<p class="MsoNormal" style="MARGIN: 0cm 0cm 10pt"><font face="Calibri" size="3">Our apologies for cross posting</font></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 10pt"><font face="Calibri" size="3">NFSP-2012 Call for Papers</font></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 10pt; TEXT-ALIGN: justify"><font face="Calibri" size="3">Cyber space has become an integrated part of human society. At the same time, has also been providing convenient platforms for crimes, such as financial fraud, information phishing, distributed denial of service attacks, and fake message propagation. Especially, the emergence of social networks has introduced significant security and privacy issues to the public. It is a great and new challenge of fighting against criminals in the cyber space. This field involved various disciplines, such as networking, information theory, mathematical modelling, data mining, machine learning, image and voice processing, neural network, pattern recognition, cryptography and forensic criminology. </font></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 10pt; TEXT-ALIGN: justify"><font face="Calibri" size="3">NFSP-2012 will be held at Macau, China, injunction with ICDCS 2012, which is a top conferences in computer science.</font></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 10pt; mso-line-height-alt: 1.0pt"><font face="Calibri" size="3">Topics of interest include, but not limited to:</font></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 10pt; mso-line-height-alt: 1.0pt"><font face="Calibri" size="3"><span style="mso-tab-count: 1"> </span>Anonymous system and forensics </font></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 10pt; mso-line-height-alt: 1.0pt"><font face="Calibri" size="3"><span style="mso-tab-count: 1"> </span>IP traceback </font></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 10pt; mso-line-height-alt: 1.0pt"><font face="Calibri" size="3"><span style="mso-tab-count: 1"> </span>Malware detection </font></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 10pt; mso-line-height-alt: 1.0pt"><font face="Calibri" size="3"><span style="mso-tab-count: 1"> </span>Botnet identification</font></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 10pt; mso-line-height-alt: 1.0pt"><font face="Calibri" size="3"><span style="mso-tab-count: 1"> </span>Networked video system </font></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 10pt; mso-line-height-alt: 1.0pt"><font face="Calibri" size="3"><span style="mso-tab-count: 1"> </span>Biometric security and forensics </font></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 10pt; mso-line-height-alt: 1.0pt"><font face="Calibri" size="3"><span style="mso-tab-count: 1"> </span>Emotion identification via video</font></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 10pt; mso-line-height-alt: 1.0pt"><font face="Calibri" size="3"><span style="mso-tab-count: 1"> </span>Wireless forensics, security and privacy</font></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 10pt; mso-line-height-alt: 1.0pt"><font face="Calibri" size="3"><span style="mso-tab-count: 1"> </span>Game theory in forensics, security and privacy</font></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 10pt; mso-line-height-alt: 1.0pt"><font size="3"><font face="Calibri"><span style="mso-tab-count: 1"> </span>Data Mining in forensics, security and privacy<span style="mso-tab-count: 1"> </span></font></font></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 10pt; mso-line-height-alt: 1.0pt"><font face="Calibri" size="3"><span style="mso-tab-count: 1"> </span>DDoS attacks</font></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 10pt; mso-line-height-alt: 1.0pt"><font face="Calibri" size="3"><span style="mso-tab-count: 1"> </span>Virus source traceback</font></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 10pt; mso-line-height-alt: 1.0pt"><font face="Calibri" size="3"><span style="mso-tab-count: 1"> </span>Malware source traceback</font></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 10pt; mso-line-height-alt: 1.0pt"><font face="Calibri" size="3"><span style="mso-tab-count: 1"> </span>Botmaster traceback</font></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 10pt; mso-line-height-alt: 1.0pt"><font face="Calibri" size="3"><span style="mso-tab-count: 1"> </span>Distributed systems and forensics</font></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 10pt; mso-line-height-alt: 1.0pt"><font face="Calibri" size="3"><span style="mso-tab-count: 1"> </span>System security and forensics</font></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 10pt; mso-line-height-alt: 1.0pt"><font face="Calibri" size="3"><span style="mso-tab-count: 1"> </span>Intrusion detection</font></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 10pt; mso-line-height-alt: 1.0pt"><font face="Calibri" size="3"><span style="mso-tab-count: 1"> </span>Social networks forensics, security and privacy</font></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 10pt; mso-line-height-alt: 1.0pt"><font face="Calibri" size="3"><span style="mso-tab-count: 1"> </span>Information theory in network security</font></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 10pt; mso-line-height-alt: 1.0pt"><font face="Calibri" size="3"><span style="mso-tab-count: 1"> </span>Multimedia in network security</font></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 10pt"><font face="Calibri" size="3"> </font></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 10pt"><font face="Calibri" size="3">Submission Guidelines</font></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 10pt; TEXT-ALIGN: justify"><font face="Calibri" size="3">To submit your paper, please go to </font><a href="http://www.deakin.edu.au/~syu/nfsp/"><font face="Calibri" color="#800080" size="3">http://www.deakin.edu.au/~syu/nfsp/</font></a><font face="Calibri" size="3"> and follow the link Submit your papers. Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings.<span style="mso-spacerun: yes"> </span>All paper submissions should follow the IEEE 8.5" x 11" Two-Column Format. Long Paper submission can have 10 pages plus up to 2 over-length pages. If the paper is accepted for publication, an over-length fee will be charged to each of the over-length pages, at $200 per page in the final camera-ready version. Short Papers, on the other hand, are allowed to be up to 5 pages. Papers will be selected based on their originality, significance, relevance, and clarity of presentation assessed by at least three reviewers. Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the conference to present the work. </font></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 10pt"><font face="Calibri" size="3"> </font></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 10pt"><font face="Calibri" size="3">Important Dates</font></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 10pt"><font size="3"><font face="Calibri">Submission Deadline: <span style="mso-spacerun: yes"> </span><span style="mso-spacerun: yes"> </span>January 8, 2012<span style="mso-spacerun: yes"> </span></font></font></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 10pt"><font face="Calibri" size="3">Authors Notification:<span style="mso-spacerun: yes"> </span><span style="mso-spacerun: yes"> </span><span style="mso-spacerun: yes"> </span>February 19, 2012</font></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 10pt"><font face="Calibri" size="3">Final Manuscript Due: <span style="mso-spacerun: yes"> </span>March 11, 2012</font></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 10pt"><font face="Calibri" size="3"> </font></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 10pt"><font face="Calibri" size="3">General Chairs</font></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 10pt"><font face="Calibri" size="3">Sherman Shen, University of Waterloo, Canada</font></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 10pt"><font face="Calibri" size="3">Athanasios Vasilakos,<span style="mso-spacerun: yes"> </span>National Technical University of Athens, Greece </font></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 10pt"><font face="Calibri" size="3">Yang Xiao, University of Alabama, USA</font></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 10pt"><font face="Calibri" size="3"> </font></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 10pt"><font face="Calibri" size="3">Program Chairs</font></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 10pt"><font face="Calibri" size="3">Shui Yu, Deakin University, Australia</font></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 10pt"><font face="Calibri" size="3">Xinwen Fu, University Massachusetts Lowell, USA.</font></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 10pt"><font face="Calibri" size="3"> </font></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 10pt"><font face="Calibri" size="3">Program Committees</font></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 10pt"><font face="Calibri" size="3">Please see NFSP-2012 website, <a href="http://www.deakin.edu.au/~syu/nfsp/">http://www.deakin.edu.au/~syu/nfsp/</a></font></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 10pt"><font face="Calibri" size="3"> </font></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 10pt"><font face="Calibri" size="3">Website and Contact Information</font></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 10pt"><font face="Calibri" size="3">Please see NFSP-2012 website at, <a href="http://www.deakin.edu.au/~syu/nfsp/">http://www.deakin.edu.au/~syu/nfsp/</a></font></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 10pt"><font face="Calibri" size="3">Further questions, please send email to: <a href="mailto:nfsp2012@gmail.com">nfsp2012@gmail.com</a></font></p><br clear="all"><br>-- <br>
<p style="MARGIN: 0cm 0cm 0pt"><span><span><font face="Calibri" size="3"></font></span></span></p>
<p style="MARGIN: 0cm 0cm 0pt"><span><span><font size="3"><font face="Calibri"></font></font></span></span></p>
<p style="MARGIN: 0cm 0cm 0pt"><span><span><font size="3"><font face="Calibri">-----------------------------</font></font></span></span></p>
<p style="MARGIN: 0cm 0cm 0pt"><span><span><font size="3"><font face="Calibri">Shui YU, PhD, Lecturer</font></font></span></span></p>
<p style="MARGIN: 0cm 0cm 0pt"><span><span><font size="3"><font face="Calibri">School of Information Technology, Deakin University, </font></font></span></span></p>
<p style="MARGIN: 0cm 0cm 0pt"><span><span><font size="3"><font face="Calibri">221 Burwood Highway, Burwood, VIC 3125,<span> </span>Australia.</font></font></span></span></p>
<p style="MARGIN: 0cm 0cm 0pt"><span><span><font size="3"><font face="Calibri">Telephone:0061 3 9251 7744</font></font></span></span></p>
<p style="MARGIN: 0cm 0cm 0pt"><span><span><font size="3"><font face="Calibri"><a href="http://www.deakin.edu.au/~syu" target="_blank">http://www.deakin.edu.au/~syu</a></font></font></span></span></p><br>