From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on polar.synack.me X-Spam-Level: X-Spam-Status: No, score=-0.9 required=5.0 tests=BAYES_00,FORGED_GMAIL_RCVD, FREEMAIL_FROM autolearn=no autolearn_force=no version=3.4.4 X-Google-Thread: 103376,367f7bec2a817449,start X-Google-NewGroupId: yes X-Google-Attributes: gida07f3367d7,domainid0,public,usenet X-Google-Language: ENGLISH,ASCII-7-bit Received: by 10.68.234.38 with SMTP id ub6mr1462445pbc.2.1336535106130; Tue, 08 May 2012 20:45:06 -0700 (PDT) Path: pr3ni4734pbb.0!nntp.google.com!news1.google.com!postnews.google.com!q9g2000pbv.googlegroups.com!not-for-mail From: sdiwc conferences Newsgroups: comp.lang.ada Subject: Last CFP- CyberSecurity - Malaysia - IEEE Date: Tue, 8 May 2012 20:16:21 -0700 (PDT) Organization: http://groups.google.com Message-ID: NNTP-Posting-Host: 203.87.162.24 Mime-Version: 1.0 X-Trace: posting.google.com 1336535106 19518 127.0.0.1 (9 May 2012 03:45:06 GMT) X-Complaints-To: groups-abuse@google.com NNTP-Posting-Date: Wed, 9 May 2012 03:45:06 +0000 (UTC) Complaints-To: groups-abuse@google.com Injection-Info: q9g2000pbv.googlegroups.com; posting-host=203.87.162.24; posting-account=NQ8QiwoAAACEQH6GMvL2YUBITn8I5kuK User-Agent: G2/1.0 X-HTTP-UserAgent: Mozilla/5.0 (Windows NT 6.1; rv:9.0.1) Gecko/20100101 Firefox/9.0.1,gzip(gfe) Content-Type: text/plain; charset=ISO-8859-1 Date: 2012-05-08T20:16:21-07:00 List-Id: The International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec2012) University Putra Malaysia, Kuala Lumpur, Malaysia June 26-28, 2012 http://www.sdiwc.net/CyberSec2012/ The CyberSec2012 is technically co-sponsored by IEEE Malaysia Chapter and All papers will be submitted to IEEE for potential inclusion to IEEE Xplore and Ei Compendex. ======================================================================== The proposed conference on the above theme will be held at University Putra Malaysia, Kuala Lumpur, Malaysia, From June 26-28, 2012 which aims to enable researchers to build connections between different digital applications. The conference welcomes papers on the following (but not limited to) research topics: *Cyber Security -Privacy issues -Formal Methods Application in Security -Incident Handling and Penetration Testing -Operating Systems and Database Security -Security in Cloud Computing -Security in Social Networks -Multimedia and Document Security -Hardware-Based security -VOIP, Wireless and Telecommunications Network Security -Security of Web-based Applications and Services -Enterprise Systems Security -SCADA and Embedded systems security -Distributed and Pervasive Systems Security -Secure Software Development, Architecture and Outsourcing -Security for Future Networks -Security protocols -Legal Issues *Digital Forensic -Data leakage, Data protection and Database forensics -Forensics of Virtual and Cloud Environments -Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics -Information Hiding -File System and Memory Analysis Multimedia Forensic -Executable Content and Content Filtering -Anti-Forensics and Anti-Anti-Forensics Techniques -Malware forensics and Anti-Malware techniques -Evidentiary Aspects of Digital Forensics -Investigation of Insider Attacks -Cyber-Crimes -Large-Scale Investigations -New threats and Non-Traditional approaches *Information Assurance and Security Management -Corporate Governance -Laws and Regulations -Threats, Vulnerabilities, and Risk Management -Business Continuity & Disaster Recovery Planning -Critical Infrastructure Protection -Digital Rights Management and Intellectual Property Protection -Security Policies and Trust Management -Identity Management -Decidability and Complexity -Economics of Security -Fraud Management *Cyber warfare and Physical Security -Surveillance Systems -Cyber Warfare Trends and Approaches -Social engineering -Authentication and Access Control Systems -Biometrics Applications -Electronic Passports, National ID and Smart Card Security -Template Protection and Liveliness detection -Biometrics standards and standardization -New theories and algorithms in biometrics Researchers are encouraged to submit their work electronically. All papers will be fully refereed by a minimum of two specialized referees. Before final acceptance, all referees comments must be considered. Important Dates ============== Submission Date : May 12, 2012 Notification of acceptance: May 22, 2012 Camera Ready submission : May 25, 2012 Registration : May 30, 2012 Conference dates : June 26-28, 2012