posted by user: wmazurczyk || 2320 views || tracked by 7 users: [display]

IWCC 2012 : First International Workshop on Cyber Crime

FacebookTwitterLinkedInGoogle

Link: http://stegano.net/iwcc/
 
When Oct 3, 2012 - Oct 5, 2012
Where St. Petersburg, Russia
Submission Deadline May 31, 2012
Notification Due Jul 15, 2012
Final Version Due Jul 30, 2012
Categories    network security   stegannography   digital forensics   cyber crime
 

Call For Papers

First International Workshop on Cyber Crime - IWCC 2012
October 3-5, 2012
St. Petersburg, Russia
co-located with
International Congress on Ultra Modern Telecommunications and Control Systems (ICUMT 2012)

IWCC website: http://stegano.net/iwcc

Call for papers
The proposed workshop is intended to be a follow-up of:
- International Workshop on Network Steganography (IWNS) (held in 2009, 2010 and 2011)
- International Workshop on Digital Forensics (IWDF) (held in 2011)

Today's world's societies are becoming more and more dependent on open networks such as the Internet - where commercial activities, business transactions and government services are realized. This has led to the fast development of new cyber threats and numerous information security issues which are exploited by cyber criminals. The inability to provide trusted secure services in contemporary computer network technologies has a tremendous socio-economic impact on global enterprises as well as individuals.

Moreover, the frequently occurring international frauds impose the necessity to conduct the investigation of facts spanning across multiple international borders. Such examination is often subject to different jurisdictions and legal systems. A good illustration of the above being the Internet, which has made it easier to perpetrate traditional crimes. It has acted as an alternate avenue for the criminals to conduct their activities, and launch attacks with relative anonymity. The increased complexity of the communications and the networking infrastructure is making investigation of the crimes difficult. Traces of illegal digital activities are often buried in large volumes of data, which are hard to inspect with the aim of detecting offences and collecting evidence. Nowadays, the digital crime scene functions like any other network, with dedicated administrators functioning as the first responders.

This poses new challenges for law enforcement policies and forces the computer societies to utilize digital forensics to combat the increasing number of cybercrimes. Forensic professionals must be fully prepared in order to be able to provide court admissible evidence. To make these goals achievable, forensic techniques should keep pace with new technologies.

The aim of this workshop is to bring together the research accomplishments provided by the researchers from academia and the industry. The other goal is to show the latest research results in the field of digital forensics and to present the development of tools and techniques which assist the investigation process of potentially illegal cyber activity. We encourage prospective authors to submit related distinguished research papers on the subject of both: theoretical approaches and practical case reviews.

The workshop is an interesting supplement for ICUMT 2012 in area of security of communication networks. It is especially important because year 2011 has been named by mass media "the year of the hack" due to numerous accounts of data security breaches in private companies and governments. The amount of stolen data is estimated in petabytes. Large amount of the damage can be attributed to Operation Shady RAT or Duqu worm which is a successor of famous Stuxnet malware.

This year's workshop's main theme is network forensics.

Topics of interests include, but are not limited to:
- Cyber crimes: design and detection
- Cyber crime related investigations
- Digital forensics tools and applications
- Digital forensics case studies and best practices
- Formal standards, procedures and methods in digital forensics
- Privacy issues in digital forensics
- Steganography/steganalysis and covert/subliminal channels
- Network anomalies detection
- Novel applications of information hiding in networks
- Information hiding for multimedia services
- New methods for detecting and eliminating network steganography
- Localization of digital forensic techniques
- Computer and network forensics
- Network traffic analysis, traceback and attribution
- Incident response, investigation and evidence handling
- Integrity of digital evidence and live investigations
- Identification, authentication and collection of digital evidence
- Anti-forensic techniques and methods
- Watermarking and intellectual property theft
- Analysis techniques for digital forensics and information assurance research
- Social networking forensics
- Political and business issues related to digital forensics and anti-forensic techniques and methods

Chairs

Krzysztof Szczypiorski, Warsaw University of Technology, Poland (e-mail: ksz{at}tele.pw.edu.pl)
Józef Lubacz, Warsaw University of Technology, Poland (e-mail: jl{at}tele.pw.edu.pl)
Wojciech Mazurczyk, Warsaw University of Technology, Poland (e-mail: wmazurczyk{at}tele.pw.edu.pl)

List of Program Committee members (tentative):
Costas Constantinou, University of Birmingham, UK
Nicolas T. Courtois, University College London, UK
Jana Dittmann, Otto-von-Guericke University of Magdeburg, Germany
Michael Fisk, University of California San Diego, USA
Zeno Geradts, Digital Evidence R&D Netherlands Forensic Institute, The Hague, Netherlands
Pavel Gladyshev, University College Dublin, Ireland
Stefan Katzenbeisser, Technische Universität Darmstadt, Germany
Jerzy Konorski, Gdansk University of Technology, Poland
Igor Kotenko, Russian Academy of Sciences, Russia
Zbigniew Kotulski, Warsaw University of Technology and IPPT PAN, Poland
Christian Kraetzer, Otto-von-Guericke University of Magdeburg, Germany
Deepa Kundur, Texas A&M University, USA
Miroslaw Kutylowski, Wroclaw Universtity of Technology, Poland
Ke Liao, Institute of Electronics, Chinese Academy of Sciences, China
Guangjie Liu, Nanjing University of Science and Technology, China
Josef Pieprzyk, Macquarie University, Australia
Marcus K. Rogers, Purdue University, USA
Vassil Roussev, University of New Orleans, USA
Pedro Luis Prospero Sanchez, University of Sao Paulo, Sao Paulo, Brazil
Janusz Stoklosa, Poznan University of Technology, Poland
Hui Tian, National Huaqiao University, China
Jinwei Wang, The 28th Research Institute of CETC, China
Jozef Wozniak, Gdansk University of Technology, Poland
Sebastian Zander, Swinburne University of Technology Melbourne, Australia

Papers will be accepted based on peer review (3 per paper) and should contain original, high quality work. All papers must be written in English. Page length is limited to 8-pages in the IEEE double-column format with a font size no smaller than 10 points using IEEE Conference Proceeding templates (same as ICUMT 2012 template).
Submission page: TBA

The extended versions of high-quality papers selected from the workshop will be published in a special issue of: Security and Communicationn Networks or The Computer Journal (tenative).

Dates
Manuscript Due: 31.05.2012
Acceptance Notification: 15.07.2012
Final Manuscript Due: 30.07.2012

Related Resources

eCrime 2019   eCrime - Symposium on Electronic Crime Research
BDACCIP 2019   The 3rd International Workshop on Big Data Analytic for Cyber Crime Investigation and Prevention
ICNS--Ei and Scopus 2019   2019 The 4th International Conference on Network Security (ICNS 2019)--Ei Compendex, SCOPUS
ECCWS 2020   19th European Conference on Cyber Warfare and Security
IWCC 2019   8th International Workshop on Cyber Crime
BDAAICCIP 2019   Special Issue on Big Data Analytics and Artificial Intelligence for Cyber Crime Investigation and Prevention
NC 2020   8th International Conference of Networks and Communications
ICSTR 2019   ICSTR Sydney – International Conference on Science & Technology Research, 12-13 December 2019
WiCom-5G-SEC 2019   IEEE Wireless Communications Special Issue on Challenges and Novel Solutions for 5G Network Security, Privacy and Trust