2nd International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec) 2013

  • Conference Call
  • The Society of Digital Information and Wireless Communications (SDIWC) invites you to participate in The Second International Conference on Cyber Security, Cyber Warfare and Digital Forensic that will be held in Kuala Lumpur, Malaysia, on March 4-6, 2013 as part of The world congress on Computing and Information Technology (WCIT). The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures.

    Conference Topics

    Areas of interest for CyberSec2013 include, but are not limited to:

    Cyber Security

    • Privacy issues
    • Formal Methods Application in Security
    • Incident Handling and Penetration Testing
    • Operating Systems and Database Security
    • Security in Cloud Computing
    • Security in Social Networks
    • Multimedia and Document Security
    • Hardware-Based security
    • VOIP, Wireless and Telecommunications Network Security
    • Security of Web-based Applications and Services
    • Enterprise Systems Security
    • SCADA and Embedded systems security
    • Distributed and Pervasive Systems Security
    • Secure Software Development, Architecture and Outsourcing
    • Security for Future Networks
    • Security protocols
    • Legal Issues

    Cyber warfare and Physical Security

    • Surveillance Systems
    • Cyber Warfare Trends and Approaches
    • Social engineering
    • Authentication and Access Control Systems
    • Biometrics Applications
    • Electronic Passports, National ID and Smart Card Security
    • Template Protection and Liveliness detection
    • Biometrics standards and standardization
    • New theories and algorithms in biometrics

    Information Assurance and Security Management

    Corporate Governance

    • Laws and Regulations
    • Threats, Vulnerabilities, and Risk Management
    • Business Continuity & Disaster Recovery Planning
    • Critical Infrastructure Protection
    • Digital Rights Management and Intellectual Property Protection
    • Security Policies and Trust Management
    • Identity Management
    • Decidability and Complexity
    • Economics of Security
    • Fraud Management

    Digital Forensic

    • Data leakage, Data protection and Database forensics
    • Forensics of Virtual and Cloud Environments
    • Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics
    • Information Hiding
    • File System and Memory Analysis Multimedia Forensic
    • Executable Content and Content Filtering
    • Anti-Forensics and Anti-Anti-Forensics Techniques
    • Malware forensics and Anti-Malware techniques
    • Evidentiary Aspects of Digital Forensics
    • Investigation of Insider Attacks
    • Cyber-Crimes
    • Large-Scale Investigations
    • New threats and Non-Traditional approaches

    Publication Opportunities

    Papers submitted will be reviewed by a minimum of two reviewers. The published proceedings will be reviewed for possible inclusion within the DBLP, EI, INSPEC, Research Bible, Scirus, Microsoft Academic Research, ResearchGate, and Google Scholar Databases.

    In addition, the proceedings will be sent for indexing in EI Compendex. In addition, best selected papers will be published in one of the following special issues provided that the author do major improvements and extension within the time frame that will be set by the conference and his/her paper is approved by the chief editor:

    Organize a Special Session

    Researchers are welcome to organize special session. The session should be within a very specific topic. Please send your session title, your cv for this purpose to cyb@sdiwc.net.

    The conference will list the session on the web. The session chair will manage the publicity of his session. It is expected that each session will attract 5 registered papers. The session chair will get a free registration for one of his papers.

    The submission and the reviewing process for the papers of the sessions will be managed jointly between the chair and the conference. The chair can take the responsibility of the reviewing with the help of other researchers. However, the conference will get all the reviewing reports at the end.

    Organize a Workshop

    CyberSec2013 will host several workshops addressing different areas related to digital technologies that complement the main  CyberSec2013 conference. Workshops are intended to serve as an intensive collaborative forum for exchanging ideas and theories that are still in an evolutionary stage. We encourage prospective workshop organizers to submit their proposals focusing on either in-depth analysis or broad-ranging approaches to areas related to digital technologies.

    Important Dates

    Proposal submission: Nov. 1, 2012
    Notification of acceptance: Dec. 20, 2012

    Submission Guidelines

    A workshop proposal should be one page long and should contain the following information: 

    • Title, Summary, Topics
    • Format and duration
    • Organizers (please attach short CV for each organizer, limit of 2 pages each)
    • Type (academic and/or industrial) and a number of expected participants
    • Significance in relation to the topics of the conference
    • Details of any previous workshops

    Workshop proposals are reviewed based on the proposal quality, their relation to the main CyberSec2013 topics, and the likelihood to attract a sufficient number of participants. The papers containing  CyberSec2013 workshops will be published in the conference proceedings. Workshop proposals should be submitted by e-mail to cyb@sdiwc.net.

    starting: ending: 06.03.2013 Location: , Category:


    Conference START 06.03.2013 END

    All deadlines have expired!

    This conference has no more open deadlines. There may be successive conferences coming up you may by interested in.

    Please check our conference list and search...

    Conference Facts

    Location , Address Asia Pacific University College of Technology & Innovation, Bukit Jalil Hwy Category Organiser More Info Conference Website

    Further interesting Conferences

    Currently we have no similar events listed. Please check our website regulary, subscribe to our RSS-Feed or follow us on twitter for new listings.