[rtcweb] Extended Submission Deadline: InfoSec2014 - Malaysia!

jackie@sdiwc.info Fri, 26 September 2014 07:33 UTC

Return-Path: <jackie@sdiwc.info>
X-Original-To: rtcweb@ietfa.amsl.com
Delivered-To: rtcweb@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4DB501A1A6E for <rtcweb@ietfa.amsl.com>; Fri, 26 Sep 2014 00:33:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.245
X-Spam-Level: *
X-Spam-Status: No, score=1.245 tagged_above=-999 required=5 tests=[BAYES_50=0.8, DKIM_SIGNED=0.1, IP_NOT_FRIENDLY=0.334, SPF_PASS=-0.001, T_DKIM_INVALID=0.01, URIBL_DBL_ABUSE_REDIR=0.001, URIBL_DBL_REDIR=0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id T8v0dfMW0_o1 for <rtcweb@ietfa.amsl.com>; Fri, 26 Sep 2014 00:33:17 -0700 (PDT)
Received: from gproxy5-pub.mail.unifiedlayer.com (gproxy5-pub.mail.unifiedlayer.com [67.222.38.55]) by ietfa.amsl.com (Postfix) with SMTP id 1BA5A1A1A69 for <rtcweb@ietf.org>; Fri, 26 Sep 2014 00:33:16 -0700 (PDT)
Received: (qmail 16481 invoked by uid 0); 26 Sep 2014 07:33:13 -0000
Received: from unknown (HELO cmgw4) (10.0.90.85) by gproxy5.mail.unifiedlayer.com with SMTP; 26 Sep 2014 07:33:13 -0000
Received: from box817.bluehost.com ([66.147.244.117]) by cmgw4 with id vpZ81o00B2Yhrsa01pZBvz; Fri, 26 Sep 2014 07:33:12 -0600
X-Authority-Analysis: v=2.1 cv=fdw+lSgF c=1 sm=1 tr=0 a=1ZWhLoquM75l/9xp6o4QLQ==:117 a=1ZWhLoquM75l/9xp6o4QLQ==:17 a=cNaOj0WVAAAA:8 a=f5113yIGAAAA:8 a=2mhjNb98rjwA:10 a=tk9FW0VPuhgA:10 a=wPDyFdB5xvgA:10 a=IkcTkHD0fZMA:10 a=KWLd9SN1AAAA:8 a=6U2dO19vvw8A:10 a=JMHYQVG13d8A:10 a=89_GrzeAAAAA:20 a=lDtwsW-JAAAA:20 a=82axx_jr2P68B2ojiP8A:9 a=oa6F-fb578uBOtzN:21 a=T2t2ibo4C93-p9_2:21 a=QEXdDO2ut3YA:10 a=AjD6PNXNR6EA:10 a=CuBl9s-68JkA:10
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=sdiwc.info; s=default; h=Message-ID:Subject:To:From:Date:Content-Transfer-Encoding:Content-Type:MIME-Version; bh=QYZsXwYdub8t+kYrdDl9QDY1pnTGOvVBcpI79N/ELgM=; b=mavk6TSMTcStp5TATiqajGNcjo9N+j+xYDmIWIFF4dAIZjnJsjcfoVfHpojYa1BYCfIw+2xVfAZhKGjvNvmGA7sW/y5v759knz0x1pwE/DQVZ9FIc1TIL1KJX+OOkCor;
Received: from localhost ([127.0.0.1]:33625 helo=box817.bluehost.com) by box817.bluehost.com with esmtpa (Exim 4.82) (envelope-from <jackie@sdiwc.info>) id 1XXQ1d-0005qO-2k for rtcweb@ietf.org; Fri, 26 Sep 2014 01:33:09 -0600
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 7bit
Date: Fri, 26 Sep 2014 01:33:06 -0600
From: jackie@sdiwc.info
To: rtcweb@ietf.org
Message-ID: <46e4b5697a6e9d258da84bb077614294@sdiwc.info>
X-Sender: jackie@sdiwc.info
User-Agent: Roundcube Webmail/0.9.5
X-Identified-User: {1337:box817.bluehost.com:sdiwcnet:sdiwc.info} {sentby:smtp auth 127.0.0.1 authed with jackie@sdiwc.info}
Archived-At: http://mailarchive.ietf.org/arch/msg/rtcweb/c2B8AISK4H2EMD-_Z-hE1LZ_fMQ
Subject: [rtcweb] Extended Submission Deadline: InfoSec2014 - Malaysia!
X-BeenThere: rtcweb@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Real-Time Communication in WEB-browsers working group list <rtcweb.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/rtcweb/>
List-Post: <mailto:rtcweb@ietf.org>
List-Help: <mailto:rtcweb-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 26 Sep 2014 07:33:18 -0000

The International Conference on Information Security and Cyber Forensics 
(InfoSec2014)

Universiti Sultan Zainal Abidin (UniSZA), Kuala Terengganu, Malaysia
October 8-10, 2014
http://bit.ly/1ygCEdd

All registered papers will be included in the publisher's Digital 
Library
===============================================================

The conference aims to enable researchers build connections between 
different digital applications. The event will be held over three days, 
with presentations delivered by researchers from the international 
community, including presentations from keynote speakers and 
state-of-the-art lectures.

TOPICS ARE NOT LIMITED TO:

:: Cyber Security
:: Distributed and Pervasive Systems Security
:: Formal Methods Application in Security
:: Incident Handling and Penetration Testing
:: Multimedia and Document Security
:: Privacy issues
:: Secure Software Development, Architecture and Outsourcing
:: Security in Cloud Computing
:: Security of Web-based Applications and Services
:: VOIP, Wireless and Telecommunications Network Security
:: Enterprise Systems Security
:: Hardware-Based security
:: Legal Issues
:: Operating Systems and Database Security
:: SCADA and Embedded systems security
:: Security for Future Networks
:: Security in Social Networks
:: Security protocols
:: Digital Forensic
:: Anti-Forensics and Anti-Anti-Forensics Techniques
:: Data leakage, Data protection and Database forensics
:: Executable Content and Content Filtering
:: Forensics of Virtual and Cloud Environments
:: Investigation of Insider Attacks
:: Malware forensics and Anti-Malware techniques
:: New threats and Non-Traditional approaches
:: Cyber-Crimes
:: Evidentiary Aspects of Digital Forensics
:: File System and Memory Analysis Multimedia Forensic
:: Information Hiding
:: Large-Scale Investigations
:: Network Forensics and Traffic Analysis Hardware Vulnerabilities and 
Device Forensics
:: Information Assurance and Security Management
:: Business Continuity & Disaster Recovery Planning
:: Critical Infrastructure Protection
:: Digital Rights Management and Intellectual Property Protection
:: Fraud Management
:: Laws and Regulations
:: Threats, Vulnerabilities, and Risk Management
:: Corporate Governance
:: Decidability and Complexity
:: Economics of Security
:: Identity Management
:: Security Policies and Trust Management
:: Cyber Peacefare and Physical Security
:: Authentication and Access Control Systems
:: Biometrics standards and standardization
:: Electronic Passports, National ID and Smart Card Security
:: Social engineering
:: Template Protection and Liveliness detection
:: Biometrics Applications
:: Cyber Peacefare Trends and Approaches
:: New theories and algorithms in biometrics
:: Surveillance Systems

Researchers are encouraged to submit their work electronically. All 
papers will be fully refereed by a minimum of two specialized referees. 
Before final acceptance, all referees comments must be considered.

PAPER SUBMISSION URL: http://bit.ly/1rbysrc

IMPORTANT DATES
===============
Extended Submission Deadline	: September 30, 2014
Notification of Acceptance	: 2-4 weeks from the submission date
Camera Ready Submission		: October 2, 2014
Registration Deadline		: October 2, 2014
Conference Dates		: October 8-10, 2014