The International Conference on Cyber Security, CyberWarfare and Digital Forensic

full name / name of organization: 
Noah John Ucab / The Society of Digital Information and Wireless Communications
contact email: 
info@sdiwc.info

Areas of interest for CyberSec2012 include, but are not limited to:

Cyber Security

- Privacy issues
- Formal Methods Application in Security
- Incident Handling and Penetration Testing
- Operating Systems and Database Security
- Security in Cloud Computing
- Security in Social Networks
- Multimedia and Document Security
- Hardware-Based security
- VOIP, Wireless and Telecommunications Network Security
- Security of Web-based Applications and Services
- Enterprise Systems Security
- SCADA and Embedded systems security
- Distributed and Pervasive Systems Security
- Secure Software Development, Architecture and Outsourcing
- Security for Future Networks
- Security protocols
- Legal Issues

Digital Forensic

- Data leakage, Data protection and Database forensics
- Forensics of Virtual and Cloud Environments
- Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics
- Information Hiding
- File System and Memory Analysis Multimedia Forensic
- Executable Content and Content Filtering
- Anti-Forensics and Anti-Anti-Forensics Techniques
- Malware forensics and Anti-Malware techniques
- Evidentiary Aspects of Digital Forensics
- Investigation of Insider Attacks
- Cyber-Crimes
- Large-Scale Investigations
- New threats and Non-Traditional approaches

Information Assurance and Security Management

- Corporate Governance
- Laws and Regulations
- Threats, Vulnerabilities, and Risk Management
- Business Continuity & Disaster Recovery Planning
- Critical Infrastructure Protection
- Digital Rights Management and Intellectual Property Protection
- Security Policies and Trust Management
- Identity Management
- Decidability and Complexity
- Economics of Security
- Fraud Management

Cyber warfare and Physical Security

- Surveillance Systems
- Cyber Warfare Trends and Approaches
- Social engineering
- Authentication and Access Control Systems
- Biometrics Applications
- Electronic Passports, National ID and Smart Card Security
- Template Protection and Liveliness detection
- Biometrics standards and standardization
- New theories and algorithms in bio-metrics

Papers submitted will be reviewed by a minimum of two reviewers. All the papers will be submitted to IEEE for potential inclusion to IEEE Explore which is abstracted/indexed in ISI Proceedings and Scopus. The published proceedings will be reviewed for possible inclusion within the INSPEC Database. In addition, the proceedings will be sent for indexing in EI Compendex. In addition, best selected papers will be published in one of the following special issues provided that the author do major improvements and extension within the time frame that will be set by the conference and his/her paper is approved by the chief editor.

cfp categories: 
african-american
american
general_announcements
graduate_conferences
humanities_computing_and_the_internet
international_conferences
journals_and_collections_of_essays
modernist studies
professional_topics
science_and_culture
theory
twentieth_century_and_beyond
victorian