posted by user: cyber13 || 7246 views || tracked by 30 users: [display]

CyberSec 2013 : The Second International Conference on Cyber Security, Cyber Warfare and Digital Forensic

FacebookTwitterLinkedInGoogle

Link: http://www.sdiwc.net/conferences/2013/Malaysia3
 
When Mar 4, 2013 - Mar 6, 2013
Where Kuala Lumpur, Malaysia
Submission Deadline Dec 15, 2012
Notification Due Jan 1, 2013
Final Version Due Jan 20, 2013
Categories    cyber security   cyber crimes   information technologies   computer science
 

Call For Papers

The Second International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec2013)
The Asia Pacific University of Technology and Innovation (APU), Kuala Lumpur, Malaysia
March 4-6, 2013
http://www.sdiwc.net/conferences/2013/Malaysia3

========================================================================
The proposed conference on the above theme will be held at The Asia Pacific University of Technology and Innovation (APU), Kuala Lumpur, Malaysia, From March 4-6, 2013 which aims to enable researchers build connections between different digital applications.

The conference welcomes papers on the following (but not limited to) research topics:

* Cyber Security
- Privacy issues
- Formal Methods Application in Security
- Incident Handling and Penetration Testing
- Operating Systems and Database Security
- Security in Cloud Computing
- Security in Social Networks
- Multimedia and Document Security
- Hardware-Based security
- VOIP, Wireless and Telecommunications Network Security
- Security of Web-based Applications and Services
- Enterprise Systems Security
- SCADA and Embedded systems security
- Distributed and Pervasive Systems Security
- Secure Software Development, Architecture and Outsourcing
- Security for Future Networks
- Security protocols
- Legal Issues

* Digital Forensic
- Data leakage, Data protection and Database forensics
- Forensics of Virtual and Cloud Environments
- Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics
- Information Hiding
- File System and Memory Analysis Multimedia Forensic
- Executable Content and Content Filtering
- Anti-Forensics and Anti-Anti-Forensics Techniques
- Malware forensics and Anti-Malware techniques
- Evidentiary Aspects of Digital Forensics
- Investigation of Insider Attacks
- Cyber-Crimes
- Large-Scale Investigations
- New threats and Non-Traditional approaches

* Information Assurance and Security Management
- Corporate Governance
- Laws and Regulations
- Threats, Vulnerabilities, and Risk Management
- Business Continuity & Disaster Recovery Planning
- Critical Infrastructure Protection
- Digital Rights Management and Intellectual Property Protection
- Security Policies and Trust Management
- Identity Management
- Decidability and Complexity
- Economics of Security
- Fraud Management

* Cyber warfare and Physical Security
- Surveillance Systems
- Cyber Warfare Trends and Approaches
- Social engineering
- Authentication and Access Control Systems
- Biometrics Applications
- Electronic Passports, National ID and Smart Card Security
- Template Protection and Liveliness detection
- Biometrics standards and standardization
- New theories and algorithms in biometrics

Researchers are encouraged to submit their work electronically. All papers will be fully refereed by a minimum of two specialized referees. Before final acceptance, all referees comments must be considered.

Important Dates
==============

Submission Date : Dec 15, 2012
Notification of acceptance: Jan 01, 2013
Camera Ready submission : Jan. 15, 2013
Registration : Jan. 15, 2013
Conference dates : March 4-6, 2013

Related Resources

ICCWS 2019   14th International Conference on Cyber Warfare and Security
GreeNet Symposium - SGNC 2018   9th Symposium on Green Networking and Computing (SGNC 2018)
ETRIJ Cyber Security & AI 2019   ETRI Journal Special issue on Cyber Security and AI
ICISIP 2018   The 6th IIAE International Conference on Intelligent Systems and Image Processing 2018
Cyber Security Attacks and Defenses 2018   Workshop of Cyber Security Attacks and Defenses
IJIST 2018   The International Journal of Information Science & techniques
CSITS 2018   International Workshop on Cyber Security for Intelligent Transportation Systems
ACIIDS 2018   10th Asian Conference on Intelligent Information and Database Systems
SECITC 2018   11th International Conference on Security for Information Technology and Communications
3ICT 2018   International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies