W3C home > Mailing lists > Public > w3c-wai-ig@w3.org > October to December 2012

CFP:: CyberSec2013- Kuala Lumpur:: Malaysia

From: The Second International Conference on Cyber Security, Cyber Warfare and Digita <cyb@sdiwc.net>
Date: Thu, 8 Nov 2012 03:23:55 -0800
Message-ID: <e6e4f1822c507916cb6da5736aad34cc.squirrel@secure82.inmotionhosting.com>
To: w3c-wai-ig@w3.org
The Second International Conference on Cyber Security, Cyber Warfare and
Digital Forensic (CyberSec2013)
The Asia Pacific University of Technology and Innovation (APU), Kuala
Lumpur, Malaysia
                           March 4-6, 2013
                   http://www.dcmrf.net/Malaysia3

========================================================================
The proposed conference on the above theme will be held at The Asia
Pacific University of Technology
and Innovation (APU), Kuala Lumpur, Malaysia, From March 4-6, 2013 which
aims to enable researchers
build connections between different digital applications

The conference welcomes papers on the following (but not limited to)
research topics:

* Cyber Security
- Privacy issues
- Formal Methods Application in Security
- Incident Handling and Penetration Testing
- Operating Systems and Database Security
- Security in Cloud Computing
- Security in Social Networks
- Multimedia and Document Security
- Hardware-Based security
- VOIP, Wireless and Telecommunications Network Security
- Security of Web-based Applications and Services
- Enterprise Systems Security
- SCADA and Embedded systems security
- Distributed and Pervasive Systems Security
- Secure Software Development, Architecture and Outsourcing
- Security for Future Networks
- Security protocols
- Legal Issues

* Digital Forensic
- Data leakage, Data protection and Database forensics
- Forensics of Virtual and Cloud Environments
- Network Forensics and Traffic Analysis Hardware Vulnerabilities and
Device Forensics
- Information Hiding
- File System and Memory Analysis Multimedia Forensic
- Executable Content and Content Filtering
- Anti-Forensics and Anti-Anti-Forensics Techniques
- Malware forensics and Anti-Malware techniques
- Evidentiary Aspects of Digital Forensics
- Investigation of Insider Attacks
- Cyber-Crimes
- Large-Scale Investigations
- New threats and Non-Traditional approaches

* Information Assurance and Security Management
- Corporate Governance
- Laws and Regulations
- Threats, Vulnerabilities, and Risk Management
- Business Continuity & Disaster Recovery Planning
- Critical Infrastructure Protection
- Digital Rights Management and Intellectual Property Protection
- Security Policies and Trust Management
- Identity Management
- Decidability and Complexity
- Economics of Security
- Fraud Management

* Cyber warfare and Physical Security
- Surveillance Systems
- Cyber Warfare Trends and Approaches
- Social engineering
- Authentication and Access Control Systems
- Biometrics Applications
- Electronic Passports, National ID and Smart Card Security
- Template Protection and Liveliness detection
- Biometrics standards and standardization
- New theories and algorithms in biometrics

Researchers are encouraged to submit their work electronically. All papers
will be fully
refereed by a minimum of two specialized referees. Before final
acceptance, all referees
comments must be considered.

Important Dates
==============

Submission Date           : Dec 15, 2012
Notification of acceptance: Jan 01, 2013
Camera Ready submission   : Jan. 15, 2013
Registration              : Jan. 15, 2013
Conference dates          : March 4-6, 2013

=====================================

Inquiries can be forwarded to:
-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Natalie Walker
The Society of Digital Information and Wireless Communications (SDIWC)
Kowloon, Hongkong
http://sdiwc.net/conferences/2013/Malaysia3
https://sites.google.com/site/cybersec2013/
Received on Thursday, 8 November 2012 11:24:28 GMT

This archive was generated by hypermail 2.2.0+W3C-0.50 : Thursday, 8 November 2012 11:24:29 GMT