posted by user: slimrekhis || 2137 views || tracked by 9 users: [display]

ASIACCS SFCS 2014 : Second International Workshop on Security and Forensics in Communication Systems

FacebookTwitterLinkedInGoogle

Link: https://sites.google.com/site/sfcs14/
 
When Jun 3, 2014 - Jun 3, 2014
Where KYOTO, JAPAN
Submission Deadline Mar 10, 2014
Notification Due Mar 22, 2014
Final Version Due Apr 8, 2014
Categories    cyber security   digital forensics   communication systems   information security
 

Call For Papers

Second International Workshop on Security and Forensics in Communication Systems (AISACCS-SFCS 2014)

In conjunction with the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS), Kyoto, Japan, June 4-6, 2014

Digital attacks are continuing to increase at an alarming rate. They target a wide variety of protocols and communication systems ranging from servers and end-user machines to wireless and mobile networks and devices. The absence of supporting evidence and technically sound methods may prevent administrators from: proving the identity of the guilty party, identifying the root vulnerability to prevent a future occurrence of a similar incident, and understanding the attacker’s motivation for an efficient design of security solutions.

In this context, digital forensic engineering is emerging as a disciplined science in charge of developing novel scientific and theoretical methods, techniques, and approaches to collect, process, and analyze information retrieved from systems affected by security incidents to generate conclusive descriptions.

The SFCS 2014 Workshop will bring together researchers, scientists, engineers and practitioners involved in research in the fields of communication systems security and forensics, to present their latest research findings, ideas, and developments. The workshop will act as a forum for discussing open issues, and presenting original and unpublished research results and innovative ideas in the realm of security and digital forensics. We encourage contributions describing innovative work in the realm of security and digital forensics. Topics of interest include, but are not limited to:

- Formal and theoretical techniques of digital forensics
- Automated reasoning techniques of evidence analysis
- Evidentiary aspects of digital forensics
- Hypothetical reasoning in forensics and incident response
- Legal and security policy issues in digital forensics
- Development of investigation processes and security procedures
- Collaborative and distributed digital investigation
- Embedded and mobile devices forensics
- Evidence preservation, management, storage and reassembly
- Storage, memory, and file system forensics
- Anti-forensics and anti-anti forensics prevention detection and analysis
- Forensic and security techniques in wireless and mobile communication systems
- Incident response techniques in networks and communication systems
- Malware forensics techniques
- Techniques for tracking and trace-back of attacks in systems and networks
- Data hiding, extraction, and recovery techniques
- Steganography, watermarking, security, and forensic techniques in multimedia content processing
- Forensic and security aspects in e-services, e-government, e-learning, e-voting, and m-commerce applications
- Social networks security and forensics
- Lightweight forensic techniques
- Forensics in distributed, virtual, and cloud environment
- Forensics in digital healthcare systems and applications
- Large-scale investigations in large networks and Big Data
- Innovative forensics services
- Data visualization in forensic analysis

Submissions must be written in English, and must be at most 10 pages excluding the bibliography and well-marked appendices, and at most 12 pages overall. Committee members are not required to read appendices, so the paper should be intelligible without them. Submissions must be in double-column ACMSIG Proceedings format (http://www.acm.org/sigs/publications/proceedings-templates), both Option 1 and Option 2 on the page are fine) with page numbers. No changes to margins, spacing, or font sizes are allowed from those specified by the style file. We reserve the right to request the source files for a submission to verify compliance with this requirement. Only PDF files will be accepted.

All submissions must be anonymized. An author's name should occur only in references to that author's related work, which should be referenced in the third person and not overtly distinguishable from the referenced work of others. Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal, conference or workshop. Simultaneous submission of the same work is not allowed. Authors of accepted papers must guarantee that their papers will be presented at the workshop.

Accepted papers will be published by ACM Press as conference proceedings in USB thumb drives and in the ACM Digital Library.

Electronic submission site: https://www.easychair.org/conferences/?conf=asiaccssfcs2014

WORKSHOP CHAIRS
---------------------------------
- Noureddine Boudriga, University of Carthage, Tunisia
- Slim Rekhis, University of Carthage, Tunisia

PROGRAM COMMITTEE
-------------------------------------
Alec Yasinsac, University of South Alabama beginning, USA
Amr Youssef, Concordia University, Canada
Donghoon Lee, Korea University, Korea
Frederic Cuppens, Télécom Bretagne, France
Giampaolo Bella, Università di Catania, Italy
Gritzalis Stefanos, University of the Aegean, Greece
Honggang Wang, University Massachusetts Dartmouth, USA
Kim-Kwang Raymond Choo, University of South Australia, Australia
Kwangjo Kim, Korea Advanced Institute of Science and Technology, Korea
Lejla Batina, Radboud University Nijmegen, Netherlands
Luigi Logrippo, Université du Québec en Outaouais, Canada
Michael Meier, University of Bonn, Germany
Melek Önen, EURECOM, France
Mohamed Younis, University of Maryland Baltimore County, USA
Peter Mueller, IBM Zurich Research Laboratory, Switzerland
Sabrina De Capitani di Vimercati, Università degli Studi di Milano, Italy
Simson Garfinkel, Naval Postgraduate School in Monterey, USA
Stelvio Cimato, University of Milan, Italy
Sunshin An, Korea University, Korea
Takashi Nishide, Kyushu University, Japan
Walid Abdallah, Military Aviation School of Borj Elamri, Tunisia
Wei Wei, Xi’an University of Technology, China
Wojciech Mazurczyk, Warsaw University of Technology, Poland
Yacine Challal, Compiègne University of Technology, France
Yacine Djemaiel, Institute of Technology in Communications at Tunis, Tunisia
Yahya Slimani, University of Manouba, Tunisia

Related Resources

AsiaCCS 2017   Call for paper: ACM Asia Conference on Computer and Communications Security
EuropeanSeC 2017   2017 European Security Conference
MobiSec 2017   Special Issue on Mobile Systems, Mobile Networks and Mobile Cloud: Security, Privacy and Digital Forensics
CyberSec 2017   The Fifth International Conference on Cyber Security, Cyber Welfare and Digital Forensic
SI: Digital Forensics 2017   Call for Papers for Special Issue on Digital Forensics for IEEE S&P magazine
ICCT 2017   17th IEEE International Conference on Communication Technology(ICCT 2017)-IEEE Xplore, Ei Compendex
ICISIP 2017   The 5th IIAE International Conference on Intelligent Systems and Image Processing 2017
TDSC-PSCE 2017   Special Issue on Paradigm Shifts in Cryptographic Engineering -- IEEE Transactions on Dependable and Secure Computing
ICCT-IEEE 2017   17th IEEE International Conference on Communication Technology(ICCT 2017)
CTI 2017   Cyber Threat Intelligence - Springer Book Chapter