posted by user: slimrekhis || 3581 views || tracked by 11 users: [display]

ASIACCS SFCS 2014 : Second International Workshop on Security and Forensics in Communication Systems


When Jun 3, 2014 - Jun 3, 2014
Submission Deadline Mar 10, 2014
Notification Due Mar 22, 2014
Final Version Due Apr 8, 2014
Categories    cyber security   digital forensics   communication systems   information security

Call For Papers

Second International Workshop on Security and Forensics in Communication Systems (AISACCS-SFCS 2014)

In conjunction with the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS), Kyoto, Japan, June 4-6, 2014

Digital attacks are continuing to increase at an alarming rate. They target a wide variety of protocols and communication systems ranging from servers and end-user machines to wireless and mobile networks and devices. The absence of supporting evidence and technically sound methods may prevent administrators from: proving the identity of the guilty party, identifying the root vulnerability to prevent a future occurrence of a similar incident, and understanding the attacker’s motivation for an efficient design of security solutions.

In this context, digital forensic engineering is emerging as a disciplined science in charge of developing novel scientific and theoretical methods, techniques, and approaches to collect, process, and analyze information retrieved from systems affected by security incidents to generate conclusive descriptions.

The SFCS 2014 Workshop will bring together researchers, scientists, engineers and practitioners involved in research in the fields of communication systems security and forensics, to present their latest research findings, ideas, and developments. The workshop will act as a forum for discussing open issues, and presenting original and unpublished research results and innovative ideas in the realm of security and digital forensics. We encourage contributions describing innovative work in the realm of security and digital forensics. Topics of interest include, but are not limited to:

- Formal and theoretical techniques of digital forensics
- Automated reasoning techniques of evidence analysis
- Evidentiary aspects of digital forensics
- Hypothetical reasoning in forensics and incident response
- Legal and security policy issues in digital forensics
- Development of investigation processes and security procedures
- Collaborative and distributed digital investigation
- Embedded and mobile devices forensics
- Evidence preservation, management, storage and reassembly
- Storage, memory, and file system forensics
- Anti-forensics and anti-anti forensics prevention detection and analysis
- Forensic and security techniques in wireless and mobile communication systems
- Incident response techniques in networks and communication systems
- Malware forensics techniques
- Techniques for tracking and trace-back of attacks in systems and networks
- Data hiding, extraction, and recovery techniques
- Steganography, watermarking, security, and forensic techniques in multimedia content processing
- Forensic and security aspects in e-services, e-government, e-learning, e-voting, and m-commerce applications
- Social networks security and forensics
- Lightweight forensic techniques
- Forensics in distributed, virtual, and cloud environment
- Forensics in digital healthcare systems and applications
- Large-scale investigations in large networks and Big Data
- Innovative forensics services
- Data visualization in forensic analysis

Submissions must be written in English, and must be at most 10 pages excluding the bibliography and well-marked appendices, and at most 12 pages overall. Committee members are not required to read appendices, so the paper should be intelligible without them. Submissions must be in double-column ACMSIG Proceedings format (, both Option 1 and Option 2 on the page are fine) with page numbers. No changes to margins, spacing, or font sizes are allowed from those specified by the style file. We reserve the right to request the source files for a submission to verify compliance with this requirement. Only PDF files will be accepted.

All submissions must be anonymized. An author's name should occur only in references to that author's related work, which should be referenced in the third person and not overtly distinguishable from the referenced work of others. Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal, conference or workshop. Simultaneous submission of the same work is not allowed. Authors of accepted papers must guarantee that their papers will be presented at the workshop.

Accepted papers will be published by ACM Press as conference proceedings in USB thumb drives and in the ACM Digital Library.

Electronic submission site:

- Noureddine Boudriga, University of Carthage, Tunisia
- Slim Rekhis, University of Carthage, Tunisia

Alec Yasinsac, University of South Alabama beginning, USA
Amr Youssef, Concordia University, Canada
Donghoon Lee, Korea University, Korea
Frederic Cuppens, Télécom Bretagne, France
Giampaolo Bella, Università di Catania, Italy
Gritzalis Stefanos, University of the Aegean, Greece
Honggang Wang, University Massachusetts Dartmouth, USA
Kim-Kwang Raymond Choo, University of South Australia, Australia
Kwangjo Kim, Korea Advanced Institute of Science and Technology, Korea
Lejla Batina, Radboud University Nijmegen, Netherlands
Luigi Logrippo, Université du Québec en Outaouais, Canada
Michael Meier, University of Bonn, Germany
Melek Önen, EURECOM, France
Mohamed Younis, University of Maryland Baltimore County, USA
Peter Mueller, IBM Zurich Research Laboratory, Switzerland
Sabrina De Capitani di Vimercati, Università degli Studi di Milano, Italy
Simson Garfinkel, Naval Postgraduate School in Monterey, USA
Stelvio Cimato, University of Milan, Italy
Sunshin An, Korea University, Korea
Takashi Nishide, Kyushu University, Japan
Walid Abdallah, Military Aviation School of Borj Elamri, Tunisia
Wei Wei, Xi’an University of Technology, China
Wojciech Mazurczyk, Warsaw University of Technology, Poland
Yacine Challal, Compiègne University of Technology, France
Yacine Djemaiel, Institute of Technology in Communications at Tunis, Tunisia
Yahya Slimani, University of Manouba, Tunisia

Related Resources

ASIACCS 2020   ACM ASIACCS 2020 : The 15th ACM ASIA Conference on Computer and Communications Security
CSW 2021   2021 International Workshop on Cyber Security (CSW 2021)
ICoCNS 2021   2021 International Conference on Communication and Network Security (ICoCNS 2021)
ICISPP--IEEE, Ei, Scopus 2020   IEEE--2020 International Conference on Information Security and Privacy Protection (ICISPP 2020)--Ei Compendex, Scopus
JoWUA SI 2021   JoWUA Special Issue on Multidisciplinary Solutions to Modern Cybersecurity Challenges
IJCIS 2020   International Journal on Cryptography and Information Security
PerIoT 2020   Software Approaches to Improve the Performance of IoT Systems - Applied Sciences (IF 2.217)
SCIS 2020   4th IEEE Conference on Smart Cities and Innovative Systems
SCOPUS-CCISP 2020   The 5th International Conference on Communication, Image and Signal Processing (CCISP 2020)
IEEE--ICISPP--Ei Compendex, Scopus 2020   IEEE--2020 International Conference on Information Security and Privacy Protection (ICISPP 2020)--Ei Compendex, Scopus