posted by organizer: wmazurczyk || 2164 views || tracked by 8 users: [display]

IWCC 2015 : 4th International Workshop on Cyber Crime (IWCC 2015)


When Aug 24, 2015 - Aug 28, 2015
Where Toulouse, France
Submission Deadline Apr 20, 2015
Notification Due May 15, 2015
Final Version Due Jun 15, 2015
Categories    cyber crime   cybersecurity   network security   forensics

Call For Papers

4th International Workshop on Cyber Crime (IWCC 2015)
co-located with
10th International Conference on Availability, Reliability and Security (ARES 2015)

Universite Paul Sabatier
Toulouse, France
August 24- 28, 2015

All accepted papers will be published in a special issue of the Security and Communication Networks, Wiley or EURASIP Journal on Information Security.

IWCC Overview

Today's world's societies are becoming more and more dependent on open networks such as the Internet - where commercial activities, business transactions and government services are realized. This has led to the fast development of new cyber threats and numerous information security issues which are exploited by cyber criminals. The inability to provide trusted secure services in contemporary computer network technologies has a tremendous socio-economic impact on global enterprises as well as individuals.

Moreover, the frequently occurring international frauds impose the necessity to conduct the investigation of facts spanning across multiple international borders. Such examination is often subject to different jurisdictions and legal systems. A good illustration of the above being the Internet, which has made it easier to perpetrate traditional crimes. It has acted as an alternate avenue for the criminals to conduct their activities, and launch attacks with relative anonymity. The increased complexity of the communications and the networking infrastructure is making investigation of the crimes difficult. Traces of illegal digital activities are often buried in large volumes of data, which are hard to inspect with the aim of detecting offences and collecting evidence. Nowadays, the digital crime scene functions like any other network, with dedicated administrators functioning as the first responders.

This poses new challenges for law enforcement policies and forces the computer societies to utilize digital forensics to combat the increasing number of cybercrimes. Forensic professionals must be fully prepared in order to be able to provide court admissible evidence. To make these goals achievable, forensic techniques should keep pace with new technologies.

The aim of 4th International Workshop on Cyber Crime is to bring together the research accomplishments provided by the researchers from academia and the industry. The other goal is to show the latest research results in the field of digital forensics and to present the development of tools and techniques which assist the investigation process of potentially illegal cyber activity. We encourage prospective authors to submit related distinguished research papers on the subject of both: theoretical approaches and practical case reviews.

The workshop will be accessible to both non-experts interested in learning about this area and experts interesting in hearing about new research and approaches.

Topics of interest include, but are not limited to:
Cyber crimes: evolution, new trends and detection
Cyber crime related investigations
Computer and network forensics
Digital forensics tools and applications
Digital forensics case studies and best practices
Privacy issues in digital forensics
Network traffic analysis, traceback and attribution
Incident response, investigation and evidence handling
Integrity of digital evidence and live investigations
Identification, authentication and collection of digital evidence
Anti-forensic techniques and methods
Watermarking and intellectual property theft
Social networking forensics
Steganography/steganalysis and covert/subliminal channels
Network anomalies detection
Novel applications of information hiding in networks
Political and business issues related to digital forensics and anti-forensic techniques


Authors are invited to submit Papers will be accepted based on peer review (3 per paper) and should contain original, high quality work. All papers must be written in English. Authors are invited to submit their papers according the following guidelines: two columns, single-spaced, including figures and references, using 10 pt fonts and number each page.

Authors are invited to submit Regular Papers (maximum 8 pages) via EasyChair ( Papers accepted by the workshop will be published in the Conference Proceedings published by IEEE Computer Society Press. Failure to adhere to the page limit and formatting requirements will be grounds for rejection.

Submission of a paper implies that should the paper be accepted, at least one of the authors will register and present the paper in the conference.


April 20, 2015: Regular Paper Submission [submission link:]
May 15, 2015: Notification Date
June 15, 2015: Camera-Ready Paper Deadline

Wojciech Mazurczyk, Warsaw University of Technology, Poland
Krzysztof Szczypiorski, Warsaw University of Technology, Poland
Artur Janicki, Warsaw University of Technology, Poland (Publicity and Publication Chair)

Contact IWCC 2015 Chair using this email address:

Related Resources

IWCC 2016   International Workshop on Cyber Crime
AIP Special Issue 2016   Journal Acta Informatica Pragensia - Special Issue on Systems
CPSSC 2016   1st International Workshop on Cyber-Physical Systems in the Context of Smart Cities
IJMSA 2016   International Journal of Modelling, Simulation and Applications
CPSCom 2016   The 9th IEEE International Conference on Cyber, Physical and Social Computing
ORAJ 2016   Operations Research and Applications: An International Journal
ECCWS 2017   16th European Conference on Cyber Warfare and SecurityECCWS 2017
SI: Digital Forensics 2017   Call for Papers for Special Issue on Digital Forensics for IEEE S&P magazine
CyberSec 2017   The Fifth International Conference on Cyber Security, Cyber Welfare and Digital Forensic
NCS 2016   Eighth International Conference on Network and Communications Security