The International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec2012)

Venue: University Putra Malaysia

Location: Kuala Lumpur, Malaysia

Event Date/Time: Jun 26, 2012 End Date/Time: Jun 28, 2012
Registration Date: May 10, 2012
Paper Submission Date: Mar 30, 2012
Report as Spam

Description

The International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec2012)
University Putra Malaysia, Kuala Lumpur, Malaysia
June 26-28, 2012
http://www.sdiwc.net/CyberSec2012/

========================================================================
The proposed conference on the above theme will be held at University Putra Malaysia, Kuala Lumpur, Malaysia, From June 26-28, 2012 which aims to enable researchers to build connections between different digital applications.

The conference welcomes papers on the following (but not limited to) research topics:

*Cyber Security
-Privacy issues
-Formal Methods Application in Security
-Incident Handling and Penetration Testing
-Operating Systems and Database Security
-Security in Cloud Computing
-Security in Social Networks
-Multimedia and Document Security
-Hardware-Based security
-VOIP, Wireless and Telecommunications Network Security
-Security of Web-based Applications and Services
-Enterprise Systems Security
-SCADA and Embedded systems security
-Distributed and Pervasive Systems Security
-Secure Software Development, Architecture and Outsourcing
-Security for Future Networks
-Security protocols
-Legal Issues

*Digital Forensic
-Data leakage, Data protection and Database forensics
-Forensics of Virtual and Cloud Environments
-Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics
-Information Hiding
-File System and Memory Analysis Multimedia Forensic
-Executable Content and Content Filtering
-Anti-Forensics and Anti-Anti-Forensics Techniques
-Malware forensics and Anti-Malware techniques
-Evidentiary Aspects of Digital Forensics
-Investigation of Insider Attacks
-Cyber-Crimes
-Large-Scale Investigations
-New threats and Non-Traditional approaches

*Information Assurance and Security Management
-Corporate Governance
-Laws and Regulations
-Threats, Vulnerabilities, and Risk Management
-Business Continuity & Disaster Recovery Planning
-Critical Infrastructure Protection
-Digital Rights Management and Intellectual Property Protection
-Security Policies and Trust Management
-Identity Management
-Decidability and Complexity
-Economics of Security
-Fraud Management

*Cyber warfare and Physical Security
-Surveillance Systems
-Cyber Warfare Trends and Approaches
-Social engineering
-Authentication and Access Control Systems
-Biometrics Applications
-Electronic Passports, National ID and Smart Card Security
-Template Protection and Liveliness detection
-Biometrics standards and standardization
-New theories and algorithms in biometrics

Researchers are encouraged to submit their work electronically. All papers will be fully refereed by a minimum of two specialized referees. Before final acceptance, all referees comments must be considered.

Important Dates
==============

Submission Date : March 30, 2012
Notification of acceptance: Apr. 25, 2012
Camera Ready submission : May 10, 2012
Registration : May 10, 2012
Conference dates : June 26-28, 2012

Venue