posted by organizer: slimrekhis || 4289 views || tracked by 10 users: [display]

SFCS 2016 : Fourth International Workshop on Security and Forensics in Cyber Space (SFCS 2016)


When Jan 4, 2016 - Jan 6, 2016
Where Singapore
Submission Deadline Oct 16, 2015
Notification Due Nov 13, 2015
Final Version Due Nov 23, 2015
Categories    cyber security   communication   forensics   investigation

Call For Papers

Call for Papers
Fourth International Workshop on Security and Forensics in Cyber Space (SFCS 2016), In conjunction with 17th International Conference on Distributed Computing and Networking (ICDCN 2016)
Singapore, January 4-6, 2016


With the continuous growth of cyber connectivity and the ever increasing number of applications, remotely delivered services, and networked systems have required the need for digital security. Today, more and more government agencies, financial institutions, and business enterprises are experiencing security incidents and cyber-crimes, by which attackers could generate fraudulent financial transactions, commit crimes, perform an industrial espionage, and disrupt the business processes.

The sophistication and the borderless nature of the intrusion techniques used during a cyber security incident, have triggered the need for designing new active cyber defense solutions, and developing efficient incident response plans. In this context, digital forensics has emerged as a disciplined science allowing to note and collect evidences left on the compromised system prior to the incident occurrence, and carry out an analysis to: (a) understand what occurred; (b) determine the set of exploited security weaknesses; (c) trace attackers to their source; (d) study the attackers trends and motives; and (e) propose a set of optimal countermeasures to stop and mitigate the effect of the attacks.

The fourth edition of the international workshop on Security and Forensics in Cyber Space (SFCS 2016) will be held in conjunction with the 17th International Conference on Distributed Computing and Networking (ICDCN 2016). The workshop promotes research and innovative ideas in the realm of cyber security and digital forensics. It provides a prominent venue for researchers, scientists, engineers and practitioners to share their thoughts, exchange ideas, and prospect future and potential axes of collaboration. Papers focusing on any aspect of the theory and practice of cyber security, defense, and digital forensics are solicited. A large spectrum of advanced topics are covered, ranging from anti-forensics detection and recovery, cyber security and forensic in wireless and mobile communication systems, multimedia security and forensic content processing, development of novel theories and techniques of cyber security and forensics analysis and validation, and forensics in cloud computing and social networks.

The workshop will act as a forum for discussing open issues, and presenting original and unpublished research results and innovative ideas in the realm of security and digital forensics. We encourage contributions describing innovative work in the realm of security and digital forensics. Topics of interest include, but are not limited to:

- Formal and theoretical techniques of cyber security and forensics
- Legal and policy issues in cyber security and defense
- Availability, privacy, authentication, trust, access control, and key management
- Social networks security
- Incident response techniques in networked and distributed systems
- Security and privacy in wireless and mobile systems
- Cyber security engineering
- Risk analysis and management in cyber security
- Critical infrastructures security
- Storage systems protection and forensics
- Economic and management aspects of cyber security and privacy
- Automated reasoning techniques of incidents and evidence analysis
- Evidentiary aspects and forensics of digital crimes
- Cybercrime scenarios modeling, analysis, and investigation
- Hypothetical reasoning in forensics and incident response
- Collaborative and distributed techniques for cyber defense and cyber investigation
- Active, adaptive, and intelligent defense systems
- Embedded devices forensics
- Evidence preservation, management, storage and reassembly
- Anti-forensics and anti-anti forensics prevention, detection, and analysis
- Multimedia security and forensics
- Lightweight forensic techniques
- Large-scale investigations in large networks and Big Data
- Innovative forensic services
- Data visualization in forensic analysis
- Vulnerability analysis and assessment of cloud services
- Techniques for tracking and trace-back of attacks in networked and distributed systems
- Data hiding, extraction, and recovery technique
- Security and forensics in distributed, virtual, and cloud environments
- Cyber security and forensic architectures
- Defense in depth
- Cybersecurity of Industrial Control Systems
- Cyber physical systems security
- Bio-inspired security

ICDCN-SFCS 2016 will be soliciting regular research papers. At least one author of each accepted paper must register for the conference and present the paper.

Regular papers should not exceed 6 pages double column, including figures, tables and references, in accordance with the ACM author guidelines. The ACM LaTeX and Microsoft Word templates, as well as related information, can be found at the ACM website ( No changes to margins, spacing, or font sizes are allowed from those specified by the style files. The proceedings of the workshop will be published in the ACM Digital library.

All submissions must be made electronically in printable pdf form via the EasyChair submission management system.

Important Dates
Paper Submission Deadline (extended): October 16, 2015 (23:59:00 UTC)
Paper Notification: November 13, 2015
Camera Ready Submission Deadline: November 23, 2015
Author Registration Deadline: November 23, 2015

- Noureddine Boudriga, University of Carthage, Tunisia
- Slim Rekhis, University of Carthage, Tunisia

- Amr Youssef, Concordia University, Canada
- Helge Janicke, De Montfort University, UK
- Giampaolo Bella, Università di Catania, Italy
- Krzysztof Szczypiorski, Warsaw University of Technology, Poland
- Peter Mueller, IBM Zurich Research Laboratory, Switzerland
- Raymond Choo, University of South Australia, Australia
- Michael Losavio, University of Louisville, USA
- Raymond Choo, University of South Australia, Australia
- Sabrina De Capitani di Vimercati, Università degli Studi di Milano, Italy
- Stefanos Gritzalis, University of the Aegean, Greece
- Sunshin An, Korea University, Korea
- Vassil Roussev, University of New Orleans, USA
- Walid Abdallah, Military Aviation School of Borj Elamri, Tunisia
- Wojciech Mazurczyk, Warsaw University of Technology, Poland
- Yacine Djemaiel, Institute of Technology in Communications at Tunis, Tunisia

Related Resources

BDACCIP 2022   The 6th International Workshop on Big Data Analytic for Cyber Crime Investigation and Prevention
ACM-Ei/Scopus-MLBDM 2022   2022 2nd International Conference on Machine Learning and Big Data Management(MLBDM 2022)-EI Compendex
SI on AdCTI 2022   Special Issue on Advances in Cyber Threat Intelligence 2022, Security and Communication Networks, Wiley & Hindawi
IJWesT 2022   International Journal of Web & Semantic Technology
EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications
CyberHunt 2022   IEEE BigData Workshop on Cyber Threat Intelligence and Hunting
ICSS 2022   8th International Conference on Software Security
ACITY 2022   12th International Conference on Advances in Computing and Information Technology
EICC 2023   European Interdisciplinary Cybersecurity Conference (EICC 2023)
ICCWS 2023   18th International Conference on Cyber Warfare and Security