posted by organizer: slimrekhis || 3973 views || tracked by 10 users: [display]

SFCS 2016 : Fourth International Workshop on Security and Forensics in Cyber Space (SFCS 2016)


When Jan 4, 2016 - Jan 6, 2016
Where Singapore
Submission Deadline Oct 16, 2015
Notification Due Nov 13, 2015
Final Version Due Nov 23, 2015
Categories    cyber security   communication   forensics   investigation

Call For Papers

Call for Papers
Fourth International Workshop on Security and Forensics in Cyber Space (SFCS 2016), In conjunction with 17th International Conference on Distributed Computing and Networking (ICDCN 2016)
Singapore, January 4-6, 2016


With the continuous growth of cyber connectivity and the ever increasing number of applications, remotely delivered services, and networked systems have required the need for digital security. Today, more and more government agencies, financial institutions, and business enterprises are experiencing security incidents and cyber-crimes, by which attackers could generate fraudulent financial transactions, commit crimes, perform an industrial espionage, and disrupt the business processes.

The sophistication and the borderless nature of the intrusion techniques used during a cyber security incident, have triggered the need for designing new active cyber defense solutions, and developing efficient incident response plans. In this context, digital forensics has emerged as a disciplined science allowing to note and collect evidences left on the compromised system prior to the incident occurrence, and carry out an analysis to: (a) understand what occurred; (b) determine the set of exploited security weaknesses; (c) trace attackers to their source; (d) study the attackers trends and motives; and (e) propose a set of optimal countermeasures to stop and mitigate the effect of the attacks.

The fourth edition of the international workshop on Security and Forensics in Cyber Space (SFCS 2016) will be held in conjunction with the 17th International Conference on Distributed Computing and Networking (ICDCN 2016). The workshop promotes research and innovative ideas in the realm of cyber security and digital forensics. It provides a prominent venue for researchers, scientists, engineers and practitioners to share their thoughts, exchange ideas, and prospect future and potential axes of collaboration. Papers focusing on any aspect of the theory and practice of cyber security, defense, and digital forensics are solicited. A large spectrum of advanced topics are covered, ranging from anti-forensics detection and recovery, cyber security and forensic in wireless and mobile communication systems, multimedia security and forensic content processing, development of novel theories and techniques of cyber security and forensics analysis and validation, and forensics in cloud computing and social networks.

The workshop will act as a forum for discussing open issues, and presenting original and unpublished research results and innovative ideas in the realm of security and digital forensics. We encourage contributions describing innovative work in the realm of security and digital forensics. Topics of interest include, but are not limited to:

- Formal and theoretical techniques of cyber security and forensics
- Legal and policy issues in cyber security and defense
- Availability, privacy, authentication, trust, access control, and key management
- Social networks security
- Incident response techniques in networked and distributed systems
- Security and privacy in wireless and mobile systems
- Cyber security engineering
- Risk analysis and management in cyber security
- Critical infrastructures security
- Storage systems protection and forensics
- Economic and management aspects of cyber security and privacy
- Automated reasoning techniques of incidents and evidence analysis
- Evidentiary aspects and forensics of digital crimes
- Cybercrime scenarios modeling, analysis, and investigation
- Hypothetical reasoning in forensics and incident response
- Collaborative and distributed techniques for cyber defense and cyber investigation
- Active, adaptive, and intelligent defense systems
- Embedded devices forensics
- Evidence preservation, management, storage and reassembly
- Anti-forensics and anti-anti forensics prevention, detection, and analysis
- Multimedia security and forensics
- Lightweight forensic techniques
- Large-scale investigations in large networks and Big Data
- Innovative forensic services
- Data visualization in forensic analysis
- Vulnerability analysis and assessment of cloud services
- Techniques for tracking and trace-back of attacks in networked and distributed systems
- Data hiding, extraction, and recovery technique
- Security and forensics in distributed, virtual, and cloud environments
- Cyber security and forensic architectures
- Defense in depth
- Cybersecurity of Industrial Control Systems
- Cyber physical systems security
- Bio-inspired security

ICDCN-SFCS 2016 will be soliciting regular research papers. At least one author of each accepted paper must register for the conference and present the paper.

Regular papers should not exceed 6 pages double column, including figures, tables and references, in accordance with the ACM author guidelines. The ACM LaTeX and Microsoft Word templates, as well as related information, can be found at the ACM website ( No changes to margins, spacing, or font sizes are allowed from those specified by the style files. The proceedings of the workshop will be published in the ACM Digital library.

All submissions must be made electronically in printable pdf form via the EasyChair submission management system.

Important Dates
Paper Submission Deadline (extended): October 16, 2015 (23:59:00 UTC)
Paper Notification: November 13, 2015
Camera Ready Submission Deadline: November 23, 2015
Author Registration Deadline: November 23, 2015

- Noureddine Boudriga, University of Carthage, Tunisia
- Slim Rekhis, University of Carthage, Tunisia

- Amr Youssef, Concordia University, Canada
- Helge Janicke, De Montfort University, UK
- Giampaolo Bella, Università di Catania, Italy
- Krzysztof Szczypiorski, Warsaw University of Technology, Poland
- Peter Mueller, IBM Zurich Research Laboratory, Switzerland
- Raymond Choo, University of South Australia, Australia
- Michael Losavio, University of Louisville, USA
- Raymond Choo, University of South Australia, Australia
- Sabrina De Capitani di Vimercati, Università degli Studi di Milano, Italy
- Stefanos Gritzalis, University of the Aegean, Greece
- Sunshin An, Korea University, Korea
- Vassil Roussev, University of New Orleans, USA
- Walid Abdallah, Military Aviation School of Borj Elamri, Tunisia
- Wojciech Mazurczyk, Warsaw University of Technology, Poland
- Yacine Djemaiel, Institute of Technology in Communications at Tunis, Tunisia

Related Resources

CyberHunt 2021   IEEE Workshop on Cyber Threat Intelligence and Hunting with AI
CSW 2022   2022 International Workshop on Cyber Security (CSW 2022)
SI on AdCTI 2021   Special Issue on Advances in Cyber Threat Intelligence, Security and Communication Networks, Wiley & Hindawi
PerCom 2022   The 20th International Conference on Pervasive Computing and Communications
PRL - VSI:MWB 2021   Pattern Recognition Letters - Special Issue on Mobile and Wearable Biometrics (VSI:MWB)
EEEN 2021   5th International Conference on Electrical and Electronics Engineering
ICCWS 2022   17th International Conference on Cyber Warfare and Security
SVC 2022   3rd International Conference on Signal Processing, VLSI Design & Communication Systems
WorldCIS 2021   World Congress on Internet Security
JISCR 2021   Journal of information security and cybercrimes research