posted by organizer: wmazurczyk || 12293 views || tracked by 3 users: [display]

IWCC 2017 : International Workshop on Cyber Crime


When Aug 29, 2017 - Sep 1, 2017
Where Reggio Calabria, Italy
Submission Deadline May 14, 2017
Notification Due May 26, 2017
Final Version Due Jun 20, 2017
Categories    cyber crime   cybersecurity   network security   information security

Call For Papers


The 6th International Workshop on Cyber Crime (IWCC 2017) to be held in
conjunction with the 12th International Conference on Availability,
Reliability and Security (ARES 2017 –

August 29 - September 1, 2017, Reggio Calabria, Italy

CUING website:


Submission Deadline May 14, 2017
Author Notification May 26, 2017
Proceedings Version June 20, 2017
Conference August 29 - September 1, 2017


Today’s world’s societies are becoming more and more dependent on open
networks such as the Internet – where commercial activities, business
transactions and government services are realized. This has led to the
fast development of new cyber threats and numerous information security
issues which are exploited by cyber criminals. The inability to provide
trusted secure services in contemporary computer network technologies
has a tremendous socio-economic impact on global enterprises as well as

Moreover, the frequently occurring international frauds impose the
necessity to conduct the investigation of facts spanning across multiple
international borders. Such examination is often subject to different
jurisdictions and legal systems. A good illustration of the above being
the Internet, which has made it easier to perpetrate traditional crimes.
It has acted as an alternate avenue for the criminals to conduct their
activities, and launch attacks with relative anonymity. The increased
complexity of the communications and the networking infrastructure is
making investigation of the crimes difficult. Traces of illegal digital
activities are often buried in large volumes of data, which are hard to
inspect with the aim of detecting offences and collecting evidence.
Nowadays, the digital crime scene functions like any other network, with
dedicated administrators functioning as the first responders.

This poses new challenges for law enforcement policies and forces the
computer societies to utilize digital forensics to combat the increasing
number of cybercrimes. Forensic professionals must be fully prepared in
order to be able to provide court admissible evidence. To make these
goals achievable, forensic techniques should keep pace with new

The aim of this workshop is to bring together the research
accomplishments provided by the researchers from academia and the
industry. The other goal is to show the latest research results in the
field of digital forensics and to present the development of tools and
techniques, which assist the investigation process of potentially
illegal cyber activity. We encourage prospective authors to submit
related distinguished research papers on the subject of both:
theoretical approaches and practical case reviews.


- Criminal use of IoT e.g. IoT-based botnets
- Criminal to criminal (C2C) communications
- Criminal to victim (C2V) communications
- Anti-forensic techniques and methods
- Cybercrime related investigations
- Privacy issues in digital forensics
- Novel techniques in exploit kits
- Network anomalies detection
- Crime-as-a-service
- Mobile malware
- Identification, authentication and collection of digital evidence
- Steganography/steganalysis and covert/subliminal channels
- Incident response, investigation and evidence handling
- Political and business issues related to digital forensics and
anti-forensic techniques
- Novel applications of information hiding in networks
- Cybercrimes: evolution, new trends and detection
- Network traffic analysis, traceback and attribution
- Integrity of digital evidence and live investigations
- Ransomware: evolution, functioning, types, etc.
- Criminal abuse of clouds and social networks
- Watermarking and intellectual property theft


Artur Janicki
Warsaw University of Technology, Poland

Wojciech Mazurczyk
Warsaw University of Technology, Poland

Krzysztof Szczypiorski
Warsaw University of Technology, Poland


The submission guidelines valid for the IWCC workshop are the same as
for the ARES conference. They can be found

Submission of a paper implies that should the paper be accepted, at
least one of the authors will register and present the paper in the

Papers will be accepted based on peer review (3 per paper) and should
contain original, high quality work. All papers must be written in
English. Authors are invited to submit Regular Papers (maximum 6 pages)
via EasyChair. Papers accepted by the workshop will be published in the
Conference Proceedings of ARES 2017 that will be published by the
International Conference Proceedings Series published by ACM (ACM ICPS).

Related Resources

BDACCIP 2021   The 5th International Workshop on Big Data Analytic for Cyber Crime Investigation and Prevention 2021
SI on ATD&IS 2021   Special Issue on Advanced Technologies in Data and Information Security, Applied Sciences, MDPI
ADRW 2021   «Archives during rebellions and wars». From the age of Napoleon to the cyber war era
IEEE-CISNS 2021   2021 2nd International Conference on Information System and Network Security (CISNS 2021)
IWCC 2021   International Workshop on Cyber Crime
NISecurity 2022   2022 International Conference on Network and Information Security (NISecurity 2022)
CSW 2022   2022 International Workshop on Cyber Security (CSW 2022)
Virtual Environments for Cybersecurity 2021   SIMULATION MODELLING PRACTICE AND THEORY - Special Issue on ''Virtual Environments for Cybersecurity''
EAI ICDF2C 2021   12th EAI International Conference on Digital Forensics & Cyber Crime (Springer, Scopus, ISI, Ei, more)
DDSW 2022   The 3nd International Workshop on Data-Driven Security (DDSW 2022)