posted by user: wmazurczyk || 7178 views || tracked by 16 users: [display]

IWCC 2013 : International Workshop on Cyber Crime

FacebookTwitterLinkedInGoogle

Link: http://stegano.net/IWCC2013/
 
When May 24, 2013 - May 24, 2013
Where San Francisco, CA, USA
Submission Deadline Feb 15, 2013
Notification Due Mar 1, 2013
Final Version Due Apr 1, 2013
Categories    cyber security   cyber crime   network forensics   network security
 

Call For Papers

Call for papers:
International Workshop on Cyber Crime - IWCC 2013
========================================================================
Friday May 24, 2013
San Francisco, CA, USA
co-located with
The 34th IEEE Symposium on Security and Privacy (IEEE S&P 2013)
========================================================================
IWCC website: http://stegano.net/IWCC2013/
========================================================================
INTRODUCTION

Today's world's societies are becoming more and more dependent on open networks such as the Internet - where commercial activities, business transactions and government services are realized. This has led to the fast development of new cyber threats and numerous information security issues which are exploited by cyber criminals. The inability to provide trusted secure services in contemporary computer network technologies has a tremendous socio-economic impact on global enterprises as well as individuals.

Moreover, the frequently occurring international frauds impose the necessity to conduct the investigation of facts spanning across multiple international borders. Such examination is often subject to different jurisdictions and legal systems. A good illustration of the above being the Internet, which has made it easier to perpetrate traditional crimes. It has acted as an alternate avenue for the criminals to conduct their activities, and launch attacks with relative anonymity. The increased complexity of the communications and the networking infrastructure is making investigation of the crimes difficult. Traces of illegal digital activities are often buried in large volumes of data, which are hard to inspect with the aim of detecting offences and collecting evidence. Nowadays, the digital crime scene functions like any other network, with dedicated administrators functioning as the first responders.

This poses new challenges for law enforcement policies and forces the computer societies to utilize digital forensics to combat the increasing number of cybercrimes. Forensic professionals must be fully prepared in order to be able to provide court admissible evidence. To make these goals achievable, forensic techniques should keep pace with new technologies.

The aim of this workshop is to bring together the research accomplishments provided by the researchers from academia and the industry. The other goal is to show the latest research results in the field of digital forensics and to present the development of tools and techniques which assist the investigation process of potentially illegal cyber activity. We encourage prospective authors to submit related distinguished research papers on the subject of both: theoretical approaches and practical case reviews. The workshop will be accessible to both non-experts interested in learning
about this area and experts interesting in hearing about new research and approaches.

========================================================================
TOPICS OF INTERESTS

Topics of interests include, but are not limited to:
- Cyber crimes: evolution, new trends and detection
- Cyber crime related investigations
- Computer and network forensics
- Digital forensics tools and applications
- Digital forensics case studies and best practices
- Privacy issues in digital forensics
- Network traffic analysis, traceback and attribution
- Incident response, investigation and evidence handling
- Integrity of digital evidence and live investigations
- Identification, authentication and collection of digital evidence
- Anti-forensic techniques and methods
- Watermarking and intellectual property theft
- Social networking forensics
- Steganography/steganalysis and covert/subliminal channels
- Network anomalies detection
- Novel applications of information hiding in networks
- Political and business issues related to digital forensics and anti-forensic techniques

========================================================================
CHAIRS
Krzysztof Szczypiorski, Warsaw University of Technology, Poland
Wojciech Mazurczyk, Warsaw University of Technology, Poland
Yali Liu, AT&T Labs, USA
Hui Tian, National Huaqiao University, China

========================================================================
PUBLICATION ISSUES
Authors are invited to submit Regular Papers (maximum 8 pages) or Short
Papers (maximum 4 pages) via EasyChair. Papers accepted by the workshop
will be published in the Conference Proceedings published by IEEE Computer
Society Press.

The extended versions of high-quality papers selected from the workshop
will be published in a special issue of the JCR journals (to be announced).

========================================================================
DATES
February 15, 2013: Regular & Short Paper Submission
March 1, 2013: Notification Date
April 1, 2013: Camera-Ready & Registration

Related Resources

CYBER 2025   The Tenth International Conference on Cyber-Technologies and Cyber-Systems
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
BDACCIP 2025   The 7th International Workshop on Big Data Analytic for Cyber Crime Investigation and Prevention
IEEE CSR 2025   2025 IEEE International Conference on Cyber Security and Resilience
NTIJ 2024   Nanoscience and Technology: An International Journal
IWCC 2024   International Workshop on Cyber Crime (extended deadline!)
CMC 2025   11th International Conference on Control, Modeling and Computing
ICTC 2025   2025 6th Information Communication Technologies Conference (ICTC 2025)--SCI
ICCPS 2025   16th ACM/IEEE International Conference on Cyber-Physical Systems
ECCWS 2024   23rd European Conference on Cyber Warfare and Security