraged to submit their work electronically. All papers will be fully refereed by a minimum of two specialized referees. Before final acceptance, all referees comments must be considered.

Important Dates
==============

Submission Date : May 12, 2012
Notification of acceptance: May 20, 2012
Camera Ready submission : May 30, 2012
Registration : May 30, 2012
Conference dates : June 26-28, 2012

Related Resources

CSW 2022   2022 International Workshop on Cyber Security (CSW 2022)
ECCWS 2022   21st European Conference on Cyber Warfare and Security
EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications
CSCML 2022   The 6th International Symposium for Cyber Security, Cryptology, and Machine Learning 2022
ICIMP 2022   The Seventeenth International Conference on Internet Monitoring and Protection
IEEE COINS 2022   IEEE COINS 2022: Hybrid (3 days on-site | 2 days virtual)
KR 2022   Principles of Knowledge Representation and Reasoning
TASE 2022   Theoretical Aspects of Software Engineering
IWCPS 2022   9th International Workshop on Cyber-Physical Systems
JISCR 2022   Journal of information security and cybercrimes research