posted by user: wmazurczyk || 3117 views || tracked by 21 users: [display]

SI ANTE 2013 : Special Issue on Network forensics and challenges for cyber-security of Annals of Telecommunications (JCR Journal)

FacebookTwitterLinkedInGoogle

Link: http://www.annales-des-telecommunications.com/archive/107/CfP_cyber_security.pdf
 
When N/A
Where N/A
Submission Deadline Mar 15, 2013
Notification Due Jul 15, 2013
Categories    cyber security   network security   network forensics   steganography
 

Call For Papers

Final and firm deadline: 15th March 2013

Journal Annals of telecommunications - published by Springer, indexed in ISI and Scopus Databases

Societies in today’s world are becoming more and more dependent on open networks such as the Internet where commercial activities, business transactions and government services are realized. This has led to the fast development of new cyber threats and information security issues which are utilized by cyber criminals. Mistrust for telecommunications and computer network technologies have tremendous socio-economic impacts on global enterprises as well as individuals.

Moreover, the occurrence of international frauds often requires the investigation of facts that cross international borders. They are also often subject to different jurisdictions and legal systems. The increased complexity of the communication and networking infrastructure is making investigation of the crimes difficult. Clues of illegal digital activities are often buried in large volumes of data that are hard to inspect in order to detect crimes and collect evidence.

This poses new challenges for law enforcement and forces computer societies to utilize digital forensics to combat the growing number of cybercrimes. Forensic professionals need to be fully prepared in order to be able to provide effective evidence. To achieve these goals forensic techniques must keep pace with new technologies. That is why the field of digital forensics is becoming more and more important for law enforcement, information and network security. Network forensics is a newly emerged research area, and its importance has attracted a great attention among computer professionals, law enforcement, and practitioners. It is a multidisciplinary area that includes multiple fields i.e.: law, computer science, finance, networking, data mining, and criminal justice. However, network forensics still faces diverse challenges and issues in terms of the efficiency of digital evidence processing and the related forensic procedures.

This special issue presents some of the most relevant ongoing research in network forensics and cyber-security fields. Topics include, but are not limited to the following:
• Network forensics tools, applications, case studies and best practices;
• Formal standards, procedures or methods in network forensics;
• Networking incidents response, investigation and evidence handling;
• Integrity of digital evidence and live investigations;
• Identification, authentication and collection of digital evidence;
• Cyber crimes design, detection & investigation;
• Anti-forensics techniques and methods;
• Social networking forensics;
• Watermarking and intellectual property theft;
• Steganography/steganalysis and covert/subliminal channels in network forensics.

Guest Editors
- Wojciech Mazurczyk, Warsaw University of Technology, Poland
- Krzysztof Szczypiorski, Warsaw University of Technology, Poland
- Yali Liu, AT&T Labs, USA
- Hui Tian, National Huaqiao University, China

Papers must be written in English and describe original research not published or currently under review by other journals or conferences. The manuscripts are expected to be between 5,000 and 8,500 words (30,000 to 50,000 characters including spaces). All relevant papers submitted will go through an external review process. Submissions should be sent according to the instructions available at:
http://www.annals-of-telecommunications.com/p_en_publish_6.html

Proposed schedule
- Manuscript submission: March 15th, 2013
- Online with DOI: As soon as accepted
- Expected publication: March-June 2014

Related Resources

ISMH 2016   Information Security Management Handbook, Seventh Edition
ICNGCCT 2015   Second International Conference on Next Generation Computing and Communication Technologies 2015
DFRWS 2015   DFRWS - USA
CSS 2015   The 7th International Symposium on Cyberspace Safety and Security (CSS 2015)
WiSec 2015   The 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks
IJCNC 2014   International Journal of Computer Networks & Communications
ISDF 2015   The Second International Conference on Information Security and Digital Forensics (ISDF2015)
MILCOM 2015   Military Communications Conference
ISPEC 2015   The 11th Information Security Practice and Experience Conference
SACPS 2015   The First International Workshop on Security Aspects of Cyber Physical Systems