CHI-ANNOUNCEMENTS Archives

ACM SIGCHI General Interest Announcements (Mailing List)

CHI-ANNOUNCEMENTS@LISTSERV.ACM.ORG

Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Condense Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Sender:
"ACM SIGCHI General Interest Announcements (Mailing List)" <[log in to unmask]>
X-To:
Date:
Tue, 26 Jul 2016 00:04:59 +0800
Reply-To:
Grace Allas <[log in to unmask]>
Subject:
MIME-Version:
1.0
Message-ID:
Content-Transfer-Encoding:
quoted-printable
Content-Type:
text/plain; charset=UTF-8
From:
Grace Allas <[log in to unmask]>
Parts/Attachments:
text/plain (92 lines)
*** CALL FOR PAPERS SUBMISSION***

*The Third International Conference on Digital Security and Forensics
(DigitalSec2016)*

Asia Pacific University of Technology and Innovation (APU)
Kuala Lumpur, Malaysia
September 06-08, 2016

http://sdiwc.net/conferences/digitalsec2016/

All registered papers will be included in SDIWC Digital Library.

IMPORTANT DATES:

Submission Deadline :  Open from now until August 6, 2016
Notification of Acceptance :  August 20, 2016 or 4 weeks from the
submission date
Camera Ready Submission : Open from now until August 26, 2016
Registration Date :  August 26, 2016
Conference Dates :  September 06-08, 2016

==============================================================
RESEARCH TOPICS ARE NOT LIMITED TO:

The conference welcomes papers on the following (but not limited to)
research topics:

• Distributed and Pervasive Systems Security
• Enterprise Systems Security
• Formal Methods Application in Security
• Hardware-Based security
• Incident Handling and Penetration Testing
• Legal Issues
• Multimedia and Document Security
• Operating Systems and Database Security
• Privacy issues
• Secure Software Development, Architecture and Outsourcing
• Security for Future Networks
• Security in Cloud Computing
• Security in Social Networks
• Security of Web-based Applications and Services
• Security protocols
• VOIP, Wireless and Telecommunications Network Security
• SCADA and Embedded systems security
• Anti-cyberterrorism
• Anti-Forensics and Anti-Anti-Forensics Techniques
• Cyber-Crimes
• Data leakage, Data protection and Database forensics
• Evidentiary Aspects of Digital Forensics
• Executable Content and Content Filtering
• File System and Memory Analysis Multimedia Forensic
• Forensics of Virtual and Cloud Environments
• Information Hiding
• Investigation of Insider Attacks
• Large-Scale Investigations
• Malware forensics and Anti-Malware techniques
• New threats and Non-Traditional approaches
• Network Forensics and Traffic Analysis
• Hardware Vulnerabilities and Device Forensics
• Computer Forensics
• Business Continuity & Disaster Recovery Planning
• Corporate Governance
• Critical Infrastructure Protection
• Decidability and Complexity
• Digital Rights Management and Intellectual Property Protection
• Economics of Security
• Fraud Management
• Identity Management
• Laws and Regulations
• Security Policies and Trust Management
**********************************************

Write us for more details: [log in to unmask]

Please see co-conferences --

  The Fifth World Congress on Computing, Engineering and Technology (WCET)
  http://sdiwc.net/congress/wcet2016/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

    ---------------------------------------------------------------
    For news of CHI books, courses & software, join CHI-RESOURCES
     mailto: [log in to unmask]

    To unsubscribe from CHI-ANNOUNCEMENTS send an email to
     mailto:[log in to unmask]

    For further details of CHI lists see http://listserv.acm.org
    ---------------------------------------------------------------

ATOM RSS1 RSS2