posted by user: wmazurczyk || 2866 views || tracked by 21 users: [display]

SI ANTE 2013 : Special Issue on Network forensics and challenges for cyber-security of Annals of Telecommunications (JCR Journal)

FacebookTwitterLinkedInGoogle

Link: http://www.annales-des-telecommunications.com/archive/107/CfP_cyber_security.pdf
 
When N/A
Where N/A
Submission Deadline Mar 15, 2013
Notification Due Jul 15, 2013
Categories    cyber security   network security   network forensics   steganography
 

Call For Papers

Final and firm deadline: 15th March 2013

Journal Annals of telecommunications - published by Springer, indexed in ISI and Scopus Databases

Societies in today’s world are becoming more and more dependent on open networks such as the Internet where commercial activities, business transactions and government services are realized. This has led to the fast development of new cyber threats and information security issues which are utilized by cyber criminals. Mistrust for telecommunications and computer network technologies have tremendous socio-economic impacts on global enterprises as well as individuals.

Moreover, the occurrence of international frauds often requires the investigation of facts that cross international borders. They are also often subject to different jurisdictions and legal systems. The increased complexity of the communication and networking infrastructure is making investigation of the crimes difficult. Clues of illegal digital activities are often buried in large volumes of data that are hard to inspect in order to detect crimes and collect evidence.

This poses new challenges for law enforcement and forces computer societies to utilize digital forensics to combat the growing number of cybercrimes. Forensic professionals need to be fully prepared in order to be able to provide effective evidence. To achieve these goals forensic techniques must keep pace with new technologies. That is why the field of digital forensics is becoming more and more important for law enforcement, information and network security. Network forensics is a newly emerged research area, and its importance has attracted a great attention among computer professionals, law enforcement, and practitioners. It is a multidisciplinary area that includes multiple fields i.e.: law, computer science, finance, networking, data mining, and criminal justice. However, network forensics still faces diverse challenges and issues in terms of the efficiency of digital evidence processing and the related forensic procedures.

This special issue presents some of the most relevant ongoing research in network forensics and cyber-security fields. Topics include, but are not limited to the following:
• Network forensics tools, applications, case studies and best practices;
• Formal standards, procedures or methods in network forensics;
• Networking incidents response, investigation and evidence handling;
• Integrity of digital evidence and live investigations;
• Identification, authentication and collection of digital evidence;
• Cyber crimes design, detection & investigation;
• Anti-forensics techniques and methods;
• Social networking forensics;
• Watermarking and intellectual property theft;
• Steganography/steganalysis and covert/subliminal channels in network forensics.

Guest Editors
- Wojciech Mazurczyk, Warsaw University of Technology, Poland
- Krzysztof Szczypiorski, Warsaw University of Technology, Poland
- Yali Liu, AT&T Labs, USA
- Hui Tian, National Huaqiao University, China

Papers must be written in English and describe original research not published or currently under review by other journals or conferences. The manuscripts are expected to be between 5,000 and 8,500 words (30,000 to 50,000 characters including spaces). All relevant papers submitted will go through an external review process. Submissions should be sent according to the instructions available at:
http://www.annals-of-telecommunications.com/p_en_publish_6.html

Proposed schedule
- Manuscript submission: March 15th, 2013
- Online with DOI: As soon as accepted
- Expected publication: March-June 2014

Related Resources

InfoSec 2014   The International Conference on Information Security and Cyber Forensics (InfoSec 2014)
ICIEIS 2014   The Third International Conference on Informatics Engineering and Information Science
ICCICS 2014   The International Conference on Cyber-Crime Investigation and Cyber Security (ICCICS2014)
IGI Global 2015   Call for Chapters: Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare
VizSec 2014   Visualization for Cyber Security 2014
ISMH 2015   Information Security Management Handbook, 2015 Edition
ISDF 2014   The International Conference in Information, Security, and Digital Forensics (ISDF2014)
IEEE SysCon 2015   IEEE International Systems Conference
IJCI 2014   International Journal on Cybernetics & Informatics
Security and Privacy in UC 2014   Computer Communications Journal, Special Issue on: Security and Privacy in Unified Communications: Challenges and Solutions