posted by organizer: ajanicki || 283 views || tracked by 2 users: [display]

IWCC 2025 : International Workshop on Cyber Crime

FacebookTwitterLinkedInGoogle

Link: https://2025.ares-conference.eu/program/iwcc/
 
When Aug 11, 2025 - Aug 14, 2025
Where Ghent, Belgium
Submission Deadline May 12, 2025
Notification Due May 30, 2025
Final Version Due Jun 13, 2025
Categories    computer science   cybersecurity   network security   cybercrime
 

Call For Papers

The societies of today’s world are becoming increasingly dependent on online services, where commercial activities, business transactions, government services, and biomedical diagnostics are realized. This tendency has been evident during the recent COVID-19 pandemic. These developments, along with the growing number of military conflicts worldwide (Ukraine, Israel, etc.), have led to the fast development of new cyber threats and numerous information security issues exploited by cybercriminals. The inability to provide trusted, secure services in contemporary computer network technologies has a tremendous socio-economic impact on global enterprises and individuals.

Moreover, the frequently occurring international frauds impose the necessity to conduct investigations spanning multiple domains and countries. Such examination is often subject to different jurisdictions and legal systems. A good illustration of the above is the Internet, which has made it easier to prepare and perpetrate traditional – but now cyber-enabled – crimes. It has acted as an alternate avenue for criminals to conduct their activities and launch attacks with relative anonymity, a high degree of deniability, and the opportunity to operate in a border-agnostic environment. Worrying developments in the abuse of artificial intelligence and machine learning technologies lead to the increased capabilities of malign actors who leverage these tools to design and propagate disinformation, which is especially dangerous (and effective) during emergencies and crises of all kinds. The developments in Generative Artificial Intelligence have also enabled the increase of criminal capabilities in the production, dissemination, and weaponization of high-quality, convincing fake contact (text, audio, images, and videos), which translates not only to the truth and trust decay among the affected societies but also to the enhanced capabilities in orchestrating the sophisticated cyber crimes.

Furthermore, nowadays, the majority of life-science-based techniques and resulting data hinge on information technologies. Despite their considerable advantages, dependence on cyber technologies also exposes vulnerabilities. Various threats in the digital realm could target biomedical systems, leading to adverse consequences. The field of CyberBioSecurity was established to assist bio-related sciences in comprehending potential cyber threats and formulating defense approaches, recovery protocols, and resilience strategies.

The increased complexity of communications and the networking infrastructure is making the investigation of these new types of crimes difficult. Traces of illegal digital activities are difficult to analyze due to large volumes of data. Nowadays, the digital crime scene functions like any other network, with dedicated administrators functioning as the first responders. This poses new challenges for law enforcement and intelligence communities and forces computer societies to utilize digital forensics to combat the increasing number of cyber crimes. Forensic professionals must be fully prepared to provide court-admissible evidence. Forensic techniques should keep pace with new technologies to make these goals achievable. Prevention, mitigation, and interdiction of new and emerging threats necessitate an increasingly thorough and multidisciplinary approach. They also require the collaboration of all relevant actors and stakeholders in designing the technology regulation and cyber governance measures.

The aim of this workshop is to bring together the research outcomes provided by researchers from academia and the industry. Another goal is to showcase the latest research findings across a wide range of topics, from digital forensics to cyberbiosecurity. We strongly encourage prospective authors to submit articles presenting both theoretical approaches and practical case reviews, including work-in-progress reports.


TOPICS OF INTEREST include, but are not limited to:
- Big Data analytics helping to track cyber crimes
- Protecting Big Data / AI models against cyber crimes
- Crime-as-a-service
- Criminal abuse of clouds and social networks
- Criminal to criminal (C2C) communications
- Criminal to victim (C2V) communications
- Criminal use of IoT, e.g., IoT-based botnets
- Cyberbiosecurity
- Cyber crime-related investigations
- Cyber crimes: evolution, new trends and detection
- Darknets and hidden services
- Fake (incl. deepfake) and disinformation detection
- Generative Artificial Intelligence and cyber crime
- AI-enabled crime and terrorism
- Mobile malware
- Network anomalies detection
- Network traffic analysis, traceback and attribution
- Incident response, investigation and evidence handling
- Internet governance
- Novel techniques in exploit kits
- Political and business issues related to digital forensics and anti-forensic techniques
- Anti-forensic techniques and methods
- Identification, authentication and collection of digital evidence
- Integrity of digital evidence and live investigations
- Privacy issues in digital forensics
- Ransomware: evolution, functioning, types, etc.
- Steganography/steganalysis and covert/subliminal channels
- Technology regulation
- Novel applications of information hiding in networks
- Watermarking and intellectual property theft
- Weaponization of information – cyber-enhanced disinformation campaigns


Workshop Chairs
Artur Janicki, Warsaw University of Technology, Poland
Kacper Gradoń, Warsaw University of Technology, Poland
Katarzyna Kamińska, Warsaw University of Technology, Poland

The workshop will be held in conjunction with the 20th International Conference on Availability, Reliability and Security (ARES 2025 – http://2025.ares-conference.eu).

Proceedings will be published by Springer in Lecture Notes in Computer Science (LCNS).

Related Resources

GreeNet Symposium - SGNC 2025   16th Symposium on Green Networking and Computing (SGNC 2025)
CYBER 2025   The Tenth International Conference on Cyber-Technologies and Cyber-Systems
Ei/Scopus-CCISS 2025   2025 2nd International Conference on Computing, Information Science and System (CCISS 2025)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
APWG eCrime 2025   APWG Symposium on Electronic Crime Research - November 4-7 - San Diego
IEEE CNCIT 2025   2025 4th International Conference on Networks, Communications and Information Technology (CNCIT 2025)
SPISCS 2025   2025 4th International Conference on Signal Processing, Information System and Cyber Security (SPISCS 2025)
Ei/Scopus-IPCML 2025   2025 International Conference on Image Processing, Communications and Machine Learning (IPCML 2025)
NCS 2025   17th International Conference on Network and Communications Security