The Second International Conference on Cyber Security, Cyber Warfare and Digital Forensic

The Second International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec2013) offered by SDIWC will take place in Kuala Lumpur, Malaysia on 4 Mar 2013.
By: ITvents.com
 
Aug. 26, 2012 - PRLog -- The 2nd International Conference on Cyber Security, Cyber Warfare and Digital Forensic CyberSec-2013 is aimed to enable researchers build connections between different digital applications.

The conference welcomes papers on the following research topics:

* Cyber Security
- Privacy issues
- Formal Methods Application in Security
- Incident Handling and Penetration Testing
- Operating Systems and Database Security
- Security in Cloud Computing
- Security in Social Networks
- Multimedia and Document Security
- Hardware-Based security
- VOIP, Wireless and Telecommunications Network Security
- Security of Web-based Applications and Services
- Enterprise Systems Security
- SCADA and Embedded systems security
- Distributed and Pervasive Systems Security
- Secure Software Development, Architecture and Outsourcing
- Security for Future Networks
- Security protocols
- Legal Issues

* Digital Forensic
- Data leakage, Data protection and Database forensics
- Forensics of Virtual and Cloud Environments
- Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics
- Information Hiding
- File System and Memory Analysis Multimedia Forensic
- Executable Content and Content Filtering
- Anti-Forensics and Anti-Anti-Forensics Techniques
- Malware forensics and Anti-Malware techniques
- Evidentiary Aspects of Digital Forensics
- Investigation of Insider Attacks
- Cyber-Crimes
- Large-Scale Investigations
- New threats and Non-Traditional approaches

* Information Assurance and Security Management
- Corporate Governance
- Laws and Regulations
- Threats, Vulnerabilities, and Risk Management
- Business Continuity & Disaster Recovery Planning
- Critical Infrastructure Protection
- Digital Rights Management and Intellectual Property Protection
- Security Policies and Trust Management
- Identity Management
- Decidability and Complexity
- Economics of Security
- Fraud Management

* Cyber warfare and Physical Security
- Surveillance Systems
- Cyber Warfare Trends and Approaches
- Social engineering
- Authentication and Access Control Systems
- Biometrics Applications
- Electronic Passports, National ID and Smart Card Security
- Template Protection and Liveliness detection
- Biometrics standards and standardization
- New theories and algorithms in biometrics

Get more info and register online for the The Second International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec2013) at http://itvents.com/the-second-international-conference-on...

---

ITVENTS.COM is the largest listing of IT training courses and conferences provided by global corporations (such as Microsoft, IBM and Oracle) and independent consultants from IT, telecom, web and other technology and computer related industries. More IT events can be found on http://itvents.com
End
Source:ITvents.com
Email:***@itevent.net Email Verified
Tags:Data Protection, VOIP, Multimedia
Industry:Event
Account Email Address Verified     Account Phone Number Verified     Disclaimer     Report Abuse
Business Conferences and Training News
Trending
Most Viewed
Daily News



Like PRLog?
9K2K1K
Click to Share