The Second International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec2013) The Asia Pacific University of Technology and Innovation (APU), Kuala Lumpur, Malaysia March 4-6, 2013 http://www.dcmrf.net/Malaysia3
======================================================================== The proposed conference on the above theme will be held at The Asia Pacific University of Technology and Innovation (APU), Kuala Lumpur, Malaysia, From March 4-6, 2013 which aims to enable researchers build connections between different digital applications
The conference welcomes papers on the following (but not limited to) research topics:
* Cyber Security - Privacy issues - Formal Methods Application in Security - Incident Handling and Penetration Testing - Operating Systems and Database Security - Security in Cloud Computing - Security in Social Networks - Multimedia and Document Security - Hardware-Based security - VOIP, Wireless and Telecommunications Network Security - Security of Web-based Applications and Services - Enterprise Systems Security - SCADA and Embedded systems security - Distributed and Pervasive Systems Security - Secure Software Development, Architecture and Outsourcing - Security for Future Networks - Security protocols - Legal Issues
* Digital Forensic - Data leakage, Data protection and Database forensics - Forensics of Virtual and Cloud Environments - Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics - Information Hiding - File System and Memory Analysis Multimedia Forensic - Executable Content and Content Filtering - Anti-Forensics and Anti-Anti-Forensics Techniques - Malware forensics and Anti-Malware techniques - Evidentiary Aspects of Digital Forensics - Investigation of Insider Attacks - Cyber-Crimes - Large-Scale Investigations - New threats and Non-Traditional approaches
* Information Assurance and Security Management - Corporate Governance - Laws and Regulations - Threats, Vulnerabilities, and Risk Management - Business Continuity & Disaster Recovery Planning - Critical Infrastructure Protection - Digital Rights Management and Intellectual Property Protection - Security Policies and Trust Management - Identity Management - Decidability and Complexity - Economics of Security - Fraud Management
* Cyber warfare and Physical Security - Surveillance Systems - Cyber Warfare Trends and Approaches - Social engineering - Authentication and Access Control Systems - Biometrics Applications - Electronic Passports, National ID and Smart Card Security - Template Protection and Liveliness detection - Biometrics standards and standardization - New theories and algorithms in biometrics
Researchers are encouraged to submit their work electronically. All papers will be fully refereed by a minimum of two specialized referees. Before final acceptance, all referees comments must be considered.
Important Dates ==============
Submission Date : Dec 15, 2012 Notification of acceptance: Jan 01, 2013 Camera Ready submission : Jan. 15, 2013 Registration : Jan. 15, 2013 Conference dates : March 4-6, 2013