<div dir="ltr"><p class="">Greetings!</p>

<p class="MsoNormal">You are invited to participate in The International
Conference on Computer Security and Digital Investigation (ComSec2014) that
will be held in Kuala Lumpur, Malaysia on March 18-20, 2014 as part of The
World Congress on Computing and Information Technology (WCIT2014). The event
will be held over three days, with presentations delivered by researchers from
the international community, including presentations from keynote speakers and
state-of-the-art lectures.</p>

<p class="">Please follow the link below for more information about the said
conference. </p>

<p class=""><a href="http://sdiwc.net/conferences/2014/comsec2014/">http://sdiwc.net/conferences/2014/comsec2014/</a></p>

<p class="">The
conference welcomes papers on the following (but not limited to) research
topics:</p>

<p class="MsoNormal"><b>Cyber Security</b></p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Distributed and Pervasive Systems Security         </p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Enterprise Systems Security</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Formal Methods Application in Security</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Hardware-Based security</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Incident Handling and Penetration Testing           </p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Legal Issues</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Multimedia and Document Security        </p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Operating Systems and Database Security</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Privacy issues    </p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>SCADA and Embedded systems security</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Secure Software Development, Architecture and
Outsourcing</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Security for Future Networks</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Security in Cloud Computing</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Security in Social Networks</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Security of Web-based Applications and Services</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Security protocols</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>VOIP, Wireless and Telecommunications Network
Security</p>

<p class="" style="margin-left:0.5in"> </p>

<p class="" style="margin-left:0.25in"><b>Information Assurance and Security Management</b></p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Anti-Forensics and Anti-Anti-Forensics Techniques</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Cyber-Crimes</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Data leakage, Data protection and Database
forensics</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Evidentiary Aspects of Digital Forensics</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Executable Content and Content Filtering            </p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>File System and Memory Analysis Multimedia
Forensic</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Forensics of Virtual and Cloud Environments</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Information Hiding</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Investigation of Insider Attacks </p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Large-Scale Investigations</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Malware forensics and Anti-Malware techniques</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Network Forensics and Traffic Analysis Hardware
Vulnerabilities and Device Forensics</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>New threats and Non-Traditional approaches     </p>

<p class="" style="margin-left:0.25in"><b>Cyber Peacefare and Physical Security</b></p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Authentication and Access Control Systems</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Biometrics Applications</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Biometrics standards and standardization</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Cyber Peacefare Trends and Approaches</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Electronic Passports, National ID and Smart Card
Security</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>New theories and algorithms in biometrics</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Social engineering           </p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Surveillance Systems</p>

<p class="" style="margin-left:0.5in"><span style="font-family:Calibri,sans-serif">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span></span>Template Protection and Liveliness detection</p>

<p class="" style="margin-left:0.5in">      </p>

<p class=""><span style="font-size:11pt;font-family:Calibri,sans-serif">All submitted papers </span><a href="http://sdiwc.net/conferences/2014/comsec2014/openconf/openconf.php">http://sdiwc.net/conferences/2014/comsec2014/openconf/openconf.php</a>
<span style="font-size:11pt;font-family:Calibri,sans-serif">will
be reviewed by a minimum of two reviewers. The published proceedings will be
indexed in ResearchBib, in addition, they will be reviewed for possible
inclusion within the INSPEC, EI, DBLP, Microsoft Academic Research,
ResearchGate, and Google Scholar Databases. BEST selected papers will be
published in one of the following special issues provided that the author do
major improvements and extension within the time frame that will be set by the
conference and his/her paper is approved by the chief editor:</span></p>

<p class=""><span style="font-size:11pt;font-family:Calibri,sans-serif"> </span></p>

<p class=""><span style="font-size:11pt;font-family:Calibri,sans-serif">Important Dates</span></p>

<p class=""><span style="font-size:11pt;font-family:Calibri,sans-serif">======================</span></p>

<p class="">Submission Deadline                      :
February 18, 2014</p>

<p class="">Notification of Acceptance          : February 25, 2014</p>

<p class="">Camera Ready Submission           :
March 8, 2014</p>

<p class="">Registration                                        :
March 8, 2014</p>

<p class="">Conference Dates                           :
March 18-20, 2014</p>

<p class="">=====================</p>

<p class=""><span style="font-size:11pt;font-family:Calibri,sans-serif">Thank you.</span></p>

<p class=""><br></p>

<p class=""><span style="font-size:11pt;font-family:Calibri,sans-serif"> </span></p>

<p class=""><span style="font-size:11pt;font-family:Calibri,sans-serif"> </span></p>

<p class=""><span style="font-size:11pt;font-family:Calibri,sans-serif">Sincerely yours,</span></p>

<p class=""><span style="font-size:11pt;font-family:Calibri,sans-serif">Grace </span></p>

<p class=""><a href="mailto:grace.sdiwc@gmail.com"><span style="font-size:11pt;font-family:Calibri,sans-serif">grace.sdiwc@gmail.com</span></a><span style="font-size:11pt;font-family:Calibri,sans-serif"></span></p>

<p class=""><a href="http://www.sdiwc.net/"><span style="font-size:11pt;font-family:Calibri,sans-serif">www.sdiwc.net</span></a><span style="font-size:11pt;font-family:Calibri,sans-serif"></span></p></div>