posted by organizer: wmazurczyk || 5901 views || tracked by 2 users: [display]

IWCC 2019 : 8th International Workshop on Cyber Crime

FacebookTwitterLinkedInGoogle

Link: https://www.ares-conference.eu/workshops/iwcc-2019/
 
When Aug 26, 2019 - Aug 29, 2019
Where Canterbury, UK
Submission Deadline May 10, 2019
Notification Due Jun 15, 2019
Final Version Due Jun 23, 2019
Categories    cyber crime   network security   information security   MALWARE
 

Call For Papers

Call for Papers
8th International Workshop on Cyber Crime (IWCC 2019)
to be held in conjunction with the 14th International Conference on Availability, Reliability and Security (ARES 2019 – http://www.ares-conference.eu)
August 26 – August 29, 2018, Canterbury, UK

Important Dates
Submission Deadline May 10, 2019
Author Notification June 15, 2019
Proceedings Version June 23, 2019
Conference August 26 – August 29, 2019

Workshop Description:
Today’s world’s societies are becoming more and more dependent on open networks such as the Internet – where commercial activities, business transactions and government services are realized. This has led to the fast development of new cyber threats and numerous information security issues which are exploited by cyber criminals. The inability to provide trusted secure services in contemporary computer network technologies has a tremendous socio-economic impact on global enterprises as well as individuals.

Moreover, the frequently occurring international frauds impose the necessity to conduct the investigation of facts spanning across multiple international borders. Such examination is often subject to different jurisdictions and legal systems. A good illustration of the above being the Internet, which has made it easier to perpetrate traditional crimes. It has acted as an alternate avenue for the criminals to conduct their activities, and launch attacks with relative anonymity. The increased complexity of the communications and the networking infrastructure is making investigation of the crimes difficult. Traces of illegal digital activities are often buried in large volumes of data, which are hard to inspect with the aim of detecting offences and collecting evidence. Nowadays, the digital crime scene functions like any other network, with dedicated administrators functioning as the first responders.

This poses new challenges for law enforcement policies and forces the computer societies to utilize digital forensics to combat the increasing number of cybercrimes. Forensic professionals must be fully prepared in order to be able to provide court admissible evidence. To make these goals achievable, forensic techniques should keep pace with new technologies.

The aim of this workshop is to bring together the research accomplishments provided by the researchers from academia and the industry. The other goal is to show the latest research results in the field of digital forensics and to present the development of tools and techniques, which assist the investigation process of potentially illegal cyber activity. We encourage prospective authors to submit related distinguished research papers on the subject of both: theoretical approaches and practical case reviews.

Topics of interest include, but are not limited to:
• Ransomware: evolution, functioning, types, etc.
• Crime-as-a-service
• Criminal use of IoT, e.g., IoT-based botnets
• Mobile malware
• Novel techniques in exploit kits
• Criminal to criminal (C2C) communications
• Criminal to victim (C2V) communications
• Darknets and hidden services
• Criminal abuse of clouds and social networks
• Cybercrimes: evolution, new trends and detection
• Protecting Big Data against cybercrimes
• Cybercrime related investigations
• Privacy issues in digital forensics
• Big Data analytics helping to track cybercrimes
• Network traffic analysis, traceback and attribution
• Incident response, investigation and evidence handling
• Integrity of digital evidence and live investigations
• Identification, authentication and collection of digital evidence
• Anti-forensic techniques and methods
• Watermarking and intellectual property theft
• Steganography/steganalysis and covert/subliminal channels•
• Network anomalies detection
• Novel applications of information hiding in networks
• Political and business issues related to digital forensics and anti-forensic techniques

Workshop Chairs
Artur Janicki, Warsaw University of Technology, Poland
Wojciech Mazurczyk, Warsaw University of Technology, Poland
Krzysztof Szczypiorski, Warsaw University of Technology, Poland

Submission Guidelines
The submission guidelines valid for the workshop are the same as for the ARES conference. They can be found at https://www.ares-conference.eu/conference/submission/.

Related Resources

eCrime 2019   eCrime - Symposium on Electronic Crime Research
SPT-SN-IoT 2019   Special Issue Security, Privacy, and Trustworthiness of Sensor Networks and Internet of Things
JARES 2019   International Journal of Advance Robotics & Expert Systems
EISIC 2019   2019 European Intelligence and Security Informatics Conference (EISIC 2019)
IJCIS 2019   International Journal on Cryptography and Information Security
FAIML 2019   2019 International Conference on Frontiers of Artificial Intelligence and Machine Learning (FAIML 2019)
WISA 2019   The 20th World Conference on Information Security Applications
IEEE--ICCT--Ei and Scopus 2019   2019 19th IEEE International Conference on Communication Technology (ICCT 2019)--Ei Compendex and Scopus
iCMLDE 2019   International Conference on Machine Learning and Data Engineering
TCPS-SPCCPS 2019   ACM Transactions on Cyber-Physical Systems (TCPS), Special Issue on Security and Privacy for Connected Cyber-Physical Systems