MM-INTEREST Archives

ACM SIGMM Interest List

MM-INTEREST@LISTSERV.ACM.ORG

Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Condense Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Mime-Version:
1.0
Content-Type:
text/plain; charset="UTF-8"
Date:
Sat, 9 Feb 2013 13:50:18 -0500
Reply-To:
"The Second International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec2013)" <[log in to unmask]>
Subject:
Content-Transfer-Encoding:
quoted-printable
Message-ID:
Sender:
ACM SIGMM Interest List <[log in to unmask]>
From:
"The Second International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec2013)" <[log in to unmask]>
Parts/Attachments:
text/plain (104 lines)
CALL FOR PAPERS AND PARTICIPATION
<<<<--->>+<<---->>+<<--->>+<<--->>+<<--->>+<<--->>+<<--->>+<<--->>+<<--->>+<<--->>+<<--->>+<<--->>+<<--->>>>

Submission Deadline: Feb. 12, 2013
The Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec2013)
Asia Pacific University of Technology and Innovation, Kuala Lumpur, Malaysia

<<<<--->>+<<---->>+<<--->>+<<--->>+<<--->>+<<--->>+<<--->>+<<--->>+<<--->>+<<--->>+<<--->>+<<--->>+<<--->>>>
INTRODUCTION

The main objective of this conference is to provide a medium for professionals, engineers, academicians, scientists, and researchers from all over the world to present the results of their research activities in the field of Computer Science, Information Security, Engineering and Information Technology.

<<<<--->>+<<---->>+<<--->>+<<--->>+<<--->>+<<--->>+<<--->>+<<--->>+<<--->>+<<--->>+<<--->>+<<--->>+<<--->>>>
Recommended topics include, but are not limited to, the following:

**** Cyber Security
<<--->> Privacy issues
<<--->> Formal Methods Application in Security
<<--->> Incident Handling and Penetration Testing
<<--->> Operating Systems and Database Security
<<--->> Security in Cloud Computing
<<--->> Security in Social Networks
<<--->> Multimedia and Document Security
<<--->> Hardware<<--->>Based security
<<--->> VOIP, Wireless and Telecommunications Network Security
<<--->> Security of Web<<--->>based Applications and Services
<<--->> Enterprise Systems Security
<<--->> SCADA and Embedded systems security
<<--->> Distributed and Pervasive Systems Security
<<--->> Secure Software Development, Architecture and Outsourcing
<<--->> Security for Future Networks
<<--->> Security protocols
<<--->> Legal Issues

**** Digital Forensic
<<--->> Data leakage, Data protection and Database forensics
<<--->> Forensics of Virtual and Cloud Environments
<<--->> Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics
<<--->> Information Hiding
<<--->> File System and Memory Analysis Multimedia Forensic
<<--->> Executable Content and Content Filtering
<<--->> Anti<<--->>Forensics and Anti<<--->>Anti<<--->>Forensics Techniques
<<--->> Malware forensics and Anti<<--->>Malware techniques
<<--->> Evidentiary Aspects of Digital Forensics
<<--->> Investigation of Insider Attacks
<<--->> Cyber<<--->>Crimes
<<--->> Large<<--->>Scale Investigations
<<--->> New threats and Non<<--->>Traditional approaches

**** Information Assurance and Security Management
<<--->> Corporate Governance
<<--->> Laws and Regulations
<<--->> Threats, Vulnerabilities, and Risk Management
<<--->> Business Continuity & Disaster Recovery Planning
<<--->> Critical Infrastructure Protection
<<--->> Digital Rights Management and Intellectual Property Protection
<<--->> Security Policies and Trust Management
<<--->> Identity Management
<<--->> Decidability and Complexity
<<--->> Economics of Security
<<--->> Fraud Management

**** Cyber Peacefare and Physical Security
<<--->> Surveillance Systems
<<--->> Cyber Peacefare Trends and Approaches
<<--->> Social engineering
<<--->> Authentication and Access Control Systems
<<--->> Biometrics Applications
<<--->> Electronic Passports, National ID and Smart Card Security
<<--->> Template Protection and Liveliness detection
<<--->> Biometrics standards and standardization
<<--->> New theories and algorithms in biometrics

<<<<--->>+<<---->>+<<--->>+<<--->>+<<--->>+<<--->>+<<--->>+<<--->>+<<--->>+<<--->>+<<--->>+<<--->>+<<--->>>>
ELECTRONIC PAPER SUBMISSION 

http://sdiwc.net/conferences/2013/Malaysia3/openconf/openconf.php


<<<<--->>+<<---->>+<<--->>+<<--->>+<<--->>+<<--->>+<<--->>+<<--->>+<<--->>+<<--->>+<<--->>+<<--->>+<<--->>>>
IMPORTANT DATES 

Submission Date <<---->>        : Feb. 12, 2013
Notification of acceptance<<-->>: Feb. 17, 2013 
Camera Ready submission<<---->> : Feb. 20, 2013
Registration<<-->>              : Feb. 23, 2013
Conference dates<<---->>      : March 4-6, 2013

<<<<--->>+<<---->>+<<--->>+<<--->>+<<--->>+<<--->>+<<--->>+<<--->>+<<--->>+<<--->>+<<--->>+<<--->>+<<--->>>>
Inquiries can be forwarded to:
-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Natalie Walker
The Society of Digital Information and Wireless Communications (SDIWC)
Kowloon, Hongkong
http://www.dcmrf.net/Malaysia3
[log in to unmask]

############################

To unsubscribe from the MM-INTEREST list:
write to: mailto:[log in to unmask]
or click the following link:
http://listserv.acm.org/scripts/wa-ACMLPX.exe?SUBED1=MM-INTEREST&A=1

ATOM RSS1 RSS2