posted by user: slimrekhis || 4571 views || tracked by 10 users: [display]

SFCS 2012 : First IEEE International Workshop on Security and Forensics in Communication Systems

FacebookTwitterLinkedInGoogle

Link: http://sites.google.com/site/sfcs2012/
 
When Jun 15, 2012 - Jun 15, 2012
Where Ottawa, Canada
Submission Deadline Jan 7, 2012
Notification Due Feb 9, 2012
Final Version Due Feb 29, 2012
Categories    digital forensic   communication networks   information security
 

Call For Papers

First IEEE International Workshop on Security and Forensics in Communication Systems (SFCS 2012)

In conjunction with IEEE ICC 2012, Ottawa, Canada 10-15 June 2012

Digital attacks are continuing to increase at an alarming rate. They target a wide variety of protocols and communication systems ranging from servers and end-user machines to wireless and mobile networks and devices. The absence of supporting evidence and technically sound methods may prevent administrators from: proving the identity of the guilty party, identifying the root vulnerability to prevent a future occurrence of a similar incident, and understanding the attacker’s motivation for an efficient design of security solutions. In this context, digital forensic engineering is emerging as a disciplined science in charge of developing novel scientific and theoretical methods, techniques, and approaches to collect, process, and analyze information retrieved from systems affected by security incidents and generate conclusive descriptions.

The SFCS 2012 Workshop will bring together researchers, scientists, engineers and practitioners involved in research in the fields of communication systems security and forensics, to present their latest research findings, ideas, and developments.

Topics of interest include, but are not limited to:
- Formal aspects of network security
- Theoretical techniques of digital forensics
- Embedded and handled devices forensic
- Evidence preservation, management, storage, reassembly, and analysis
- Anti-forensics prevention detection and analysis
- Development of Investigation processes and procedures
- Automated analysis of evidence
- Forensics in multimedia and communication protocols
- Security and Investigation techniques in wireless and mobile communication systems
- Risk analysis and management in communication systems
- Social networks security and forensics
- Collaborative and distributed digital investigation
- Hypothetical reasoning in forensics and incident response
- Legal and policy issues in digital forensics
- Intrusion Detection, incident response, and evidence handling
- Vulnerability analysis and assessment, and analysis of malware
- Cryptography and forensics techniques in multimedia communication
- Data hiding, extraction, and recovery techniques
- Techniques for Tracking and traceback of attacks in systems and networks
- Availability, privacy, authentication, and anonymity
- Secure e-services, e-government, e-learning, e-voting, and m-commerce applications
- File systems memory analysis
- Infrastructure protection, and Virtual Private Networks security
- Storage system protection and forensics
- Physical and Biometric security

Authors are invited to submit papers representing original work, which must not be published previously or under consideration for publication elsewhere. All submissions should be written in English with a maximum paper length of five (5) printed pages (IEEE style), but one additional page is allowed with additional publication fee. All papers will be peer reviewed by TPC members and other experts in the field of security and digital forensics. A detailed description of papers submission procedure is available in the ICC 2012 web site. Papers submission is handled via EDAS.

WORKSHOP CHAIRS
---------------------------------
- Noureddine Boudriga, University of Carthage, Tunisia
- Slim Rekhis, University of Carthage, Tunisia

PROGRAM COMMITTEE
-------------------------------------
- Alec Yasinsac, University of South Alabama beginning, USA
- Amr Youssef, Concordia University, Canada
- Carlisle Adams, University of Ottawa
- Emmanuelle Anceaume, CNRS, France
- Giampaolo Bella, Università di Catania, Italy
- Gritzalis Stefanos, University of the Aegean, Greece
- Habtamu Abie, Norwegian Computing Center, Norway
- Helge Janicke, De Montfort University, England
- Krzysztof Szczypiorski, Warsaw University of Technology, Poland
- Kwangjo Kim, Korea Advanced Institute of Science and Technology, Korea
- Lejla Batina, Radboud University Nijmegen, Netherlands
- Luigi Logrippo, Université du Québec en Outaouais, Canada
- Marcus Rogers, Purdue University, USA
- Melek Önen, EURECOM, France
- Michael Losavio, University of Louisville, USA
- Mohamed Hamdi, University of Carthage, Tunisia
- Mourad Debbabi, Concordia University, Canada
- Narjes Robbana, University of Carthage, Tunisia
- Nasir Memon, Polytechnic Institute of NYU, USA
- Pavel Gladyshev, University College Dublin, Ireland
- Peter Mueller, IBM Zurich Research Laboratory, Switzerland
- Reijo Savola, VTT Technical Research Centre of Finland, Finland
- Riadh Robbana, University of Carthage, Tunisia
- Robert Erbacher, U.S. Army Research Laboratory, USA
- Sabrina De Capitani di Vimercati, Università degli Studi di Milano, Italy
- Simson Garfinkel, Naval Postgraduate School in Monterey, USA
- Stelvio Cimato, University of Milan, Italy
- Tahar Kechadi, University College Dublin, Ireland
- Vassil Roussev, University of New Orleans, USA
- Wojciech Mazurczyk, Warsaw University of Technology, Poland
- Yan Zhang, Simula Research Laboratory, Norway
- Yassine Lakhnech, University Joseph Fourier, France

Related Resources

CSITS 2018   International Workshop on Cyber Security for Intelligent Transportation Systems
NECO 2018   7th International Conference of Networks and Communications
ITCE 2019   The International Conference on Innovative Trends in Computer Engineering
ACISP 2019   The 24th Australasian Conference on Information Security and Privacy
SRDS 2019   38th IEEE International Symposium on Reliable Distributed Systems
CyberHunt - 2018   International Workshop on Big Data Analytics for Cyber Threat Hunting
IEEE Trans SUSC 2019   IEEE Trans on Sustainable Computing (SI: Intersection of Computing and Communication Technologies with Energy Systems)
ACM--ICNS--Ei and Scopus 2018   ACM--2018 The 3rd International Conference on Network Security (ICNS 2018)--Ei Compendex and Scopus
QRS 2019   The 19th IEEE International Conference on Software Quality, Reliability, and Security
BES 2018   3rd International Conference on Biomedical Engineering and Science