(0 Item)

The Third International Conference on Digital Security and Forensics (DigitalSec2016)

Academic Conferences - The Third International Conference on Digital Security and Forensics (DigitalSec2016)

Academic Conferences

Begin date : 9/6/2016

End date : 9/8/2016

Location : Malaysia / Kuala Lumpur


Venue : Asia Pacific University of Technology and Innovation (APU)

Event Subject :

The Third International Conference on Digital Security and Forensics (DigitalSec2016) will be held at Asia Pacific University of Technology and Innovation (APU) Kuala Lumpur, Malaysia on September 06-08, 2016, which aims to enable researchers build connections between different digital applications.

Industries : Internet Security -
Keywords :
DigitalSec2016, Malaysia, conferences, security, forensics, technology developments, software, wireless communication, education, social networks, fraud management, e-learning, e-technology, digital communications, cloud computing, channel modelling, multimedia, biometrics
Event/Product information

The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures.

The conference welcomes papers on the following (but not limited to) research topics:


·         Distributed and Pervasive Systems Security        

·         Enterprise Systems Security

·         Formal Methods Application in Security

·         Hardware-Based security

·         Incident Handling and Penetration Testing          

·         Legal Issues

·         Multimedia and Document Security       

·         Operating Systems and Database Security

·         Privacy issues   

·         Secure Software Development, Architecture and Outsourcing

·         Security for Future Networks    

·         Security in Cloud Computing

·         Security in Social Networks         

·         Security of Web-based Applications and Services

·         Security protocols           

·         VOIP, Wireless and Telecommunications Network Security

·         SCADA and Embedded systems security              

·         Anti-cyberterrorism

·         Anti-Forensics and Anti-Anti-Forensics Techniques         

·         Cyber-Crimes

·         Data leakage, Data protection and Database forensics   

·         Evidentiary Aspects of Digital Forensics

·         Executable Content and Content Filtering           

·         File System and Memory Analysis Multimedia Forensic

·         Forensics of Virtual and Cloud Environments      

·         Information Hiding

·         Investigation of Insider Attacks

·         Large-Scale Investigations

·         Malware forensics and Anti-Malware techniques            

·         New threats and Non-Traditional approaches

·         Network Forensics and Traffic Analysis 

·         Hardware Vulnerabilities and Device Forensics

·         Computer Forensics      

·         Business Continuity & Disaster Recovery Planning

·         Corporate Governance

·         Critical Infrastructure Protection

·         Decidability and Complexity       

·         Digital Rights Management and Intellectual Property Protection

·         Economics of Security   

·         Fraud Management

·         Identity Management  

·         Laws and Regulations

·         Security Policies and Trust Management              

·         Threats, Vulnerabilities, and Risk Management

·         Computer Crime Prevention and Detection        

·         Authentication and Access Control Systems

·         Biometrics Applications

·         Biometrics standards and standardization

·         Cyber Peacefare Trends and Approaches            

·         Electronic Passports, National ID and Smart Card Security

·         New theories and algorithms in biometrics         

·         Social engineering

·         Surveillance Systems     

·         Template Protection and Liveliness detection

·         Computer Security         

·         Confidentiality Protection

·         Cryptography and Data Protection          

·         Forensics, Recognition Technologies and Applications

·         Network Security            

·         Security; Authentication and Cryptography for Wireless Networks

---------------------------------------------------------------------------------------------------- -------------


Important Dates:


Submission Deadline                 :  Open from now until August 6, 2016

Notification of Acceptance          :  August 20, 2016 or 4 weeks from the submission date

Camera Ready Submission         : Open from now until August 26, 2016

Registration Date                       :  August 26, 2016

Conference Dates                       :  September 06-08, 2016

---------------------------------------------------------------------------------------------------- -----------------

All registered papers will be included in SDIWC Digital Library, and in the proceedings of the conference.



Paper Submission: http://sdiwc.net/conference s/digitalsec2016/openconf/openconf.php

Registration: http://sdiwc.net/conferences/digita lsec2016/registration/

Web site :

About the organizer

Organizer : SDIWC

similar conferences and training available

View all >
The 6th International Conference on e-Government

The proceedings present the latest research and ideas on e-Government. The subjects covered by the papers illustrated the wide range of topics that fall into this important and growing area of research such as the Impact of ICT Literacy and Organizational e-Readiness.

By : Academic Conferences Limited
Product Type : Academic Proceedings