The International Conference on Cyber Security, CyberWarfare and
 Digital Forensic
Faculty of Computer Science and Information Technology, 
University Putra Malaysia, 
June 26-28, 2012
Conference website:

 The event will be held over three days, with presentations delivered
by researchers from the international community,including
presentations from keynote speakers and state-of-the-art lectures.

Areas of interest for CyberSec2012 include, but are not limited to:
    Cyber Security
    Privacy issues
    Formal Methods Application in Security
    Incident Handling and Penetration Testing
    Operating Systems and Database Security
    Security in Cloud Computing
    Security in Social Networks
    Multimedia and Document Security
    Hardware-Based security
    VOIP, Wireless and Telecommunications Network Security
    Security of Web-based Applications and Services
    Enterprise Systems Security
    SCADA and Embedded systems security
    Distributed and Pervasive Systems Security
    Secure Software Development, Architecture and Outsourcing
    Security for Future Networks
    Security protocols
    Legal Issues
    Digital Forensic
    Data leakage, Data protection and Database forensics
    Forensics of Virtual and Cloud Environments
    Network Forensics and Traffic Analysis Hardware Vulnerabilities
      and Device Forensics
    Information Hiding
    File System and Memory Analysis Multimedia Forensic
    Executable Content and Content Filtering
    Anti-Forensics and Anti-Anti-Forensics Techniques
    Malware forensics and Anti-Malware techniques
    Evidentiary Aspects of Digital Forensics
    Investigation of Insider Attacks
    Large-Scale Investigations
    New threats and Non-Traditional approaches
    Information Assurance and Security Management
    Corporate Governance
    Laws and Regulations
    Threats, Vulnerabilities, and Risk Management
    Business Continuity & Disaster Recovery Planning
    Critical Infrastructure Protection
    Digital Rights Management and Intellectual Property Protection
    Security Policies and Trust Management
    Identity Management
    Decidability and Complexity
    Economics of Security
    Fraud Management
    Cyber warfare and Physical Security
    Surveillance Systems
    Cyber Warfare Trends and Approaches
    Social engineering
    Authentication and Access Control Systems
    Biometrics Applications
    Electronic Passports, National ID and Smart Card Security
    Template Protection and Liveliness detection
    Biometrics standards and standardization
    New theories and algorithms in biometrics

Papers submitted will be reviewed by a minimum of two reviewers. All
the papers will be submitted to IEEE for potential inclusion to IEEE
Explore which is abstracted/indexed in ISI Proceedings and Scopus. The
published proceedings will be reviewed for possible inclusion within
the INSPEC Database. In addition, the proceedings will be sent for
indexing in EI Compendex. In addition, best selected papers will be
published in one of the following special issues provided that the
author do major improvements and extension within the time frame that
will be set by the conference and his/her paper is approved by the
chief editor:

Journal of Information Ethics
International Journal of Digital Information and Wireless Communications (IJDIWC)
International Journal of Communication Networks and Information Security (IJCNIS)
International Journal of Information and Computer Security (IJICS)
International Journal of Security and Its Applications

Submission Deadline             Mar. 30, 2012
Notification of Acceptance      Apr. 25, 2012
Camera Ready Submission         May 10, 2012
Registration                    May 10, 2012
Conference Dates                June 26-28, 2012

Papers Submission

Researchers are encouraged to submit their work electronically.All
Final Manuscript should be limited to a maximum length of 6 pages
(Letter size, single space, Times Roman of font size 10, two columns
format), including figures, tables and references. Papers should be
submitted electronically as MS word or pdf format without author(s)
name. All papers will be fully refereed by a minimum of two
specialized referees. Before final acceptance, all referees comments
must be considered. Accepted papers will be published in the
conference proceedings. Accepted papers will be published in the
conference proceedings. Best papers awards will be distributed during
the conference.

Submit your paper now

If you have any problems with the above web submission form, you can
send the manuscript by email to (subject: CyberSec2012
Paper Submission). Please provide following information in your email:
Names and complete address details of all authors (including email
addresses), and Title of the submission.