CyberSec2012

The International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec2012) University Putra Malaysia, Kuala Lumpur, Malaysia June 26-28, 2012 http://www.sdiwc.net/CyberSec2012/

=
=========================================================== The proposed conference on the above theme will be held at University Putra Malaysia, Kuala Lumpur, Malaysia, From June 26-28, 2012 which aims to enable researchers to build connections between different digital applications.

The conference welcomes papers on the following (but not limited to) research topics:

-Privacy issues -Formal Methods Application in Security -Incident Handling and Penetration Testing -Operating Systems and Database Security -Security in Cloud Computing -Security in Social Networks -Multimedia and Document Security -Hardware-Based security -VOIP, Wireless and Telecommunications Network Security -Security of Web-based Applications and Services -Enterprise Systems Security -SCADA and Embedded systems security -Distributed and Pervasive Systems Security -Secure Software Development, Architecture and Outsourcing -Security for Future Networks -Security protocols -Legal Issues
 * Cyber Security

-Data leakage, Data protection and Database forensics -Forensics of Virtual and Cloud Environments -Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics -Information Hiding -File System and Memory Analysis Multimedia Forensic -Executable Content and Content Filtering -Anti-Forensics and Anti-Anti-Forensics Techniques -Malware forensics and Anti-Malware techniques -Evidentiary Aspects of Digital Forensics -Investigation of Insider Attacks -Cyber-Crimes -Large-Scale Investigations -New threats and Non-Traditional approaches
 * Digital Forensic

-Corporate Governance -Laws and Regulations -Threats, Vulnerabilities, and Risk Management -Business Continuity & Disaster Recovery Planning -Critical Infrastructure Protection -Digital Rights Management and Intellectual Property Protection -Security Policies and Trust Management -Identity Management -Decidability and Complexity -Economics of Security -Fraud Management
 * Information Assurance and Security Management

-Surveillance Systems -Cyber Warfare Trends and Approaches -Social engineering -Authentication and Access Control Systems -Biometrics Applications -Electronic Passports, National ID and Smart Card Security -Template Protection and Liveliness detection -Biometrics standards and standardization -New theories and algorithms in biometrics
 * Cyber warfare and Physical Security

Researchers are encouraged to submit their work electronically. All papers will be fully refereed by a minimum of two specialized referees. Before final acceptance, all referees comments must be considered.

Important Dates

=
=

Submission Date          : March 30, 2012 Notification of acceptance: Apr. 25, 2012 Camera Ready submission  : May 10, 2012 Registration             : May 10, 2012 Conference dates         : June 26-28, 2012