posted by user: slimrekhis || 6893 views || tracked by 5 users: [display]

ISCC-SFCS 2015 : Third International Workshop on Security and Forensics in Communication Systems, in conjunction with The Twentieth IEEE Symposium on Computers and Communications

FacebookTwitterLinkedInGoogle

Link: https://sites.google.com/site/iscc15sfcs/
 
When Jun 6, 2015 - Jun 6, 2015
Where LARNACA, CYPRUS
Submission Deadline Apr 20, 2015
Notification Due Apr 27, 2015
Final Version Due May 4, 2015
Categories    security   communication   forensics   systems
 

Call For Papers

The ever increasing number of applications, remotely delivered services, and networked systems have required the need for digital security. Today, more and more companies are experiencing security incidents and cybercrimes, by which

attackers could generate fraudulent financial transactions, commit crimes, perform an industrial espionage, and disrupt the business processes.

The sophistication and the bordeless nature of the intrusion techniques used during a security incident, have triggered the need for developing efficient incident response plans. In this context, digital forensics has emerged as a

disciplined science allowing to note and collect evidences left on the compromised system during the postmortem analysis, and carry out an analysis to: (a) understand what occurred; (b) determine the set of exploited security

weaknesses; (c) trace attackers to their source; (d) study the attackers trends and motives; and (e) propose a set of optimal countermeasures to stop and mitigate the effect of the attacks.
The third edition of the international workshop on Security and Forensics in Communication Systems (SFCS 2015) will be held in conjunction with the Twentieth IEEE Symposium on Computers and Communications (ISCC 2015). It promotes

research and innovative ideas in the realm of security and digital forensics, and provides a prominent venue for researchers, scientists, engineers and practitioners to share their thoughts, exchange ideas, and prospect future and

potential axes of collaboration. Papers focusing on any aspect of the theory and practice of security and digital forensic science are solicited. A large spectrum of advanced topics are covered, ranging from anti-forensics detection and

recovery, protocols security and forensic in wireless and mobile communication systems, multimedia security and forensic content processing, development of novel theories and techniques of security and forensics analysis and validation,

and forensics in cloud computing and social networks.

The workshop will act as a forum for discussing open issues, and presenting original and unpublished research results and innovative ideas in the realm of security and digital forensics. We encourage contributions describing innovative

work in the realm of security and digital forensics. Topics of interest include, but are not limited to:

- Formal and theoretical techniques of communication security
- Legal and policy issues in security
- Availability, privacy, authentication, anonymity, trust, and access control
- Security aspects in e-services, e-government, e-learning, e-voting, and m-commerce applications
- Social networks security
- Incident response techniques in network and communication systems
- Mobile security
- Risk analysis and management in communication systems
- Infrastructure protection, and Virtual Private Networks security
- Storage systems protection and forensics
- Physical and Biometric security
- Security in networked and distributed systems
- Economic and management aspects of security and privacy

- Automated reasoning techniques of incidents and evidence analysis
- Evidentiary aspects of digital forensics
- Hypothetical reasoning in forensics and incident response
- Collaborative and distributed digital investigation
- Embedded devices forensics
- Evidence preservation, management, storage and reassembly
- Storage, memory, and file system forensics
- Anti-forensics and anti-anti forensics prevention detection and analysis
- Steganography, watermarking, and forensic techniques in multimedia content processing
- Lightweight forensic techniques
- Large-scale investigations in large networks and Big Data
- Innovative forensic services
- Data visualization in forensic analysis

- Intrusion Detection, incident response, and evidence handling
- Vulnerability analysis and assessment, and analysis of malware
- Techniques for tracking and trace-back of attacks in systems and networks
- Data hiding, extraction, and recovery technique
- Security and Forensics in distributed, virtual, and cloud environment
- Security and forensics in digital healthcare systems and applications
- Forensic and security techniques in wireless and mobile communication systems
- Development of investigation processes and security procedures
- Security and forensic architectures


Submissions must be written in English describing original work, and should be no more than 8 pages in the IEEE double column proceedings format including tables, figures and references. Note that accepted papers up to 6 pages will be

published with no additional charge. Exceeding pages will be charged an additional fee. Extended versions of selected best papers will be recommended for publication in a Special Issue of a prestigious International Journal.

Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal, conference or workshop. Simultaneous submission of the same work is not allowed. Authors of accepted

papers must guarantee that their papers will be presented at the workshop.

The Workshop Proceedings will be part of the ISCC 2015 Proceedings and will be available on IEEE Xplore. If the paper is accepted, at least one of the authors will be required to register and attend the symposium to present the paper in

order to include the paper in the conference proceedings. IEEE reserves the right to exclude a paper from distribution after the conference (e.g. removal from IEEE Xplore) if the paper is not presented at the conference.
Electronic submission can be done using the EDAS conference management system:
http://edas.info/newPaper.php?c=19757

Important Dates

Paper Submission Deadline: April 20, 2015
Acceptance/Rejection Notification: April 27, 2015
Camera Ready Submission Deadline: May 04, 2015
Workshop Date: July 06, 2015

WORKSHOP CHAIRS
------------------------------
- Noureddine Boudriga, University of Carthage, Tunisia
- Slim Rekhis, University of Carthage, Tunisia

PROGRAM COMMITTEE
------------------------------
Alec Yasinsac, University of South Alabama beginning, USA
Amr Youssef, Concordia University, Canada
Helge Janicke, De Montfort University, UK
Gritzalis Stefanos, University of the Aegean, Greece
Kwangjo Kim, KAIST University
Krzysztof Szczypiorski, Warsaw University of Technology, Poland
Raymond Choo, University of South Australia, Australia
Luigi Logrippo, Université du Québec en Outaouais, Canada
Michael Losavio, University of Louisville, USA
Mohamed Younis, University of Maryland Baltimore County, USA
Peter Mueller, IBM Zurich Research Laboratory, Switzerland
Sabrina De Capitani di Vimercati, Università degli Studi di Milano, Italy
Simson Garfinkel, National Institute of Standards and Technology, USA
Stelvio Cimato, University of Milan, Italy
Sunshin An, Korea University, Korea
Vassil Roussev, University of New Orleans, USA
Walid Abdallah, Military Aviation School of Borj Elamri, Tunisia
Wojciech Mazurczyk, Warsaw University of Technology, Poland
Yacine Challal, Compiègne University of Technology, France
Yacine Djemaiel, Institute of Technology in Communications at Tunis, Tunisia
Yahya Slimani, University of Manouba, Tunisia

Related Resources

ECCWS 2024   23rd European Conference on Cyber Warfare and Security
IEEE COINS 2024   IEEE COINS 2024 - London, UK - July 29-31 - Hybrid (In-Person & Virtual)
ICISS 2024   The 20th International Conference on Information Systems Security (ICISS-2024)
ACM-Ei/Scopus-CCISS 2024   2024 International Conference on Computing, Information Science and System (CCISS 2024)
Sensors journal 2024   Special Issue on Energy-Efficient Communication Networks and Systems: 2nd Eition
CSW 2024   2024 3rd International Conference on Cyber Security
ICCIS 2024   6th International Conference on Communication and Intelligent Systems
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
ISoIRS 2024   2024 4th International Symposium on Intelligent Robotics and Systems (ISoIRS 2024)
ICONSEC 2024   3rd International Conference On Cyber Security and Digital Forensics