From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Original-To: caml-list@sympa.inria.fr Delivered-To: caml-list@sympa.inria.fr Received: from mail2-relais-roc.national.inria.fr (mail2-relais-roc.national.inria.fr [192.134.164.83]) by sympa.inria.fr (Postfix) with ESMTPS id 79ED47EFC0 for ; Sat, 26 Dec 2015 19:32:12 +0100 (CET) IronPort-PHdr: 9a23:/8ss+BKEsSaTKH2afNmcpTZWNBhigK39O0sv0rFitYgULv/xwZ3uMQTl6Ol3ixeRBMOAu6wC07KempujcFJDyK7JiGoFfp1IWk1NouQttCtkPvS4D1bmJuXhdS0wEZcKflZk+3amLRodQ56mNBXsq3G/pQQfBg/4fVIsYL+lRMiK14ye7KObxd76W01wnj2zYLd/fl2djD76kY0ou7ZkMbs70RDTo3FFKKx8zGJsIk+PzV6nvp/jtM0rzyMFuvk9q9UIBaTxY/gjZbhZFyg9dWE75Yv2pxmFRgvZtVUGVWBDvQBBCAWNxRX+V4y55iTgv+FwnjKWPNL9Zb8xUDWmqaxsTUm72288Kzcl/TSP2YRLh6VBrUf5qg== Authentication-Results: mail2-smtp-roc.national.inria.fr; spf=None smtp.pra=grace.sdiwc@gmail.com; spf=Pass smtp.mailfrom=grace.sdiwc@gmail.com; spf=None smtp.helo=postmaster@mail-wm0-f67.google.com Received-SPF: None (mail2-smtp-roc.national.inria.fr: no sender authenticity information available from domain of grace.sdiwc@gmail.com) identity=pra; client-ip=74.125.82.67; receiver=mail2-smtp-roc.national.inria.fr; envelope-from="grace.sdiwc@gmail.com"; x-sender="grace.sdiwc@gmail.com"; x-conformance=sidf_compatible Received-SPF: Pass (mail2-smtp-roc.national.inria.fr: domain of grace.sdiwc@gmail.com designates 74.125.82.67 as permitted sender) identity=mailfrom; client-ip=74.125.82.67; receiver=mail2-smtp-roc.national.inria.fr; envelope-from="grace.sdiwc@gmail.com"; x-sender="grace.sdiwc@gmail.com"; x-conformance=sidf_compatible; x-record-type="v=spf1" Received-SPF: None (mail2-smtp-roc.national.inria.fr: no sender authenticity information available from domain of postmaster@mail-wm0-f67.google.com) identity=helo; client-ip=74.125.82.67; receiver=mail2-smtp-roc.national.inria.fr; envelope-from="grace.sdiwc@gmail.com"; x-sender="postmaster@mail-wm0-f67.google.com"; x-conformance=sidf_compatible X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0B5AQCq3H5WlENSfUpEEQmDWDRtBoQTgSKDHqMNBAOHCIlRBoJhIoI9gVmBDYFUBzwQAQEBAQEBAQEQAQEBAQcLCwkfMIItgiALBh0BGAMMEgMSEAcwAiQBEQEFAQ4UExQOh3cBAxIOO5lAggiBMT4xi0iBaoJ5iB8KGScNVoNGAQUOhB6LVgODQ4FKBY4viFeFQIgRgVxKg3yIWYZGhigSJIEXOYIBAVAkgU0xNINlgUsBAQE X-IPAS-Result: A0B5AQCq3H5WlENSfUpEEQmDWDRtBoQTgSKDHqMNBAOHCIlRBoJhIoI9gVmBDYFUBzwQAQEBAQEBAQEQAQEBAQcLCwkfMIItgiALBh0BGAMMEgMSEAcwAiQBEQEFAQ4UExQOh3cBAxIOO5lAggiBMT4xi0iBaoJ5iB8KGScNVoNGAQUOhB6LVgODQ4FKBY4viFeFQIgRgVxKg3yIWYZGhigSJIEXOYIBAVAkgU0xNINlgUsBAQE X-IronPort-AV: E=Sophos;i="5.20,482,1444687200"; d="scan'208";a="194442558" Received: from mail-wm0-f67.google.com ([74.125.82.67]) by mail2-smtp-roc.national.inria.fr with ESMTP/TLS/AES128-GCM-SHA256; 26 Dec 2015 19:32:11 +0100 Received: by mail-wm0-f67.google.com with SMTP id l126so42349861wml.1 for ; Sat, 26 Dec 2015 10:32:11 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:date:message-id:subject:from:to:content-type; bh=Uh4tardmNmzpX3UK1ZPqmZ5AMCO4CB7y453SqsUDmvU=; b=rR5aj/w3i7Ia1c2qm1FNeIqev8RQOwEe1nwvuegIf+dfQZKk6AEb16hbnVEy4etQ+E 0FBm5Qskg1UsA5qy7pcDsc4qpNk+X1LB6Y8br53qHm0Xu4oT2/q6Ant5LOR84Db8/zpp NmNOAA0NybO58fTkKQV2TgeGOSdb2Y+6lWgheHy5MVhcaCkuqrAPERvpbAoPwdS7ai2S lCETIPStYGVMDzXEy6QxHqGNKUGWmZjZiZlHyIcE2tTHZoJslvP5zSX+fNo7+Gx9F5OW PNUtqJwjYs3bLgH8CKJz9izTOwEvwZew2ukjFxKxYcOCxGVY46zU3vX1SESuaiwAG6Wb r3bw== MIME-Version: 1.0 X-Received: by 10.194.58.165 with SMTP id s5mr53668726wjq.70.1451154730777; Sat, 26 Dec 2015 10:32:10 -0800 (PST) Received: by 10.28.149.78 with HTTP; Sat, 26 Dec 2015 10:32:10 -0800 (PST) Date: Sun, 27 Dec 2015 02:32:10 +0800 Message-ID: From: Grace Allas To: ict4s Content-Type: multipart/alternative; boundary=047d7b8738a43e085a0527d14aeb X-Validation-by: grace.sdiwc@gmail.com Subject: [Caml-list] CFP for 2016 Third International Conference on Digital Security and Forensics in Malaysia --047d7b8738a43e085a0527d14aeb Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable *** CALL FOR PAPERS *** The Third International Conference on Digital Security and Forensics (DigitalSec2016) Asia Pacific University of Technology and Innovation (APU) Kuala Lumpur, Malaysia September 06-08, 2016 http://sdiwc.net/conferences/digitalsec2016/ All registered papers will be included in SDIWC Digital Library. =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D The conference aims to enable researchers build connections between different digital applications. The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures. RESEARCH TOPICS ARE NOT LIMITED TO: The conference welcomes papers on the following (but not limited to) research topics: =E2=80=A2 Distributed and Pervasive Systems Security =E2=80=A2 Enterprise Systems Security =E2=80=A2 Formal Methods Application in Security =E2=80=A2 Hardware-Based security =E2=80=A2 Incident Handling and Penetration Testing =E2=80=A2 Legal Issues =E2=80=A2 Multimedia and Document Security =E2=80=A2 Operating Systems and Database Security =E2=80=A2 Privacy issues =E2=80=A2 Secure Software Development, Architecture and Outsourcing =E2=80=A2 Security for Future Networks =E2=80=A2 Security in Cloud Computing =E2=80=A2 Security in Social Networks =E2=80=A2 Security of Web-based Applications and Services =E2=80=A2 Security protocols =E2=80=A2 VOIP, Wireless and Telecommunications Network Security =E2=80=A2 SCADA and Embedded systems security =E2=80=A2 Anti-cyberterrorism =E2=80=A2 Anti-Forensics and Anti-Anti-Forensics Techniques =E2=80=A2 Cyber-Crimes =E2=80=A2 Data leakage, Data protection and Database forensics =E2=80=A2 Evidentiary Aspects of Digital Forensics =E2=80=A2 Executable Content and Content Filtering =E2=80=A2 File System and Memory Analysis Multimedia Forensic =E2=80=A2 Forensics of Virtual and Cloud Environments =E2=80=A2 Information Hiding =E2=80=A2 Investigation of Insider Attacks =E2=80=A2 Large-Scale Investigations =E2=80=A2 Malware forensics and Anti-Malware techniques =E2=80=A2 New threats and Non-Traditional approaches =E2=80=A2 Network Forensics and Traffic Analysis =E2=80=A2 Hardware Vulnerabilities and Device Forensics =E2=80=A2 Computer Forensics =E2=80=A2 Business Continuity & Disaster Recovery Planning =E2=80=A2 Corporate Governance =E2=80=A2 Critical Infrastructure Protection =E2=80=A2 Decidability and Complexity =E2=80=A2 Digital Rights Management and Intellectual Property Protection =E2=80=A2 Economics of Security =E2=80=A2 Fraud Management =E2=80=A2 Identity Management =E2=80=A2 Laws and Regulations =E2=80=A2 Security Policies and Trust Management =E2=80=A2 Threats, Vulnerabilities, and Risk Management =E2=80=A2 Computer Crime Prevention and Detection =E2=80=A2 Authentication and Access Control Systems =E2=80=A2 Biometrics Applications =E2=80=A2 Biometrics standards and standardization =E2=80=A2 Cyber Peacefare Trends and Approaches =E2=80=A2 Electronic Passports, National ID and Smart Card Security =E2=80=A2 New theories and algorithms in biometrics =E2=80=A2 Social engineering =E2=80=A2 Surveillance Systems =E2=80=A2 Template Protection and Liveliness detection =E2=80=A2 Computer Security =E2=80=A2 Confidentiality Protection =E2=80=A2 Cryptography and Data Protection =E2=80=A2 Forensics, Recognition Technologies and Applications =E2=80=A2 Network Security =E2=80=A2 Security; Authentication and Cryptography for Wireless Networks ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ IMPORTANT DATES: Submission Deadline : Open from now until August 6, 2016 Notification of Acceptance : August 20, 2016 or 4 weeks from the submission date Camera Ready Submission: Open from now until August 26, 2016 Registration Date : August 26, 2016 Conference Dates : September 06-08, 2016 Researchers are encouraged to submit their work electronically. All papers will be fully refereed by a minimum of two specialized referees. Before final acceptance, all referees comments must be considered. Paper Submission: http://sdiwc.net/conferences/digitalsec2016/openconf/openconf.php Registration: http://sdiwc.net/conferences/digitalsec2016/registration/ Write us for more details: digitalsec16@sdiwc.net Please see co-conferences -- The Fifth World Congress on Computing, Engineering and Technology (WCET) http://sdiwc.net/congress/wcet2016/ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ --047d7b8738a43e085a0527d14aeb Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: quoted-printable
*** CALL FOR PAPERS ***=C2=A0


The Third International Conference on Digital Security and= Forensics (DigitalSec2016)

Asia Pacific Universit= y of Technology and Innovation (APU)
Kuala Lumpur, Malaysia
=
September 06-08, 2016


All registered papers will be included in = SDIWC Digital Library.
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
=
The conference aims to enable researchers build connections between di= fferent digital applications. The event will be held over three days, with = presentations delivered by researchers from the international community, in= cluding presentations from keynote speakers and state-of-the-art lectures.<= /div>

RESEARCH TOPICS ARE NOT LIMITED TO:

=
The conference welcomes papers on the following (but not limited= to) research topics:

=E2=80=A2 Distributed and Pe= rvasive Systems Security =
=E2=80=A2 Enterprise Systems Security
=E2=80=A2 Formal= Methods Application in Security=
=E2=80=A2 Hardware-Based security
=E2=80=A2 In= cident Handling and Penetration Testing
=E2=80=A2 Legal Issues
=E2=80=A2 Multim= edia and Document Security
=E2=80=A2 Operating Systems and Database Security
= =E2=80=A2 Privacy issues =
=E2=80=A2 Secure Software Development, Architecture and Outsourc= ing
=E2=80=A2 Security for Future Networks
=E2=80=A2 Security in Cloud Computi= ng
=E2=80=A2 Security in Social Networks
=E2=80=A2 Security of Web-based Applic= ations and Services
=E2=80=A2 Security protocols
=E2=80=A2 VOIP, Wireless and T= elecommunications Network Security
=E2=80=A2 SCADA and Embedded s= ystems security
=E2=80=A2 Anti-cyberterrorism
=E2=80=A2 Anti-Forensics and Anti= -Anti-Forensics Techniques
=E2=80=A2 Cyber-Crimes
=E2=80=A2 Data leakage, Data = protection and Database forensics
=E2=80=A2 Evidentiary Aspects of Digital Forensics
=E2=80=A2 Executable Content and Content Filtering
=E2=80=A2 File System and Memory= Analysis Multimedia Forensic
=E2=80=A2 Forensics of Virtual and = Cloud Environments
=
=E2=80=A2 Information Hiding
=E2=80=A2 Investigation of Insi= der Attacks
= =E2=80=A2 Large-Scale Investigations
=E2=80=A2 Malware forensics = and Anti-Malware techniques
=E2=80=A2 New threats and Non-Traditional approaches
=E2=80=A2 Network Forensics and Traffic Analysis
=E2=80=A2 Hardware Vulnerabilities and= Device Forensics
=E2=80=A2 Computer Forensics
=E2=80=A2 Business Continuity &a= mp; Disaster Recovery Planning
=E2=80=A2 Corporate Governance
=E2=80=A2 Critica= l Infrastructure Protection
=E2=80=A2 Decidability and Complexity=
=E2=80=A2 Dig= ital Rights Management and Intellectual Property Protection
=E2= =80=A2 Economics of Security
=E2=80=A2 Fraud Management
=E2=80=A2 Identity Mana= gement
=E2=80= =A2 Laws and Regulations
=E2=80=A2 Security Policies and Trust Ma= nagement
=E2= =80=A2 Threats, Vulnerabilities, and Risk Management
=E2=80=A2 Co= mputer Crime Prevention and Detection
=E2=80=A2 Authentication and Access Control Systems=
=E2=80=A2 Biometrics Applications
=E2=80=A2 Biometrics= standards and standardization
=E2=80=A2 Cyber Peacefare Trends a= nd Approaches
= =E2=80=A2 Electronic Passports, National ID and Smart Card Security
=E2=80=A2 New theories and algorithms in biometrics
=E2=80=A2 Social engineering
=
=E2=80=A2 Surveillance Systems
=E2=80=A2 Template Protection and Liveliness detectio= n
=E2=80=A2 Computer Security
=E2=80=A2 Confidentiality Protection
= =E2=80=A2 Cryptography and Data Protection
=E2=80=A2 Forensics, Recognition Technologies = and Applications
=E2=80=A2 Network Security
=E2=80=A2 Security; Authentication = and Cryptography for Wireless Networks
~~~~~~~~~~~~~~~~~~~~~~~~~~= ~~~~~~~~~~~~~~~~~
IMPORTANT DATES:

Submi= ssion Deadline : =C2=A0O= pen from now until August 6, 2016
Notification of Acceptance : =C2=A0August 20, 2016 or 4 = weeks from the submission date
Camera Ready Submission: Open from= now until August 26, 2016
Registration Date : =C2=A0August 26, 2016
Conference= Dates : =C2=A0September= 06-08, 2016

Researchers are encouraged to submit = their work electronically.=C2=A0
All papers will be fully referee= d by a minimum of two specialized referees.=C2=A0
Before final ac= ceptance, all referees comments must be considered.=C2=A0


Write us for more de= tails: digitalsec16@sdiwc.net=

Please see co-conferences --
=C2=A0=C2= =A0
=C2=A0 The Fifth World Congress on Computing, Engineering and= Technology (WCET)

~= ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

--047d7b8738a43e085a0527d14aeb--