posted by user: ajanicki || 1769 views || tracked by 2 users: [display]

IWCC 2023 : International Workshop on Cyber Crime

FacebookTwitterLinkedInGoogle

Link: https://www.ares-conference.eu/workshops/iwcc-2023/
 
When Aug 29, 2023 - Sep 1, 2023
Where Benevento, Italy
Submission Deadline May 25, 2023
Notification Due Jun 5, 2023
Final Version Due Jun 15, 2023
Categories    computer science   cybersecurity   network security   cybercrime
 

Call For Papers

12th International Workshop on Cyber Crime (IWCC 2023 - https://www.ares-conference.eu/workshops/iwcc-2023/) to be held in conjunction with the 18th International Conference on Availability, Reliability and Security (ARES 2023 - http://www.ares-conference.eu) August 29 – September 1, 2023, Benevento, Italy

WORKSHOP DESCRIPTION
The societies of today’s world are becoming increasingly dependent on online services, where commercial activities, business transactions and government services are realized. This tendency has been evident during the COVID-19 pandemic. These developments, along with the ongoing Russian aggression against Ukraine, have led to the fast development of new cyber threats and numerous information security issues, that are exploited by cybercriminals. The inability to provide trusted, secure services in contemporary computer network technologies has a tremendous socio-economic impact on global enterprises as well as individuals.

Moreover, the frequently occurring international frauds impose the necessity to conduct investigations spanning multiple domains and countries. Such examination is often subject to different jurisdictions and legal systems. A good illustration of the above is the Internet, which has made it easier to prepare and perpetrate traditional – but now cyber-enabled – crimes. It has acted as an alternate avenue for criminals to conduct their activities and launch attacks with relative anonymity, a high degree of deniability and the opportunity to operate in a border-agnostic environment. Worrying developments in the abuse of artificial intelligence and machine learning technologies lead to the increased capabilities of malign actors who leverage these tools to design and propagate disinformation, what is especially dangerous (and effective) during emergencies and crises of all kinds. The increased complexity of communications and the networking infrastructure is making the investigation of these new types of crimes difficult. Traces of illegal digital activities are difficult to analyze, due to large volumes of data. Nowadays, the digital crime scene functions like any other network, with dedicated administrators functioning as the first responders.

This poses new challenges for law enforcement and intelligence communities, and forces the computer societies to utilize digital forensics to combat the increasing number of cybercrimes. Forensic professionals must be fully prepared to be able to provide court-admissible evidence. To make these goals achievable, forensic techniques should keep pace with new technologies.

The aim of this workshop is to bring together the research outcomes provided by researchers from academia and the industry. The other goal is to show the latest research results in digital forensics. We strongly encourage prospective authors to submit articles presenting both theoretical approaches and practical case reviews, including work-in-progress reports.

TOPICS OF INTEREST INCLUDE, BUT ARE NOT LIMITED TO:
- Big Data analytics helping to track cybercrimes
- Protecting Big Data against cybercrimes
- Crime-as-a-service
- Criminal abuse of clouds and social networks
- Criminal to criminal (C2C) communications
- Criminal to victim (C2V) communications
- Criminal use of IoT, e.g., IoT-based botnets
- Cybercrime related investigations
- Cybercrimes: evolution, new trends and detection
- Darknets and hidden services
- Fake and disinformation detection
- Mobile malware
- Network anomalies detection
- Network traffic analysis, traceback and attribution
- Incident response, investigation and evidence handling
- Novel techniques in exploit kits
- Political and business issues related to digital forensics and anti-forensic techniques
- Anti-forensic techniques and methods
- Identification, authentication and collection of digital evidence
- Integrity of digital evidence and live investigations
- Privacy issues in digital forensics
- Ransomware: evolution, functioning, types, etc.
- Steganography/steganalysis and covert/subliminal channels
- Novel applications of information hiding in networks
- Watermarking and intellectual property theft
- Weaponization of information – cyber-enhanced disinformation campaigns
- AI-enabled crime and terrorism

WORKSHOP CHAIRS
Artur Janicki, Warsaw University of Technology, Poland
Kacper Gradoń, Warsaw University of Technology, Poland
Krzysztof Szczypiorski, Warsaw University of Technology, Poland

SUBMISSION GUIDELINES
The submission guidelines valid for the workshop are the same as for the ARES conference. They can be found at https://www.ares-conference.eu/conference/submission/.

Related Resources

IWCC 2024   International Workshop on Cyber Crime (extended deadline!)
IEEE-Ei/Scopus-ACEPE 2024   2024 IEEE Asia Conference on Advances in Electrical and Power Engineering (ACEPE 2024) -Ei Compendex
BDACCIP 2025   The 7th International Workshop on Big Data Analytic for Cyber Crime Investigation and Prevention
IEEE-Ei/Scopus-SGGEA 2024   2024 Asia Conference on Smart Grid, Green Energy and Applications (SGGEA 2024) -EI Compendex
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
Ei/Scopus-ACAI 2024   2024 7th International Conference on Algorithms, Computing and Artificial Intelligence(ACAI 2024)
ECCWS 2024   23rd European Conference on Cyber Warfare and Security
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
CyberHunt 2024   7th Annual Workshop on Cyber Threat Intelligence and Hunting in conjunction with the IEEE Big Data Conference
ICCPS 2025   16th ACM/IEEE International Conference on Cyber-Physical Systems