posted by organizer: wmazurczyk || 9837 views || tracked by 3 users: [display]

IWCC 2017 : International Workshop on Cyber Crime

FacebookTwitterLinkedInGoogle

Link: https://www.ares-conference.eu/workshops/iwcc/
 
When Aug 29, 2017 - Sep 1, 2017
Where Reggio Calabria, Italy
Submission Deadline May 14, 2017
Notification Due May 26, 2017
Final Version Due Jun 20, 2017
Categories    cyber crime   cybersecurity   network security   information security
 

Call For Papers

CALL FOR PAPERS

The 6th International Workshop on Cyber Crime (IWCC 2017) to be held in
conjunction with the 12th International Conference on Availability,
Reliability and Security (ARES 2017 – http://www.ares-conference.eu)

August 29 - September 1, 2017, Reggio Calabria, Italy

CUING website:
https://www.ares-conference.eu/workshops/iwcc/

IMPORTANT DATES

Submission Deadline May 14, 2017
Author Notification May 26, 2017
Proceedings Version June 20, 2017
Conference August 29 - September 1, 2017

OVERVIEW

Today’s world’s societies are becoming more and more dependent on open
networks such as the Internet – where commercial activities, business
transactions and government services are realized. This has led to the
fast development of new cyber threats and numerous information security
issues which are exploited by cyber criminals. The inability to provide
trusted secure services in contemporary computer network technologies
has a tremendous socio-economic impact on global enterprises as well as
individuals.

Moreover, the frequently occurring international frauds impose the
necessity to conduct the investigation of facts spanning across multiple
international borders. Such examination is often subject to different
jurisdictions and legal systems. A good illustration of the above being
the Internet, which has made it easier to perpetrate traditional crimes.
It has acted as an alternate avenue for the criminals to conduct their
activities, and launch attacks with relative anonymity. The increased
complexity of the communications and the networking infrastructure is
making investigation of the crimes difficult. Traces of illegal digital
activities are often buried in large volumes of data, which are hard to
inspect with the aim of detecting offences and collecting evidence.
Nowadays, the digital crime scene functions like any other network, with
dedicated administrators functioning as the first responders.

This poses new challenges for law enforcement policies and forces the
computer societies to utilize digital forensics to combat the increasing
number of cybercrimes. Forensic professionals must be fully prepared in
order to be able to provide court admissible evidence. To make these
goals achievable, forensic techniques should keep pace with new
technologies.

The aim of this workshop is to bring together the research
accomplishments provided by the researchers from academia and the
industry. The other goal is to show the latest research results in the
field of digital forensics and to present the development of tools and
techniques, which assist the investigation process of potentially
illegal cyber activity. We encourage prospective authors to submit
related distinguished research papers on the subject of both:
theoretical approaches and practical case reviews.

TOPICS OF INTEREST COMPRISE BUT ARE NOT LIMITED TO:

- Criminal use of IoT e.g. IoT-based botnets
- Criminal to criminal (C2C) communications
- Criminal to victim (C2V) communications
- Anti-forensic techniques and methods
- Cybercrime related investigations
- Privacy issues in digital forensics
- Novel techniques in exploit kits
- Network anomalies detection
- Crime-as-a-service
- Mobile malware
- Identification, authentication and collection of digital evidence
- Steganography/steganalysis and covert/subliminal channels
- Incident response, investigation and evidence handling
- Political and business issues related to digital forensics and
anti-forensic techniques
- Novel applications of information hiding in networks
- Cybercrimes: evolution, new trends and detection
- Network traffic analysis, traceback and attribution
- Integrity of digital evidence and live investigations
- Ransomware: evolution, functioning, types, etc.
- Criminal abuse of clouds and social networks
- Watermarking and intellectual property theft


WORKSHOP CHAIRS

Artur Janicki
Warsaw University of Technology, Poland

Wojciech Mazurczyk
Warsaw University of Technology, Poland

Krzysztof Szczypiorski
Warsaw University of Technology, Poland

SUBMISSION

The submission guidelines valid for the IWCC workshop are the same as
for the ARES conference. They can be found
https://www.ares-conference.eu/conference/conference/submission/.

Submission of a paper implies that should the paper be accepted, at
least one of the authors will register and present the paper in the
conference.

Papers will be accepted based on peer review (3 per paper) and should
contain original, high quality work. All papers must be written in
English. Authors are invited to submit Regular Papers (maximum 6 pages)
via EasyChair. Papers accepted by the workshop will be published in the
Conference Proceedings of ARES 2017 that will be published by the
International Conference Proceedings Series published by ACM (ACM ICPS).

Related Resources

eCrime 2018   13th Symposium on Electronic Crime Research
MathSJ 2017   Applied Mathematics and Sciences: An International Journal
BDACCIP 2017   The First International Workshop on Big Data Analytic for Cyber Crime Investigation and Prevention
SoICT 2017   The Eighth International Symposium on Information and Communication Technology
ICCT-IEEE 2017   17th IEEE International Conference on Communication Technology(ICCT 2017)
ICDP 2017   8th IET International Conference on Imaging for Crime Detection and Prevention
AITIJ 2017   Advances in Interconnect Technologies: An International Journal
SI: Cyber Forensics&Threat Intelligence 2017   IEEE Transactions on Sustainable Computing SI on Sustainable Cyber Forensics and Threat Intelligence
TSEC-NextSecSociety 2017   Journal of Cyber Security Technology Special Issue on Secure Smart Society in Next Generation Networking Paradigm
ICSS 2017   3rd International Conference on Software Security