posted by user: slimrekhis || 3861 views || tracked by 11 users: [display]

ASIACCS SFCS 2014 : Second International Workshop on Security and Forensics in Communication Systems


When Jun 3, 2014 - Jun 3, 2014
Submission Deadline Mar 10, 2014
Notification Due Mar 22, 2014
Final Version Due Apr 8, 2014
Categories    cyber security   digital forensics   communication systems   information security

Call For Papers

Second International Workshop on Security and Forensics in Communication Systems (AISACCS-SFCS 2014)

In conjunction with the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS), Kyoto, Japan, June 4-6, 2014

Digital attacks are continuing to increase at an alarming rate. They target a wide variety of protocols and communication systems ranging from servers and end-user machines to wireless and mobile networks and devices. The absence of supporting evidence and technically sound methods may prevent administrators from: proving the identity of the guilty party, identifying the root vulnerability to prevent a future occurrence of a similar incident, and understanding the attacker’s motivation for an efficient design of security solutions.

In this context, digital forensic engineering is emerging as a disciplined science in charge of developing novel scientific and theoretical methods, techniques, and approaches to collect, process, and analyze information retrieved from systems affected by security incidents to generate conclusive descriptions.

The SFCS 2014 Workshop will bring together researchers, scientists, engineers and practitioners involved in research in the fields of communication systems security and forensics, to present their latest research findings, ideas, and developments. The workshop will act as a forum for discussing open issues, and presenting original and unpublished research results and innovative ideas in the realm of security and digital forensics. We encourage contributions describing innovative work in the realm of security and digital forensics. Topics of interest include, but are not limited to:

- Formal and theoretical techniques of digital forensics
- Automated reasoning techniques of evidence analysis
- Evidentiary aspects of digital forensics
- Hypothetical reasoning in forensics and incident response
- Legal and security policy issues in digital forensics
- Development of investigation processes and security procedures
- Collaborative and distributed digital investigation
- Embedded and mobile devices forensics
- Evidence preservation, management, storage and reassembly
- Storage, memory, and file system forensics
- Anti-forensics and anti-anti forensics prevention detection and analysis
- Forensic and security techniques in wireless and mobile communication systems
- Incident response techniques in networks and communication systems
- Malware forensics techniques
- Techniques for tracking and trace-back of attacks in systems and networks
- Data hiding, extraction, and recovery techniques
- Steganography, watermarking, security, and forensic techniques in multimedia content processing
- Forensic and security aspects in e-services, e-government, e-learning, e-voting, and m-commerce applications
- Social networks security and forensics
- Lightweight forensic techniques
- Forensics in distributed, virtual, and cloud environment
- Forensics in digital healthcare systems and applications
- Large-scale investigations in large networks and Big Data
- Innovative forensics services
- Data visualization in forensic analysis

Submissions must be written in English, and must be at most 10 pages excluding the bibliography and well-marked appendices, and at most 12 pages overall. Committee members are not required to read appendices, so the paper should be intelligible without them. Submissions must be in double-column ACMSIG Proceedings format (, both Option 1 and Option 2 on the page are fine) with page numbers. No changes to margins, spacing, or font sizes are allowed from those specified by the style file. We reserve the right to request the source files for a submission to verify compliance with this requirement. Only PDF files will be accepted.

All submissions must be anonymized. An author's name should occur only in references to that author's related work, which should be referenced in the third person and not overtly distinguishable from the referenced work of others. Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal, conference or workshop. Simultaneous submission of the same work is not allowed. Authors of accepted papers must guarantee that their papers will be presented at the workshop.

Accepted papers will be published by ACM Press as conference proceedings in USB thumb drives and in the ACM Digital Library.

Electronic submission site:

- Noureddine Boudriga, University of Carthage, Tunisia
- Slim Rekhis, University of Carthage, Tunisia

Alec Yasinsac, University of South Alabama beginning, USA
Amr Youssef, Concordia University, Canada
Donghoon Lee, Korea University, Korea
Frederic Cuppens, Télécom Bretagne, France
Giampaolo Bella, Università di Catania, Italy
Gritzalis Stefanos, University of the Aegean, Greece
Honggang Wang, University Massachusetts Dartmouth, USA
Kim-Kwang Raymond Choo, University of South Australia, Australia
Kwangjo Kim, Korea Advanced Institute of Science and Technology, Korea
Lejla Batina, Radboud University Nijmegen, Netherlands
Luigi Logrippo, Université du Québec en Outaouais, Canada
Michael Meier, University of Bonn, Germany
Melek Önen, EURECOM, France
Mohamed Younis, University of Maryland Baltimore County, USA
Peter Mueller, IBM Zurich Research Laboratory, Switzerland
Sabrina De Capitani di Vimercati, Università degli Studi di Milano, Italy
Simson Garfinkel, Naval Postgraduate School in Monterey, USA
Stelvio Cimato, University of Milan, Italy
Sunshin An, Korea University, Korea
Takashi Nishide, Kyushu University, Japan
Walid Abdallah, Military Aviation School of Borj Elamri, Tunisia
Wei Wei, Xi’an University of Technology, China
Wojciech Mazurczyk, Warsaw University of Technology, Poland
Yacine Challal, Compiègne University of Technology, France
Yacine Djemaiel, Institute of Technology in Communications at Tunis, Tunisia
Yahya Slimani, University of Manouba, Tunisia

Related Resources

CYBER 2021   The Sixth International Conference on Cyber-Technologies and Cyber-Systems
Spec.Issue on Social Informatics: Scopus 2021   Journal of Social and Business Informatics - Acta Informatica Pragensia
EICC 2021   European Interdisciplinary Cybersecurity Conference (EICC 2021)
IJCIS 2021   International Journal on Cryptography and Information Security
SI: Advanced Technology for IE 2022   Special Issue: Secure and Advanced Technology for Intelligent Environments
IJASA 2021   The International Journal of Ambient Systems and applications
IoTSP 2021   Internet of Things Security and Privacy: Practical and Management Perspectives
JANT 2021   International Journal of Antennas
EMERGING 2021   The Thirteenth International Conference on Emerging Networks and Systems Intelligence
DMSE 2021   2nd International Conference on Data Mining and Software Engineering