The International Conference on Cyber Security, CyberWarfare and Digital Forensic Faculty of Computer Science and Information Technology, University Putra Malaysia, Malaysia June 26-28, 2012 Conference website: http://www.sdiwc.net/CyberSec2012/page.php?id=2 The event will be held over three days, with presentations delivered by researchers from the international community,including presentations from keynote speakers and state-of-the-art lectures. Areas of interest for CyberSec2012 include, but are not limited to: Cyber Security Privacy issues Formal Methods Application in Security Incident Handling and Penetration Testing Operating Systems and Database Security Security in Cloud Computing Security in Social Networks Multimedia and Document Security Hardware-Based security VOIP, Wireless and Telecommunications Network Security Security of Web-based Applications and Services Enterprise Systems Security SCADA and Embedded systems security Distributed and Pervasive Systems Security Secure Software Development, Architecture and Outsourcing Security for Future Networks Security protocols Legal Issues Digital Forensic Data leakage, Data protection and Database forensics Forensics of Virtual and Cloud Environments Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics Information Hiding File System and Memory Analysis Multimedia Forensic Executable Content and Content Filtering Anti-Forensics and Anti-Anti-Forensics Techniques Malware forensics and Anti-Malware techniques Evidentiary Aspects of Digital Forensics Investigation of Insider Attacks Cyber-Crimes Large-Scale Investigations New threats and Non-Traditional approaches Information Assurance and Security Management Corporate Governance Laws and Regulations Threats, Vulnerabilities, and Risk Management Business Continuity & Disaster Recovery Planning Critical Infrastructure Protection Digital Rights Management and Intellectual Property Protection Security Policies and Trust Management Identity Management Decidability and Complexity Economics of Security Fraud Management Cyber warfare and Physical Security Surveillance Systems Cyber Warfare Trends and Approaches Social engineering Authentication and Access Control Systems Biometrics Applications Electronic Passports, National ID and Smart Card Security Template Protection and Liveliness detection Biometrics standards and standardization New theories and algorithms in biometrics Papers submitted will be reviewed by a minimum of two reviewers. All the papers will be submitted to IEEE for potential inclusion to IEEE Explore which is abstracted/indexed in ISI Proceedings and Scopus. The published proceedings will be reviewed for possible inclusion within the INSPEC Database. In addition, the proceedings will be sent for indexing in EI Compendex. In addition, best selected papers will be published in one of the following special issues provided that the author do major improvements and extension within the time frame that will be set by the conference and his/her paper is approved by the chief editor: Journal of Information Ethics International Journal of Digital Information and Wireless Communications (IJDIWC) International Journal of Communication Networks and Information Security (IJCNIS) International Journal of Information and Computer Security (IJICS) International Journal of Security and Its Applications Submission Deadline Mar. 30, 2012 Notification of Acceptance Apr. 25, 2012 Camera Ready Submission May 10, 2012 Registration May 10, 2012 Conference Dates June 26-28, 2012 Papers Submission Researchers are encouraged to submit their work electronically.All Final Manuscript should be limited to a maximum length of 6 pages (Letter size, single space, Times Roman of font size 10, two columns format), including figures, tables and references. Papers should be submitted electronically as MS word or pdf format without author(s) name. All papers will be fully refereed by a minimum of two specialized referees. Before final acceptance, all referees comments must be considered. Accepted papers will be published in the conference proceedings. Accepted papers will be published in the conference proceedings. Best papers awards will be distributed during the conference. Submit your paper now If you have any problems with the above web submission form, you can send the manuscript by email to email@example.com (subject: CyberSec2012 Paper Submission). Please provide following information in your email: Names and complete address details of all authors (including email addresses), and Title of the submission.