Deadline Approaching: InfoSec2014 - Information Security and Cyber Forensics - Malaysia

classic Classic list List threaded Threaded
1 message Options
Reply | Threaded
Open this post in threaded view

Deadline Approaching: InfoSec2014 - Information Security and Cyber Forensics - Malaysia

The International Conference on Information Security and Cyber Forensics

Universiti Sultan Zainal Abidin (UniSZA), Kuala Terengganu, Malaysia
October 8-10, 2014 | [hidden email]

All registered papers will be included in the publisher's Digital

The conference aims to enable researchers build connections between
different digital applications. The event will be held over three days,
with presentations delivered by researchers from the international
community, including presentations from keynote speakers and
state-of-the-art lectures.


:: Cyber Security
:: Distributed and Pervasive Systems Security
:: Formal Methods Application in Security
:: Incident Handling and Penetration Testing
:: Multimedia and Document Security
:: Privacy issues
:: Secure Software Development, Architecture and Outsourcing
:: Security in Cloud Computing
:: Security of Web-based Applications and Services
:: VOIP, Wireless and Telecommunications Network Security
:: Enterprise Systems Security
:: Hardware-Based security
:: Legal Issues
:: Operating Systems and Database Security
:: SCADA and Embedded systems security
:: Security for Future Networks
:: Security in Social Networks
:: Security protocols
:: Digital Forensic
:: Anti-Forensics and Anti-Anti-Forensics Techniques
:: Data leakage, Data protection and Database forensics
:: Executable Content and Content Filtering
:: Forensics of Virtual and Cloud Environments
:: Investigation of Insider Attacks
:: Malware forensics and Anti-Malware techniques
:: New threats and Non-Traditional approaches
:: Cyber-Crimes
:: Evidentiary Aspects of Digital Forensics
:: File System and Memory Analysis Multimedia Forensic
:: Information Hiding
:: Large-Scale Investigations
:: Network Forensics and Traffic Analysis Hardware Vulnerabilities and
Device Forensics
:: Information Assurance and Security Management
:: Business Continuity & Disaster Recovery Planning
:: Critical Infrastructure Protection
:: Digital Rights Management and Intellectual Property Protection
:: Fraud Management
:: Laws and Regulations
:: Threats, Vulnerabilities, and Risk Management
:: Corporate Governance
:: Decidability and Complexity
:: Economics of Security
:: Identity Management
:: Security Policies and Trust Management
:: Cyber Peacefare and Physical Security
:: Authentication and Access Control Systems
:: Biometrics standards and standardization
:: Electronic Passports, National ID and Smart Card Security
:: Social engineering
:: Template Protection and Liveliness detection
:: Biometrics Applications
:: Cyber Peacefare Trends and Approaches
:: New theories and algorithms in biometrics
:: Surveillance Systems

Researchers are encouraged to submit their work electronically. All
papers will be fully refereed by a minimum of two specialized referees.
Before final acceptance, all referees comments must be considered.


Submission Deadline: September 26, 2014
Notification of Acceptance: 2-4 weeks from the submission date
Camera Ready Submission: October 2, 2014
Registration Deadline: October 2, 2014
Conference Dates: October 8-10, 2014

Jackie Blanco | [hidden email]
SDIWC Organization |

Securing Apache Web Server with thawte Digital Certificate
In this guide we examine the importance of Apache-SSL and who needs an SSL certificate.  We look at how SSL works, how it benefits your company and how your customers can tell if a site is secure. You will find out how to test, purchase, install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates.;4175;25;1371;0;5;946;e13b6be442f727d1