posted by user: slimrekhis || 5926 views || tracked by 10 users: [display]

SFCS 2012 : First IEEE International Workshop on Security and Forensics in Communication Systems


When Jun 15, 2012 - Jun 15, 2012
Where Ottawa, Canada
Submission Deadline Jan 7, 2012
Notification Due Feb 9, 2012
Final Version Due Feb 29, 2012
Categories    digital forensic   communication networks   information security

Call For Papers

First IEEE International Workshop on Security and Forensics in Communication Systems (SFCS 2012)

In conjunction with IEEE ICC 2012, Ottawa, Canada 10-15 June 2012

Digital attacks are continuing to increase at an alarming rate. They target a wide variety of protocols and communication systems ranging from servers and end-user machines to wireless and mobile networks and devices. The absence of supporting evidence and technically sound methods may prevent administrators from: proving the identity of the guilty party, identifying the root vulnerability to prevent a future occurrence of a similar incident, and understanding the attacker’s motivation for an efficient design of security solutions. In this context, digital forensic engineering is emerging as a disciplined science in charge of developing novel scientific and theoretical methods, techniques, and approaches to collect, process, and analyze information retrieved from systems affected by security incidents and generate conclusive descriptions.

The SFCS 2012 Workshop will bring together researchers, scientists, engineers and practitioners involved in research in the fields of communication systems security and forensics, to present their latest research findings, ideas, and developments.

Topics of interest include, but are not limited to:
- Formal aspects of network security
- Theoretical techniques of digital forensics
- Embedded and handled devices forensic
- Evidence preservation, management, storage, reassembly, and analysis
- Anti-forensics prevention detection and analysis
- Development of Investigation processes and procedures
- Automated analysis of evidence
- Forensics in multimedia and communication protocols
- Security and Investigation techniques in wireless and mobile communication systems
- Risk analysis and management in communication systems
- Social networks security and forensics
- Collaborative and distributed digital investigation
- Hypothetical reasoning in forensics and incident response
- Legal and policy issues in digital forensics
- Intrusion Detection, incident response, and evidence handling
- Vulnerability analysis and assessment, and analysis of malware
- Cryptography and forensics techniques in multimedia communication
- Data hiding, extraction, and recovery techniques
- Techniques for Tracking and traceback of attacks in systems and networks
- Availability, privacy, authentication, and anonymity
- Secure e-services, e-government, e-learning, e-voting, and m-commerce applications
- File systems memory analysis
- Infrastructure protection, and Virtual Private Networks security
- Storage system protection and forensics
- Physical and Biometric security

Authors are invited to submit papers representing original work, which must not be published previously or under consideration for publication elsewhere. All submissions should be written in English with a maximum paper length of five (5) printed pages (IEEE style), but one additional page is allowed with additional publication fee. All papers will be peer reviewed by TPC members and other experts in the field of security and digital forensics. A detailed description of papers submission procedure is available in the ICC 2012 web site. Papers submission is handled via EDAS.

- Noureddine Boudriga, University of Carthage, Tunisia
- Slim Rekhis, University of Carthage, Tunisia

- Alec Yasinsac, University of South Alabama beginning, USA
- Amr Youssef, Concordia University, Canada
- Carlisle Adams, University of Ottawa
- Emmanuelle Anceaume, CNRS, France
- Giampaolo Bella, Università di Catania, Italy
- Gritzalis Stefanos, University of the Aegean, Greece
- Habtamu Abie, Norwegian Computing Center, Norway
- Helge Janicke, De Montfort University, England
- Krzysztof Szczypiorski, Warsaw University of Technology, Poland
- Kwangjo Kim, Korea Advanced Institute of Science and Technology, Korea
- Lejla Batina, Radboud University Nijmegen, Netherlands
- Luigi Logrippo, Université du Québec en Outaouais, Canada
- Marcus Rogers, Purdue University, USA
- Melek Önen, EURECOM, France
- Michael Losavio, University of Louisville, USA
- Mohamed Hamdi, University of Carthage, Tunisia
- Mourad Debbabi, Concordia University, Canada
- Narjes Robbana, University of Carthage, Tunisia
- Nasir Memon, Polytechnic Institute of NYU, USA
- Pavel Gladyshev, University College Dublin, Ireland
- Peter Mueller, IBM Zurich Research Laboratory, Switzerland
- Reijo Savola, VTT Technical Research Centre of Finland, Finland
- Riadh Robbana, University of Carthage, Tunisia
- Robert Erbacher, U.S. Army Research Laboratory, USA
- Sabrina De Capitani di Vimercati, Università degli Studi di Milano, Italy
- Simson Garfinkel, Naval Postgraduate School in Monterey, USA
- Stelvio Cimato, University of Milan, Italy
- Tahar Kechadi, University College Dublin, Ireland
- Vassil Roussev, University of New Orleans, USA
- Wojciech Mazurczyk, Warsaw University of Technology, Poland
- Yan Zhang, Simula Research Laboratory, Norway
- Yassine Lakhnech, University Joseph Fourier, France

Related Resources

IEEE CommMag: Security of ICS Protocols 2022   IEEE Communications Magazine (Feature Topic): Security of Communication Protocols in Industrial Control Systems (ICS)
IJPLA 2022   International Journal of Programming Languages and Applications
SI CFP IEEE OJ-COMS 2022   Intelligent Communication and Perceptual of Smart City Towards 6G: Emerging Trends and Challenges
NordSec 2022   The 27th Nordic Conference on Secure IT Systems
NISecurity 2022   2022 International Conference on Network and Information Security (NISecurity 2022)
IEEE ICCAE 2023   IEEE--2023 the 15th International Conference on Computer and Automation Engineering (ICCAE 2023)
CLBD 2022   3rd International Conference on Cloud and Big Data
CyberHunt 2022   IEEE BigData Workshop on Cyber Threat Intelligence and Hunting
BDACCIP 2022   The 6th International Workshop on Big Data Analytic for Cyber Crime Investigation and Prevention