Call for Special Sessions: CyberSec2013:: Malaysia

The Second International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec2013) http://sdiwc.net/conferences/2013/Malaysia3) Would like to invite Researchers for: Call for Special Sessions: CyberSec2013:: Malaysia Researchers are welcome to organize special sessions. Please send your session title, your CV for this purpose to cyb@sdiwc.net Topics of Interest ----------------------------------------------------------- The topics covered will include (but not limited to) the following: * Cyber Security - Privacy issues - Formal Methods Application in Security - Incident Handling and Penetration Testing - Operating Systems and Database Security - Security in Cloud Computing - Security in Social Networks - Multimedia and Document Security - Hardware-Based security - VOIP, Wireless and Telecommunications Network Security - Security of Web-based Applications and Services - Enterprise Systems Security - SCADA and Embedded systems security - Distributed and Pervasive Systems Security - Secure Software Development, Architecture and Outsourcing - Security for Future Networks - Security protocols - Legal Issues * Digital Forensic - Data leakage, Data protection and Database forensics - Forensics of Virtual and Cloud Environments - Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics - Information Hiding - File System and Memory Analysis Multimedia Forensic - Executable Content and Content Filtering - Anti-Forensics and Anti-Anti-Forensics Techniques - Malware forensics and Anti-Malware techniques - Evidentiary Aspects of Digital Forensics - Investigation of Insider Attacks - Cyber-Crimes - Large-Scale Investigations - New threats and Non-Traditional approaches * Information Assurance and Security Management - Corporate Governance - Laws and Regulations - Threats, Vulnerabilities, and Risk Management - Business Continuity & Disaster Recovery Planning - Critical Infrastructure Protection - Digital Rights Management and Intellectual Property Protection - Security Policies and Trust Management - Identity Management - Decidability and Complexity - Economics of Security - Fraud Management * Cyber warfare and Physical Security - Surveillance Systems - Cyber Warfare Trends and Approaches - Social engineering - Authentication and Access Control Systems - Biometrics Applications - Electronic Passports, National ID and Smart Card Security - Template Protection and Liveliness detection - Biometrics standards and standardization - New theories and algorithms in biometrics Submission Instructions and Review Process ----------------------------------------------------------- * The conference will list the session on the web. The session chair will manage the publicity of his session. It is expected that each session will attract 5 registered papers. The session chair will get a free registration for one of his papers. * The submission and the reviewing process for the papers of the session will be managed jointly between the chair and the conference. The chair can take the responsibility of the reviewing with the help of other researchers. However, the conference will get all the reviewing reports at the end. * Potential authors should submit their full paper hrough: http://sdiwc.net/conferences/2013/Malaysia3/openconf/openconf.php Authors should indicate that their manuscript is being submitted to the Special Issue. * Submitted papers must be written in English and describe original research, which is not published nor currently under review by other journals or conferences. Author guidelines can be found at http://sdiwc.net/conferences/2013/Malaysia3/camera-ready. * All articles selected for publication will be refereed by a minimum of two specialized referees knowledgeable in the topic. At least two reviewers must recommend eventual publication for an article to be accepted. Important Dates: ----------------------------------------------------------- Submission Date : Dec 15, 2012 Notification of acceptance: Jan 01, 2013 Camera Ready submission : Jan. 15, 2013 Registration : Jan. 15, 2013 Conference dates : March 4-6, 2013
participants (1)
-
The Second International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec2013)