<div dir="ltr"><p class="">Greetings!</p>

<p class="">You are invited to participate in The International
Conference on Cyber-Crime Investigation and Digital Forensics
(CyberForensics2014) that will be held in Kuala Lumpur, Malaysia on November
17-19, 2014 as part of The <b>Third World
Congress on Computing and Information Technology (WCIT)</b>. The event will be
held over three days, with presentations delivered by researchers from the
international community, including presentations from keynote speakers and
state-of-the-art lectures.</p>

<p class="">Please follow the link below for more information about the said
conference. </p>

<p class=""><a href="http://sdiwc.net/conferences/2014/cyberforensics2014/">http://sdiwc.net/conferences/2014/cyberforensics2014/</a></p>

<p class=""> </p>

<p class="MsoNormal">The
conference welcomes papers on the following (but not limited to) research
topics:</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Business Applications of Digital Forensics</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Civil Litigation Support</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Cyber Crime Investigations</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Cyber Criminal Psychology and Profiling</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Cyber Culture &amp; Cyber Terrorism</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Digital Forensic Case Studies</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Digital Forensic Processes and Workflow Models</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Digital Forensics &amp; Law</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Digital Forensics Process &amp; Procedures  </p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Digital Forensics Standardization &amp;
Accreditation</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Digital Forensics Techniques and Tools   </p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>E-Discovery</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Embedded Device Forensics</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Hacking</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Incident Response</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Information Warfare &amp; Critical
Infrastructure Protection</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Legal, Ethical and Policy Issues Related to
Digital Forensics</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Malware &amp; Botnets</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Mobile / Handheld Device &amp; Multimedia
Forensics</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Money Laundering</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Network and Cloud Forensics</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Online Fraud</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Sexual Abuse of Children On Internet</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Software &amp; Media Piracy</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Theoretical Foundations of Digital Forensics        </p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         
</span>Theories, Techniques and Tools for Extracting,
Analyzing and Preserving Digital Evidence</p>

<p class="">--------------------------</p>

<p class="">Important Dates:</p>

<p class="">Submission Deadline             : Oct. 17, 2014</p>

<p class="">Notification of Acceptance : Nov. 3, 2014 or 4 weeks from
the submission date</p>

<p class="">Camera Ready Submission : Nov. 7, 2014</p>

<p class="">Registration Date                  : Nov. 10, 2014</p>

<p class="">Conference Dates                 : November 17-19,
2014Registration                  </p>

<p class="">--------------------------------</p>

<p class="">All registered papers will be included in SDIWC Digital
Library, and in the proceedings of the conference. </p>

<p class=""> The published
proceedings will be indexed in ResearchBib and will be reviewed for a possible
inclusion within the INSPEC, EI, DBLP, Microsoft Academic Research,
ResearchGate, and Google Scholar Databases. </p>

<p class="">In addition, BEST registered papers will be published in
one of the following special issues provided that the author do major
improvements and extension within the time frame that will be set by the
conference and his/her paper is approved by the chief editor:</p>

<p class="">Paper Submission: <a href="http://sdiwc.net/conferences/2014/cyberforensics2014/openconf/openconf.php">http://sdiwc.net/conferences/2014/cyberforensics2014/openconf/openconf.php</a></p>

<p class=""><span style="font-size:11pt;font-family:Calibri,sans-serif">Thank you.</span></p>

<p class=""><span style="font-size:11pt;font-family:Calibri,sans-serif"> </span></p>

<p class=""><span style="font-size:11pt;font-family:Calibri,sans-serif"> </span></p>

<p class=""><span style="font-size:11pt;font-family:Calibri,sans-serif">Sincerely yours,</span></p>

<p class=""><span style="font-size:11pt;font-family:Calibri,sans-serif">Grace </span></p>

<p class=""><a href="mailto:grace.sdiwc@gmail.com"><span style="font-size:11pt;font-family:Calibri,sans-serif">grace.sdiwc@gmail.com</span></a><span style="font-size:11pt;font-family:Calibri,sans-serif"></span></p>

<p class=""><a href="http://www.sdiwc.net/"><span style="font-size:11pt;font-family:Calibri,sans-serif">www.sdiwc.net</span></a><span style="font-size:11pt;font-family:Calibri,sans-serif"></span></p></div>