Secure Coding mailing list archives

Cfp: IEEE S&P Workshop on Cyber Crime 2014


From: wmazurczyk <wmazurczyk () tlen pl>
Date: Tue, 04 Feb 2014 11:14:16 +0100

Dear Collegues,
 Please consider submitting papers to IWCC (International Workshop on Cyber Crime) 2014 which is is part of the IEEE CS 
Security &amp; Privacy Workshops (SPW 2014), an event of the IEEE CS Technical Committee on Security and Privacy and 
like last year will be co-located with IEEE S&amp;P 2014 in  the Fairmont Hotel, San Jose, CA, USA, May 17-18, 2014.
 
CALL FOR PAPERS - deadline in 6 days!
 
Submission page: https://www.easychair.org/conferences/?conf=iwcc2014
 
The extended versions of high-quality papers selected from the workshop will be published in a special issue of the 
EURASIP Journal on Information Security, Springer (confirmed!)
 
IWCC 2014 is part of the IEEE CS Security &amp; Privacy Workshops (SPW 2014), an event of the IEEE CS Technical 
Committee on Security and Privacy. 
IWCC 2014 website: http://stegano.net/IWCC2014/
 
IMPORTANT DATES
 
February 10, 2014: Regular &amp; Short Paper Submission
 March 17, 2014: Notification Date
 April, 2014: Camera-Ready &amp; Early Registration Deadline
 
Today's world's societies are becoming more and more dependent on open networks such as the Internet - where commercial 
activities, business transactions and government services are realized. This has led to the fast development of new 
cyber threats and numerous information security issues which are exploited by cyber criminals. The inability to provide 
trusted secure services in contemporary computer network technologies has a tremendous socio-economic impact on global 
enterprises as well as individuals.
 
Moreover, the frequently occurring international frauds impose the necessity to conduct the investigation of facts 
spanning across multiple international borders. Such examination is often subject to different jurisdictions and legal 
systems. A good illustration of the above being the Internet, which has made it easier to perpetrate traditional 
crimes. It has acted as an alternate avenue for the criminals to conduct their activities, and launch attacks with 
relative anonymity. The increased complexity of the communications and the networking infrastructure is making 
investigation of the crimes difficult. Traces of illegal digital activities are often buried in large volumes of data, 
which are hard to inspect with the aim of detecting offences and collecting evidence. Nowadays, the digital crime scene 
functions like any other network, with dedicated administrators functioning as the first responders.
 
This poses new challenges for law enforcement policies and forces the computer societies to utilize digital forensics 
to combat the increasing number of cybercrimes. Forensic professionals must be fully prepared in order to be able to 
provide court admissible evidence. To make these goals achievable, forensic techniques should keep pace with new 
technologies.
 The aim of this workshop is to bring together the research accomplishments provided by the researchers from academia 
and the industry. The other goal is to show the latest research results in the field of digital forensics and to 
present the development of tools and techniques which assist the investigation process of potentially illegal cyber 
activity. We encourage prospective authors to submit related distinguished research papers on the subject of both: 
theoretical approaches and practical case reviews.
 
The workshop will be accessible to both non-experts interested in learning about this area and experts interesting in 
hearing about new research and approaches.
 
Topics of interest include, but are not limited to:
 
    • Cyber crimes: evolution, new trends and detection
     • Cyber crime related investigations
     • Computer and network forensics
     • Digital forensics tools and applications
     • Digital forensics case studies and best practices
     • Privacy issues in digital forensics
     • Network traffic analysis, traceback and attribution
     • Incident response, investigation and evidence handling
     • Integrity of digital evidence and live investigations
     • Identification, authentication and collection of digital evidence
     • Anti-forensic techniques and methods
     • Watermarking and intellectual property theft
     • Social networking forensics
     • Steganography/steganalysis and covert/subliminal channels
     • Network anomalies detection
     • Novel applications of information hiding in networks
     • Political and business issues related to digital forensics and anti-forensic techniques
 
SUBMISSIONS AND REGISTRATION
 
Authors are invited to submit Regular Papers (maximum 8 pages) or Short Papers (maximum 4 pages) via EasyChair. Papers 
accepted by the workshop will be published in the Conference Proceedings published by IEEE Computer Society Press.
 
Papers must be formatted for US letter (not A4) size paper with margins of at least 3/4 inch on all sides. The text 
must be formatted in a two-column layout, with columns no more than 9 in. high and 3.375 in. wide. The text must be in 
Times font, 10-point or larger, with 12-point or larger line spacing. Authors are encouraged to use the IEEE conference 
proceedings templates found here. Failure to adhere to the page limit and formatting requirements will be grounds for 
rejection.
 
The following is a URL link to the "Author's Final Paper Formatting and Submission Instructions" Webpage (Online Author 
Kit) for 2014 IEEE Security and Privacy Workshops (SPW 2014).
 
The extended versions of high-quality papers selected from the workshop will be published in a special issue of the 
EURASIP Journal on Information Security (tentative).
 
ORGANIZING COMMITTEE
 
Krzysztof Szczypiorski, Warsaw University of Technology, Poland
 Wojciech Mazurczyk, Warsaw University of Technology, Poland
 Amir Houmansadr, University of Texas at Austin, USA
 Hui Tian, National Huaqiao University, China
 
_______________________________________________
Secure Coding mailing list (SC-L) SC-L () securecoding org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
_______________________________________________

Current thread: