<div dir="ltr"><p class="">Greetings!</p>

<p class=""> You are invited to participate in The International
Conference on Computer Security and Digital Investigation (ComSec2014) that
will be held in Kuala Lumpur, Malaysia on March 18-20, 2014 as part of The
World Congress on Computing and Information Technology (WCIT2014). The event
will be held over three days, with presentations delivered by researchers from
the international community, including presentations from keynote speakers and
state-of-the-art lectures.</p>

<p class="">Please follow the link below for more information about the said
conference. </p>

<p class=""> <a href="http://sdiwc.net/conferences/2014/comsec2014/">http://sdiwc.net/conferences/2014/comsec2014/</a></p>

<p class=""> The
conference welcomes papers on the following (but not limited to) research
topics:</p><p class=""></p>

<p class=""> <b>Cyber Security</b></p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:'Times New Roman'">         
</span>Distributed and Pervasive Systems Security         </p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:'Times New Roman'">         
</span>Enterprise Systems Security</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:'Times New Roman'">         
</span>Formal Methods Application in Security</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:'Times New Roman'">         
</span>Hardware-Based security</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:'Times New Roman'">         
</span>Incident Handling and Penetration Testing           </p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:'Times New Roman'">         
</span>Legal Issues</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:'Times New Roman'">         
</span>Multimedia and Document Security        </p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:'Times New Roman'">         
</span>Operating Systems and Database Security</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:'Times New Roman'">         
</span>Privacy issues    </p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:'Times New Roman'">         
</span>SCADA and Embedded systems security</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:'Times New Roman'">         
</span>Secure Software Development, Architecture and
Outsourcing</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:'Times New Roman'">         
</span>Security for Future Networks</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:'Times New Roman'">         
</span>Security in Cloud Computing</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:'Times New Roman'">         
</span>Security in Social Networks</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:'Times New Roman'">         
</span>Security of Web-based Applications and Services</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:'Times New Roman'">         
</span>Security protocols</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:'Times New Roman'">         
</span>VOIP, Wireless and Telecommunications Network
Security</p><p class="" style="margin-left:0.5in"><b>Information Assurance and Security Management</b></p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:'Times New Roman'">         
</span>Anti-Forensics and Anti-Anti-Forensics
Techniques</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:'Times New Roman'">         
</span>Cyber-Crimes</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:'Times New Roman'">         
</span>Data leakage, Data protection and Database
forensics</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:'Times New Roman'">         
</span>Evidentiary Aspects of Digital Forensics</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:'Times New Roman'">         
</span>Executable Content and Content Filtering            </p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:'Times New Roman'">         
</span>File System and Memory Analysis Multimedia
Forensic</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:'Times New Roman'">         
</span>Forensics of Virtual and Cloud Environments</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:'Times New Roman'">         
</span>Information Hiding</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:'Times New Roman'">         
</span>Investigation of Insider Attacks </p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:'Times New Roman'">         
</span>Large-Scale Investigations</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:'Times New Roman'">         
</span>Malware forensics and Anti-Malware techniques</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:'Times New Roman'">         
</span>Network Forensics and Traffic Analysis Hardware
Vulnerabilities and Device Forensics</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:'Times New Roman'">         
</span>New threats and Non-Traditional approaches    </p><p class="" style="margin-left:0.5in"><span style> </span><b style>Cyber Peacefare and Physical Security</b></p>

<p class="" style="margin-left:0.25in"><span style>-</span><span style="font-size:7pt;font-family:'Times New Roman'">         
</span><span style>Authentication and Access Control Systems</span><br></p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:'Times New Roman'">         
</span>Biometrics Applications</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:'Times New Roman'">         
</span>Biometrics standards and standardization</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:'Times New Roman'">         
</span>Cyber Peacefare Trends and Approaches</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:'Times New Roman'">         
</span>Electronic Passports, National ID and Smart Card
Security</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:'Times New Roman'">         
</span>New theories and algorithms in biometrics</p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:'Times New Roman'">         
</span>Social engineering           </p>

<p class="" style="margin-left:0.5in">-<span style="font-size:7pt;font-family:'Times New Roman'">         
</span>Surveillance Systems</p>

<p class="" style="margin-left:0.5in"><span style="font-family:Calibri,sans-serif">-<span style="font-size:7pt;font-family:'Times New Roman'">         
</span></span>Template Protection and Liveliness detection    </p>

<p class=""><span style="font-size:11pt;font-family:Calibri,sans-serif"> </span><span style="font-family:Calibri,sans-serif;font-size:11pt">Important Dates</span></p>

<p class=""><span style="font-size:11pt;font-family:Calibri,sans-serif">==============</span></p>

<p class="">Submission Deadline                      :
February 18, 2014</p>

<p class="">Notification of Acceptance          : February 25, 2014</p>

<p class="">Camera Ready Submission           :
March 8, 2014</p>

<p class="">Registration                                        :
March 8, 2014</p>

<p class="">Conference Dates                           :
March 18-20, 2014</p>

<p class="">===============</p>

<p class=""><span style="font-size:11pt;font-family:Calibri,sans-serif">Thank you.</span></p>

<p class=""><span style="font-size:11pt;font-family:Calibri,sans-serif"> </span><span style="font-family:Calibri,sans-serif;font-size:11pt"> </span></p>

<p class=""><span style="font-size:11pt;font-family:Calibri,sans-serif">Sincerely,</span></p>

<p class=""><span style="font-size:11pt;font-family:Calibri,sans-serif">Grace </span></p>

<p class=""><span style="font-size:11pt;font-family:Calibri,sans-serif"><a href="mailto:grace.sdiwc@gmail.com">grace.sdiwc@gmail.com</a></span></p>

<p class=""><span style="font-size:11pt;font-family:Calibri,sans-serif"> </span></p>

<p class=""><span style="font-size:11pt;font-family:Calibri,sans-serif"> </span></p></div>