posted by user: wmazurczyk || 5778 views || tracked by 15 users: [display]

IWCC 2013 : International Workshop on Cyber Crime


When May 24, 2013 - May 24, 2013
Where San Francisco, CA, USA
Submission Deadline Feb 15, 2013
Notification Due Mar 1, 2013
Final Version Due Apr 1, 2013
Categories    cyber security   cyber crime   network forensics   network security

Call For Papers

Call for papers:
International Workshop on Cyber Crime - IWCC 2013
Friday May 24, 2013
San Francisco, CA, USA
co-located with
The 34th IEEE Symposium on Security and Privacy (IEEE S&P 2013)
IWCC website:

Today's world's societies are becoming more and more dependent on open networks such as the Internet - where commercial activities, business transactions and government services are realized. This has led to the fast development of new cyber threats and numerous information security issues which are exploited by cyber criminals. The inability to provide trusted secure services in contemporary computer network technologies has a tremendous socio-economic impact on global enterprises as well as individuals.

Moreover, the frequently occurring international frauds impose the necessity to conduct the investigation of facts spanning across multiple international borders. Such examination is often subject to different jurisdictions and legal systems. A good illustration of the above being the Internet, which has made it easier to perpetrate traditional crimes. It has acted as an alternate avenue for the criminals to conduct their activities, and launch attacks with relative anonymity. The increased complexity of the communications and the networking infrastructure is making investigation of the crimes difficult. Traces of illegal digital activities are often buried in large volumes of data, which are hard to inspect with the aim of detecting offences and collecting evidence. Nowadays, the digital crime scene functions like any other network, with dedicated administrators functioning as the first responders.

This poses new challenges for law enforcement policies and forces the computer societies to utilize digital forensics to combat the increasing number of cybercrimes. Forensic professionals must be fully prepared in order to be able to provide court admissible evidence. To make these goals achievable, forensic techniques should keep pace with new technologies.

The aim of this workshop is to bring together the research accomplishments provided by the researchers from academia and the industry. The other goal is to show the latest research results in the field of digital forensics and to present the development of tools and techniques which assist the investigation process of potentially illegal cyber activity. We encourage prospective authors to submit related distinguished research papers on the subject of both: theoretical approaches and practical case reviews. The workshop will be accessible to both non-experts interested in learning
about this area and experts interesting in hearing about new research and approaches.


Topics of interests include, but are not limited to:
- Cyber crimes: evolution, new trends and detection
- Cyber crime related investigations
- Computer and network forensics
- Digital forensics tools and applications
- Digital forensics case studies and best practices
- Privacy issues in digital forensics
- Network traffic analysis, traceback and attribution
- Incident response, investigation and evidence handling
- Integrity of digital evidence and live investigations
- Identification, authentication and collection of digital evidence
- Anti-forensic techniques and methods
- Watermarking and intellectual property theft
- Social networking forensics
- Steganography/steganalysis and covert/subliminal channels
- Network anomalies detection
- Novel applications of information hiding in networks
- Political and business issues related to digital forensics and anti-forensic techniques

Krzysztof Szczypiorski, Warsaw University of Technology, Poland
Wojciech Mazurczyk, Warsaw University of Technology, Poland
Yali Liu, AT&T Labs, USA
Hui Tian, National Huaqiao University, China

Authors are invited to submit Regular Papers (maximum 8 pages) or Short
Papers (maximum 4 pages) via EasyChair. Papers accepted by the workshop
will be published in the Conference Proceedings published by IEEE Computer
Society Press.

The extended versions of high-quality papers selected from the workshop
will be published in a special issue of the JCR journals (to be announced).

February 15, 2013: Regular & Short Paper Submission
March 1, 2013: Notification Date
April 1, 2013: Camera-Ready & Registration

Related Resources

BDACCIP 2022   The 6th International Workshop on Big Data Analytic for Cyber Crime Investigation and Prevention
CNSA 2023   16th International Conference on Network Security & Applications
IWCC 2022   International Workshop on Cyber Crime
ICSS 2022   8th International Conference on Software Security
SI on AdCTI 2022   Special Issue on Advances in Cyber Threat Intelligence 2022, Security and Communication Networks, Wiley & Hindawi
ACITY 2022   12th International Conference on Advances in Computing and Information Technology
CyberHunt 2022   IEEE BigData Workshop on Cyber Threat Intelligence and Hunting
CPSIOT 2022   2022 International Conference on Cyber Physical Systems and IoT(CPSIOT 2022)
EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications
IEEE PriComp 2022   The 2022 IEEE International Conference on Privacy Computing