posted by user: slimrekhis || 5003 views || tracked by 12 users: [display]

ASIACCS SFCS 2014 : Second International Workshop on Security and Forensics in Communication Systems

FacebookTwitterLinkedInGoogle

Link: https://sites.google.com/site/sfcs14/
 
When Jun 3, 2014 - Jun 3, 2014
Where KYOTO, JAPAN
Submission Deadline Mar 10, 2014
Notification Due Mar 22, 2014
Final Version Due Apr 8, 2014
Categories    cyber security   digital forensics   communication systems   information security
 

Call For Papers

Second International Workshop on Security and Forensics in Communication Systems (AISACCS-SFCS 2014)

In conjunction with the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS), Kyoto, Japan, June 4-6, 2014

Digital attacks are continuing to increase at an alarming rate. They target a wide variety of protocols and communication systems ranging from servers and end-user machines to wireless and mobile networks and devices. The absence of supporting evidence and technically sound methods may prevent administrators from: proving the identity of the guilty party, identifying the root vulnerability to prevent a future occurrence of a similar incident, and understanding the attacker’s motivation for an efficient design of security solutions.

In this context, digital forensic engineering is emerging as a disciplined science in charge of developing novel scientific and theoretical methods, techniques, and approaches to collect, process, and analyze information retrieved from systems affected by security incidents to generate conclusive descriptions.

The SFCS 2014 Workshop will bring together researchers, scientists, engineers and practitioners involved in research in the fields of communication systems security and forensics, to present their latest research findings, ideas, and developments. The workshop will act as a forum for discussing open issues, and presenting original and unpublished research results and innovative ideas in the realm of security and digital forensics. We encourage contributions describing innovative work in the realm of security and digital forensics. Topics of interest include, but are not limited to:

- Formal and theoretical techniques of digital forensics
- Automated reasoning techniques of evidence analysis
- Evidentiary aspects of digital forensics
- Hypothetical reasoning in forensics and incident response
- Legal and security policy issues in digital forensics
- Development of investigation processes and security procedures
- Collaborative and distributed digital investigation
- Embedded and mobile devices forensics
- Evidence preservation, management, storage and reassembly
- Storage, memory, and file system forensics
- Anti-forensics and anti-anti forensics prevention detection and analysis
- Forensic and security techniques in wireless and mobile communication systems
- Incident response techniques in networks and communication systems
- Malware forensics techniques
- Techniques for tracking and trace-back of attacks in systems and networks
- Data hiding, extraction, and recovery techniques
- Steganography, watermarking, security, and forensic techniques in multimedia content processing
- Forensic and security aspects in e-services, e-government, e-learning, e-voting, and m-commerce applications
- Social networks security and forensics
- Lightweight forensic techniques
- Forensics in distributed, virtual, and cloud environment
- Forensics in digital healthcare systems and applications
- Large-scale investigations in large networks and Big Data
- Innovative forensics services
- Data visualization in forensic analysis

Submissions must be written in English, and must be at most 10 pages excluding the bibliography and well-marked appendices, and at most 12 pages overall. Committee members are not required to read appendices, so the paper should be intelligible without them. Submissions must be in double-column ACMSIG Proceedings format (http://www.acm.org/sigs/publications/proceedings-templates), both Option 1 and Option 2 on the page are fine) with page numbers. No changes to margins, spacing, or font sizes are allowed from those specified by the style file. We reserve the right to request the source files for a submission to verify compliance with this requirement. Only PDF files will be accepted.

All submissions must be anonymized. An author's name should occur only in references to that author's related work, which should be referenced in the third person and not overtly distinguishable from the referenced work of others. Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal, conference or workshop. Simultaneous submission of the same work is not allowed. Authors of accepted papers must guarantee that their papers will be presented at the workshop.

Accepted papers will be published by ACM Press as conference proceedings in USB thumb drives and in the ACM Digital Library.

Electronic submission site: https://www.easychair.org/conferences/?conf=asiaccssfcs2014

WORKSHOP CHAIRS
---------------------------------
- Noureddine Boudriga, University of Carthage, Tunisia
- Slim Rekhis, University of Carthage, Tunisia

PROGRAM COMMITTEE
-------------------------------------
Alec Yasinsac, University of South Alabama beginning, USA
Amr Youssef, Concordia University, Canada
Donghoon Lee, Korea University, Korea
Frederic Cuppens, Télécom Bretagne, France
Giampaolo Bella, Università di Catania, Italy
Gritzalis Stefanos, University of the Aegean, Greece
Honggang Wang, University Massachusetts Dartmouth, USA
Kim-Kwang Raymond Choo, University of South Australia, Australia
Kwangjo Kim, Korea Advanced Institute of Science and Technology, Korea
Lejla Batina, Radboud University Nijmegen, Netherlands
Luigi Logrippo, Université du Québec en Outaouais, Canada
Michael Meier, University of Bonn, Germany
Melek Önen, EURECOM, France
Mohamed Younis, University of Maryland Baltimore County, USA
Peter Mueller, IBM Zurich Research Laboratory, Switzerland
Sabrina De Capitani di Vimercati, Università degli Studi di Milano, Italy
Simson Garfinkel, Naval Postgraduate School in Monterey, USA
Stelvio Cimato, University of Milan, Italy
Sunshin An, Korea University, Korea
Takashi Nishide, Kyushu University, Japan
Walid Abdallah, Military Aviation School of Borj Elamri, Tunisia
Wei Wei, Xi’an University of Technology, China
Wojciech Mazurczyk, Warsaw University of Technology, Poland
Yacine Challal, Compiègne University of Technology, France
Yacine Djemaiel, Institute of Technology in Communications at Tunis, Tunisia
Yahya Slimani, University of Manouba, Tunisia

Related Resources

ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
FL-AsiaCCS 2025   International Workshop on Secure and Efficient Federated Learning In Conjunction with ACM AsiaCCS 2025
ICVIP--EI 2024   2024 The 8th International Conference on Video and Image Processing (ICVIP 2024)
ICTC 2025   2025 6th Information Communication Technologies Conference (ICTC 2025)--SCI
IJCIS 2024   International Journal on Cryptography and Information Security
ICICA 2025   2025 The 14th International Conference on Information Communication and Applications (ICICA 2025)
MATHCS 2024   2nd International Conference on Mathematics, Computer Science & Engineering
ICISS 2025   ACM--2025 The 8th International Conference on Information Science and Systems (ICISS 2025)
ISDFS 2025   13th International Symposium on Digital Forensics and Security