posted by user: slimrekhis || 6954 views || tracked by 10 users: [display]

SFCS 2012 : First IEEE International Workshop on Security and Forensics in Communication Systems

FacebookTwitterLinkedInGoogle

Link: http://sites.google.com/site/sfcs2012/
 
When Jun 15, 2012 - Jun 15, 2012
Where Ottawa, Canada
Submission Deadline Jan 7, 2012
Notification Due Feb 9, 2012
Final Version Due Feb 29, 2012
Categories    digital forensic   communication networks   information security
 

Call For Papers

First IEEE International Workshop on Security and Forensics in Communication Systems (SFCS 2012)

In conjunction with IEEE ICC 2012, Ottawa, Canada 10-15 June 2012

Digital attacks are continuing to increase at an alarming rate. They target a wide variety of protocols and communication systems ranging from servers and end-user machines to wireless and mobile networks and devices. The absence of supporting evidence and technically sound methods may prevent administrators from: proving the identity of the guilty party, identifying the root vulnerability to prevent a future occurrence of a similar incident, and understanding the attacker’s motivation for an efficient design of security solutions. In this context, digital forensic engineering is emerging as a disciplined science in charge of developing novel scientific and theoretical methods, techniques, and approaches to collect, process, and analyze information retrieved from systems affected by security incidents and generate conclusive descriptions.

The SFCS 2012 Workshop will bring together researchers, scientists, engineers and practitioners involved in research in the fields of communication systems security and forensics, to present their latest research findings, ideas, and developments.

Topics of interest include, but are not limited to:
- Formal aspects of network security
- Theoretical techniques of digital forensics
- Embedded and handled devices forensic
- Evidence preservation, management, storage, reassembly, and analysis
- Anti-forensics prevention detection and analysis
- Development of Investigation processes and procedures
- Automated analysis of evidence
- Forensics in multimedia and communication protocols
- Security and Investigation techniques in wireless and mobile communication systems
- Risk analysis and management in communication systems
- Social networks security and forensics
- Collaborative and distributed digital investigation
- Hypothetical reasoning in forensics and incident response
- Legal and policy issues in digital forensics
- Intrusion Detection, incident response, and evidence handling
- Vulnerability analysis and assessment, and analysis of malware
- Cryptography and forensics techniques in multimedia communication
- Data hiding, extraction, and recovery techniques
- Techniques for Tracking and traceback of attacks in systems and networks
- Availability, privacy, authentication, and anonymity
- Secure e-services, e-government, e-learning, e-voting, and m-commerce applications
- File systems memory analysis
- Infrastructure protection, and Virtual Private Networks security
- Storage system protection and forensics
- Physical and Biometric security

Authors are invited to submit papers representing original work, which must not be published previously or under consideration for publication elsewhere. All submissions should be written in English with a maximum paper length of five (5) printed pages (IEEE style), but one additional page is allowed with additional publication fee. All papers will be peer reviewed by TPC members and other experts in the field of security and digital forensics. A detailed description of papers submission procedure is available in the ICC 2012 web site. Papers submission is handled via EDAS.

WORKSHOP CHAIRS
---------------------------------
- Noureddine Boudriga, University of Carthage, Tunisia
- Slim Rekhis, University of Carthage, Tunisia

PROGRAM COMMITTEE
-------------------------------------
- Alec Yasinsac, University of South Alabama beginning, USA
- Amr Youssef, Concordia University, Canada
- Carlisle Adams, University of Ottawa
- Emmanuelle Anceaume, CNRS, France
- Giampaolo Bella, Università di Catania, Italy
- Gritzalis Stefanos, University of the Aegean, Greece
- Habtamu Abie, Norwegian Computing Center, Norway
- Helge Janicke, De Montfort University, England
- Krzysztof Szczypiorski, Warsaw University of Technology, Poland
- Kwangjo Kim, Korea Advanced Institute of Science and Technology, Korea
- Lejla Batina, Radboud University Nijmegen, Netherlands
- Luigi Logrippo, Université du Québec en Outaouais, Canada
- Marcus Rogers, Purdue University, USA
- Melek Önen, EURECOM, France
- Michael Losavio, University of Louisville, USA
- Mohamed Hamdi, University of Carthage, Tunisia
- Mourad Debbabi, Concordia University, Canada
- Narjes Robbana, University of Carthage, Tunisia
- Nasir Memon, Polytechnic Institute of NYU, USA
- Pavel Gladyshev, University College Dublin, Ireland
- Peter Mueller, IBM Zurich Research Laboratory, Switzerland
- Reijo Savola, VTT Technical Research Centre of Finland, Finland
- Riadh Robbana, University of Carthage, Tunisia
- Robert Erbacher, U.S. Army Research Laboratory, USA
- Sabrina De Capitani di Vimercati, Università degli Studi di Milano, Italy
- Simson Garfinkel, Naval Postgraduate School in Monterey, USA
- Stelvio Cimato, University of Milan, Italy
- Tahar Kechadi, University College Dublin, Ireland
- Vassil Roussev, University of New Orleans, USA
- Wojciech Mazurczyk, Warsaw University of Technology, Poland
- Yan Zhang, Simula Research Laboratory, Norway
- Yassine Lakhnech, University Joseph Fourier, France

Related Resources

CYBER 2025   The Tenth International Conference on Cyber-Technologies and Cyber-Systems
IJCIS 2024   International Journal on Cryptography and Information Security
IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
SECRYPT 2025   22nd International Conference on Security and Cryptography
ACM ICIIT 2025   ACM--2025 10th International Conference on Intelligent Information Technology (ICIIT 2025)--ESCI
IEEE SMC 2025   2025 IEEE International Conference on Systems, Man, and Cybernetics
JITST 2024   Journal of Internet Technology and Secured Transactions
EMERGING 2025   The Seventeenth International Conference on Emerging Networks and Systems Intelligence
ICISSP 2025   11th International Conference on Information Systems Security and Privacy