Apologies in advance for multiple received copies of the CFP. 


The International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec2012)
            University Putra Malaysia, Kuala Lumpur, Malaysia
                               June 26-28, 2012
                       http://www.sdiwc.net/CyberSec2012/

The CyberSec2012 is technically co-sponsored by IEEE Malaysia Chapter and All papers will be submitted to IEEE for potential inclusion to IEEE Xplore and Ei Compendex.


========================================================================
The proposed conference on the above theme will be held at University Putra Malaysia, Kuala Lumpur, Malaysia, From June 26-28, 2012 which aims to enable researchers to build connections between different digital applications.

The conference welcomes papers on the following (but not limited to) research topics:

*Cyber Security
-Privacy issues
-Formal Methods Application in Security
-Incident Handling and Penetration Testing
-Operating Systems and Database Security
-Security in Cloud Computing
-Security in Social Networks
-Multimedia and Document Security
-Hardware-Based security
-VOIP, Wireless and Telecommunications Network Security
-Security of Web-based Applications and Services
-Enterprise Systems Security
-SCADA and Embedded systems security
-Distributed and Pervasive Systems Security
-Secure Software Development, Architecture and Outsourcing
-Security for Future Networks
-Security protocols
-Legal Issues

*Digital Forensic
-Data leakage, Data protection and Database forensics
-Forensics of Virtual and Cloud Environments
-Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics
-Information Hiding
-File System and Memory Analysis Multimedia Forensic
-Executable Content and Content Filtering
-Anti-Forensics and Anti-Anti-Forensics Techniques
-Malware forensics and Anti-Malware techniques
-Evidentiary Aspects of Digital Forensics
-Investigation of Insider Attacks
-Cyber-Crimes
-Large-Scale Investigations
-New threats and Non-Traditional approaches

*Information Assurance and Security Management 
-Corporate Governance
-Laws and Regulations
-Threats, Vulnerabilities, and Risk Management
-Business Continuity & Disaster Recovery Planning
-Critical Infrastructure Protection
-Digital Rights Management and Intellectual Property Protection
-Security Policies and Trust Management
-Identity Management
-Decidability and Complexity
-Economics of Security
-Fraud Management

*Cyber warfare and Physical Security
-Surveillance Systems
-Cyber Warfare Trends and Approaches
-Social engineering
-Authentication and Access Control Systems
-Biometrics Applications
-Electronic Passports, National ID and Smart Card Security
-Template Protection and Liveliness detection
-Biometrics standards and standardization
-New theories and algorithms in biometrics 

Researchers are encouraged to submit their work electronically. All papers will be fully refereed by a minimum of two specialized referees. Before final acceptance, all referees comments must be considered.

Important Dates
==============

Submission Date           : March 30, 2012
Notification of acceptance: Apr. 25, 2012   
Camera Ready submission   : May 10, 2012
Registration              : May 10, 2012  
Conference dates          : June 26-28, 2012 

############################

To unsubscribe from the MM-INTEREST list:
write to: mailto:[log in to unmask]
or click the following link:
http://listserv.acm.org/SCRIPTS/WA-ACMLPX.EXE?SUBED1=MM-INTEREST&A=1