日本データベース学会

dbjapanメーリングリストアーカイブ(2013年)

Invitation for COMSEC2014 Conference


Greetings!

You are invited to participate in The International Conference on Computer Security and Digital Investigation (ComSec2014) that will be held in Kuala Lumpur, Malaysia on March 18-20, 2014 as part of The World Congress on Computing and Information Technology (WCIT2014). The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures.

Please follow the link below for more information about the said conference. 

http://sdiwc.net/conferences/2014/comsec2014/

The conference welcomes papers on the following (but not limited to) research topics:

Cyber Security

-          Distributed and Pervasive Systems Security        

-          Enterprise Systems Security

-          Formal Methods Application in Security

-          Hardware-Based security

-          Incident Handling and Penetration Testing          

-          Legal Issues

-          Multimedia and Document Security       

-          Operating Systems and Database Security

-          Privacy issues   

-          SCADA and Embedded systems security

-          Secure Software Development, Architecture and Outsourcing

-          Security for Future Networks

-          Security in Cloud Computing

-          Security in Social Networks

-          Security of Web-based Applications and Services

-          Security protocols

-          VOIP, Wireless and Telecommunications Network Security

 

Information Assurance and Security Management

-          Anti-Forensics and Anti-Anti-Forensics Techniques

-          Cyber-Crimes

-          Data leakage, Data protection and Database forensics

-          Evidentiary Aspects of Digital Forensics

-          Executable Content and Content Filtering           

-          File System and Memory Analysis Multimedia Forensic

-          Forensics of Virtual and Cloud Environments

-          Information Hiding

-          Investigation of Insider Attacks

-          Large-Scale Investigations

-          Malware forensics and Anti-Malware techniques

-          Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics

-          New threats and Non-Traditional approaches     

Cyber Peacefare and Physical Security

-          Authentication and Access Control Systems

-          Biometrics Applications

-          Biometrics standards and standardization

-          Cyber Peacefare Trends and Approaches

-          Electronic Passports, National ID and Smart Card Security

-          New theories and algorithms in biometrics

-          Social engineering          

-          Surveillance Systems

-          Template Protection and Liveliness detection  

Important Dates

==============

Submission Deadline                      : February 18, 2014

Notification of Acceptance          : February 25, 2014

Camera Ready Submission           : March 8, 2014

Registration                                        : March 8, 2014

Conference Dates                           : March 18-20, 2014

==============================

Thank you,

 

Sincerely,

Grace

grace.sdiwc [at] gmail.com