| |||||||||||||||
ASIACCS SFCS 2014 : Second International Workshop on Security and Forensics in Communication Systems | |||||||||||||||
Link: https://sites.google.com/site/sfcs14/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Second International Workshop on Security and Forensics in Communication Systems (AISACCS-SFCS 2014)
In conjunction with the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS), Kyoto, Japan, June 4-6, 2014 Digital attacks are continuing to increase at an alarming rate. They target a wide variety of protocols and communication systems ranging from servers and end-user machines to wireless and mobile networks and devices. The absence of supporting evidence and technically sound methods may prevent administrators from: proving the identity of the guilty party, identifying the root vulnerability to prevent a future occurrence of a similar incident, and understanding the attacker’s motivation for an efficient design of security solutions. In this context, digital forensic engineering is emerging as a disciplined science in charge of developing novel scientific and theoretical methods, techniques, and approaches to collect, process, and analyze information retrieved from systems affected by security incidents to generate conclusive descriptions. The SFCS 2014 Workshop will bring together researchers, scientists, engineers and practitioners involved in research in the fields of communication systems security and forensics, to present their latest research findings, ideas, and developments. The workshop will act as a forum for discussing open issues, and presenting original and unpublished research results and innovative ideas in the realm of security and digital forensics. We encourage contributions describing innovative work in the realm of security and digital forensics. Topics of interest include, but are not limited to: - Formal and theoretical techniques of digital forensics - Automated reasoning techniques of evidence analysis - Evidentiary aspects of digital forensics - Hypothetical reasoning in forensics and incident response - Legal and security policy issues in digital forensics - Development of investigation processes and security procedures - Collaborative and distributed digital investigation - Embedded and mobile devices forensics - Evidence preservation, management, storage and reassembly - Storage, memory, and file system forensics - Anti-forensics and anti-anti forensics prevention detection and analysis - Forensic and security techniques in wireless and mobile communication systems - Incident response techniques in networks and communication systems - Malware forensics techniques - Techniques for tracking and trace-back of attacks in systems and networks - Data hiding, extraction, and recovery techniques - Steganography, watermarking, security, and forensic techniques in multimedia content processing - Forensic and security aspects in e-services, e-government, e-learning, e-voting, and m-commerce applications - Social networks security and forensics - Lightweight forensic techniques - Forensics in distributed, virtual, and cloud environment - Forensics in digital healthcare systems and applications - Large-scale investigations in large networks and Big Data - Innovative forensics services - Data visualization in forensic analysis Submissions must be written in English, and must be at most 10 pages excluding the bibliography and well-marked appendices, and at most 12 pages overall. Committee members are not required to read appendices, so the paper should be intelligible without them. Submissions must be in double-column ACMSIG Proceedings format (http://www.acm.org/sigs/publications/proceedings-templates), both Option 1 and Option 2 on the page are fine) with page numbers. No changes to margins, spacing, or font sizes are allowed from those specified by the style file. We reserve the right to request the source files for a submission to verify compliance with this requirement. Only PDF files will be accepted. All submissions must be anonymized. An author's name should occur only in references to that author's related work, which should be referenced in the third person and not overtly distinguishable from the referenced work of others. Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal, conference or workshop. Simultaneous submission of the same work is not allowed. Authors of accepted papers must guarantee that their papers will be presented at the workshop. Accepted papers will be published by ACM Press as conference proceedings in USB thumb drives and in the ACM Digital Library. Electronic submission site: https://www.easychair.org/conferences/?conf=asiaccssfcs2014 WORKSHOP CHAIRS --------------------------------- - Noureddine Boudriga, University of Carthage, Tunisia - Slim Rekhis, University of Carthage, Tunisia PROGRAM COMMITTEE ------------------------------------- Alec Yasinsac, University of South Alabama beginning, USA Amr Youssef, Concordia University, Canada Donghoon Lee, Korea University, Korea Frederic Cuppens, Télécom Bretagne, France Giampaolo Bella, Università di Catania, Italy Gritzalis Stefanos, University of the Aegean, Greece Honggang Wang, University Massachusetts Dartmouth, USA Kim-Kwang Raymond Choo, University of South Australia, Australia Kwangjo Kim, Korea Advanced Institute of Science and Technology, Korea Lejla Batina, Radboud University Nijmegen, Netherlands Luigi Logrippo, Université du Québec en Outaouais, Canada Michael Meier, University of Bonn, Germany Melek Önen, EURECOM, France Mohamed Younis, University of Maryland Baltimore County, USA Peter Mueller, IBM Zurich Research Laboratory, Switzerland Sabrina De Capitani di Vimercati, Università degli Studi di Milano, Italy Simson Garfinkel, Naval Postgraduate School in Monterey, USA Stelvio Cimato, University of Milan, Italy Sunshin An, Korea University, Korea Takashi Nishide, Kyushu University, Japan Walid Abdallah, Military Aviation School of Borj Elamri, Tunisia Wei Wei, Xi’an University of Technology, China Wojciech Mazurczyk, Warsaw University of Technology, Poland Yacine Challal, Compiègne University of Technology, France Yacine Djemaiel, Institute of Technology in Communications at Tunis, Tunisia Yahya Slimani, University of Manouba, Tunisia |
|