You are invited to participate in The Third International Conference on Digital Security and Forensics (DigitalSec2016) that will be held in Kuala Lumpur, Malaysia on September 06-08, 2016 as part of the The Fifth World Congress on Computing, Engineering and Technology (WCET). The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures.
The conference welcome papers on the following (but not limited to) research topics: | ||
---|---|---|
Distributed and Pervasive Systems Security | Enterprise Systems Security | |
Formal Methods Application in Security | Hardware-Based Security | |
Incident Handling and Penetration Testing | Legal Issues | |
Multimedia and Document Security | Operating Systems and Database Security | |
Privacy Issues | Secure Software Development, Architecture and Outsourcing | |
Security for Future Networks | Security in Cloud Computing | |
Security in Social Networks | Security of Web-based Applications and Services | |
Security Protocols | VOIP, Wireless and Telecommunications Network Security | |
SCADA and Embedded Systems Security | Anti-Cyberterrorism | |
Anti-Forensics and Anti-Anti-Forensics Techniques | Cyber-Crimes | |
Data leakage, Data Protection and Database Forensics | Evidentiary Aspects of Digital Forensics | |
Executable Content and Content Filtering | File System and Memory Analysis Multimedia Forensic | |
Forensics of Virtual and Cloud Environments | Information Hiding | |
Investigation of Insider Attacks | Large-Scale Investigations | |
Malware Forensics and Anti-Malware Techniques | New Threats and Non-Traditional approaches | |
Network Forensics and Traffic Analysis | Hardware Vulnerabilities and Device Forensics | |
Computer Forensics | Business Continuity & Disaster Recovery Planning | |
Corporate Governance | Critical Infrastructure Protection | |
Decidability and Complexity | Digital Rights Management and Intellectual Property Protection | |
Economics of Security | Fraud Management | |
Identity Management | Laws and Regulations | |
Security Policies and Trust Management | Threats, Vulnerabilities, and Risk Management | |
Computer Crime Prevention and Detection | Authentication and Access Control Systems | |
Biometrics Applications | Biometrics Standards and Standardization | |
Cyber Peacefare Trends and Approaches | Electronic Passports, National ID and Smart Card Security | |
New Theories and Algorithms in Biometrics | Social Engineering | |
Surveillance Systems | Template Protection and Liveliness Detection | |
Computer Security | Confidentiality Protection | |
Cryptography and Data Protection | Forensics, Recognition Technologies and Applications | |
Network Security | Security; Authentication and Cryptography for Wireless Networks |
All registered papers will be published in SDIWC Digital Library, and in the proceedings of the conference.
The conference uses double-blind review by at least two reviewers, which means that both the reviewer and author identities are concealed from the reviewers, and vice versa, throughout the review process. To facilitate this, authors need to ensure that their manuscripts are prepared in a way that does not give away their identity.
The published proceedings will be indexed by at least five or more of the following: DBLP, EI, INSPEC, Research Bible, Scirus, Microsoft Academic Research, ResearchGate, and Google Scholar Databases. In addition, ALL selected papers will be published in one of the following special issues provided that the author do major improvements and extension within the time frame that will be set by the conference and his/her paper is approved by the chief editor: