posted by user: slimrekhis || 3558 views || tracked by 5 users: [display]

IEEE-WCNC-SFCS 2019 : IEEE Fifth international workshop on Security and Forensics in Cyber Space


When Apr 15, 2019 - Apr 18, 2019
Where Marrakech, Morocco
Submission Deadline Jan 10, 2019
Notification Due Feb 15, 2019
Final Version Due Mar 1, 2019
Categories    cyber security   communications   forensic   netwok

Call For Papers

[Apologies if you receive multiple copies of this message]

Call for Papers

IEEE Fifth international workshop on Security and Forensics in Cyber Space (SFCS 2019)
In conjunction with IEEE Wireless Communications and Networking Conference (WCNC 2019)
15-18 April 2019, Marrakech, Morocco

Cyber attacks are continuing to increase at an alarming rate, especially with the ever increasing nature of cyber connectivity. They target a wide variety of protocols and communication systems ranging from servers and end-user machines to wireless and mobile networks and devices. The absence of active cyber defense and strategy, and technically sound forensic methods may prevent administrators from making suitable decisions on time against threats, proving the identity of the guilty party, identifying the root vulnerability to prevent a future occurrence of a similar incident, and understanding the attacker’s motivation for an efficient design of cyber security solutions.

In this context, digital forensic engineering is emerging as a disciplined science in charge of developing novel scientific and theoretical methods, techniques, and approaches to collect, process, and analyze information retrieved from systems affected by security incidents to generate conclusive descriptions.

The fifth edition of the SFCS 2019 workshop will bring together researchers, scientists, engineers and practitioners involved in research in the fields of communication systems security and forensics, to present their latest research findings, ideas, and developments. The workshop will act as a forum for discussing open issues, and presenting original and unpublished research results and innovative ideas in the realm of security and digital forensics. We encourage contributions describing innovative work in the realm of cyber security, cyber defense, and digital forensics.

Topics of interest include, but are not limited to:

- Formal and theoretical techniques of cyber security and forensics
- Legal and policy issues in cyber security and defense
- Availability, privacy, authentication, trust, access control, and key management
- Social networks security and forensics
- Intrusion Detection
- Incident response techniques in networked and distributed systems
- Security and privacy in wireless and mobile systems
- Cyber security engineering
- Risk analysis and management in cyber security
- Storage systems protection and forensics
- Economic and management aspects of cyber security and privacy
- Automated reasoning techniques of incidents and evidence analysis
- Evidentiary aspects and forensics of digital crimes
- Cyber scenarios modeling, analysis, and investigation
- Hypothetical reasoning in forensics and incident response
- Collaborative and distributed techniques for cyber defense and cyber investigation
- Active, adaptive, and intelligent defense systems
- Embedded security and device forensics
- Evidence preservation, management, storage and reassembly
- Anti-forensics and anti-anti forensics prevention, detection, and analysis
- Multimedia security and forensics
- Lightweight security techniques
- Large-scale security and investigation in large networks and Big Data
- Innovative forensic services
- Data visualization in forensic analysis
- Vulnerability analysis and assessment of cloud services
- Techniques for tracking and trace-back of attacks in networked and distributed systems
- Data hiding, extraction, and recovery technique
- Security and forensics in distributed, virtual, and cloud environments
- Cyber security architectures
- Defense in depth
- Cybersecurity of Industrial Control Systems and Cyber physical systems
- Security and forensics of critical infrastructures
- Supervisory control and data acquisition security
- Bio-inspired security
- Security of Application-oriented solutions (Healthcare, Military, Supply Chains, Environment, Agriculture, Smart cities, Education, ...)

Initial Papers Submission Guidelines

All submissions should be written in English with a maximum paper length of eight (8) printed pages (10-point font) including figures. The papers exceeding 6 pages will be subject to an additional 100€ fee/page. Papers exceeding 8 pages will not be accepted at EDAS.

All papers should be formatted in conformance with the IEEE Manuscript Templates for Conference Proceedings and should be submitted via EDAS (

Papers are reviewed on the basis that they do not contain plagiarized material and have not been submitted to any other conference at the same time (double submission). These matters are taken very seriously and the IEEE Communications society will take action against any author who has engaged in either practice.

Authors of accepted papers must guarantee that their papers will be presented at the workshop.

To ensure appropriate consideration of conflicts of interest during the review process, changes to the list of authors once a paper has been submitted for review during review, revision, or (if accepted) ­final publication are not allowed. The author list may be changed only prior to the submission deadline.

Important Dates
Paper Submission Deadline: 30 January 2019
Acceptance/Rejection Notification: 15 February 2019
Camera Ready Submission Deadline: 1 March 2019
Workshop date: 15 April 2019

Organizing Committee

General Chairs
- Noureddine Boudriga, University of Carthage, Tunisia
- Slim Rekhis, University of Carthage, Tunisia

Technical Program Committee
Andrew Marrington, Zayed University, UAE
Antoine Bagula, University of the Western Cape, South Africa
Bruno Miguel Silva, University of Beira Interior, Portugal
Cosimo Anglano, Universitá del Piemonte Oriental, Italy
Gritzalis Stefanos, University of the Aegean, Greece
Harald Baier, Hochschule Darmstadt / CRISP, Germany
Helge Janicke, De Montfort University, United Kingdom
Hervé Debar, Telecom SudParis, France
Jong-Hoon Kim, Kent State University, USA
Krzysztof Szczypiorski, Warsaw University of Technology, Poland
Lamia Chaari, University of Sfax, Tunisia
Michael Losavio, University of Louisville, USA
Sabrina De Capitani di Vimercati, Università degli Studi di Milano, Italy
Sami Habib, Kuwait University, Kuwait
Stelvio Cimato, University of Milan, Italy
Walid Abdallah, Military Aviation School of Borj Elamri, Tunisia
Wojciech Mazurczyk, Warsaw University of Technology, Poland
Yacine Djemaiel, Institute of Technology in Communications at Tunis, Tunisia

Related Resources

IEEE S&P 2024   The 45th IEEE Symposium on Security and Privacy (Third Deadline)
SDMPR 2023   2023 Asia Conference on Statistics, Data Mining and Pattern Recognition (SDMPR 2023)
ICSIP 2024   IEEE--2024 9th International Conference on Signal and Image Processing (ICSIP 2024)
IEEE ICCC 2023   IEEE--2023 9th International Conference on Computer and Communications (ICCC 2023)
IEEE ICC'24 NextG-WiSec 2024   IEEE NextG-WiSec: The Nineth IEEE Workshop on NextG (6G and beyond) Wireless Security in conjunction with IEEE ICC 2024, 9–13 June 2024 - Denver, CO, USA
IJSCMC 2023   International Journal of Soft Computing, Mathematics and Control
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CNSA 2024   17th International Conference on Network Security & Applications
IEEE AIxVR 2024   IEEE International Conference on Artificial Intelligence & extended and Virtual Reality
EEIJ 2023   Electrical Engineering: An International Journal