posted by organizer: OlgaAngel || 2031 views || tracked by 5 users: [display]

CEWE 2015 : 3rd International Workshop on Cybercrimes and Emerging Web Environments

FacebookTwitterLinkedInGoogle

Link: http://computing.derby.ac.uk/wordpress/disys/cfp/cewe-2015/
 
When Oct 26, 2015 - Oct 28, 2015
Where Liverpool, UK
Submission Deadline Jul 31, 2015
Notification Due Aug 15, 2015
Final Version Due Sep 15, 2015
Categories    digital forensics   cybercrimes   information security   cyber threats
 

Call For Papers

The web has integrated innovative technologies in order to advance its services and accommodate future concepts and needs. It is considered an interactive and collaborative medium of the modern era. However, the constant and increased development of web services, transforms the web environments to playgrounds for fraudsters.

Cybercriminals are becoming increasingly adept at taking advantage of technology both to perform the criminal act and to avoid detection. While the use of computers and the Internet become even more popular, at the same time cybercriminals take advantage of existing and emerging vulnerabilities and increase their ways of attacking systems. It is believed that new types of crimes that involve computers and the web emerge on a constant basis.

The scope of this workshop is to provide an international forum for researchers and field experts to present and discuss Cybercrimes under the constantly emerging web environment. It also aims to explore the prevention, detection and investigation of Cybercrimes.

Topics
The main topic areas of interest include, but are not limited to the following:

- Electronic Fraud
- Intrusion detection systems
- Forensic techniques for the investigation of Cybercrimes
- Forensic imaging and volatile data
- Anti-Forensic emerging trends
- Information Security, Information Assurance and Security Management
- Cyber threats and future trends
- Risk assessment on information systems
- Incident response and investigation
- Malware trends, developments and forensic analysis
- Data mining and the malicious use of personal information
- Best practices and case studies
- Legal, policy and ethical issues related to Cybercrime prevention and investigation
- Security and forensics in social networks
- Cybercriminal profiling

Academics, researchers and industry practitioners are encouraged to submit original work, research papers, work-in-progress papers, case studies and experience reports.

Related Resources

IEETeL 2019   10th International workshop on Interactive Environments and Emerging Technologies for eLearning
ISDFS 2019   7th International Symposium on Digital Forensic and Security
VEE 2019   The 15th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments
IJCIS 2019   International Journal on Cryptography and Information Security
WI 2019   IEEE/WIC/ACM International Conference on Web Intelligence (main conference CfPs)
SPT-SN-IoT 2019   Special Issue Security, Privacy, and Trustworthiness of Sensor Networks and Internet of Things
HT 2019   30th ACM Conference on Hypertext and Social Media
IEEE--ICCT--Ei and Scopus 2019   2019 19th IEEE International Conference on Communication Technology (ICCT 2019)--Ei Compendex and Scopus
ICAETT 2019   International Conference on Advances in Emerging Trends and Technologies
IJNSA 2019   International Journal of Network Security & Its Applications- ERA, UGC Listed