Sign for Notice Everyday    Sign Up| Sign In| Link| English|

Our Sponsors

    Receive Latest News

    Feedburner
    Share Us


    IWCC 2012 - International Workshop on Cyber Crime (IWCC)

    View: 487

    Website http://stegano.net/iwcc/ | Want to Edit it Edit Freely

    Category IWCC 2012

    Deadline: June 15, 2012 | Date: October 03, 2012-October 05, 2012

    Venue/Country: Petersburg, Russia

    Updated: 2012-05-01 22:40:39 (GMT+9)

    Call For Papers - CFP

    Today's world's societies are becoming more and more dependent on open networks such as the Internet - where commercial activities, business transactions and government services are realized. This has led to the fast development of new cyber threats and numerous information security issues which are exploited by cyber criminals. The inability to provide trusted secure services in contemporary computer network technologies has a tremendous socio-economic impact on global enterprises as well as individuals.

    Moreover, the frequently occurring international frauds impose the necessity to conduct the investigation of facts spanning across multiple international borders. Such examination is often subject to different jurisdictions and legal systems. A good illustration of the above being the Internet, which has made it easier to perpetrate traditional crimes. It has acted as an alternate avenue for the criminals to conduct their activities, and launch attacks with relative anonymity. The increased complexity of the communications and the networking infrastructure is making investigation of the crimes difficult. Traces of illegal digital activities are often buried in large volumes of data, which are hard to inspect with the aim of detecting offences and collecting evidence. Nowadays, the digital crime scene functions like any other network, with dedicated administrators functioning as the first responders.

    This poses new challenges for law enforcement policies and forces the computer societies to utilize digital forensics to combat the increasing number of cybercrimes. Forensic professionals must be fully prepared in order to be able to provide court admissible evidence. To make these goals achievable, forensic techniques should keep pace with new technologies.

    The aim of this workshop is to bring together the research accomplishments provided by the researchers from academia and the industry. The other goal is to show the latest research results in the field of digital forensics and to present the development of tools and techniques which assist the investigation process of potentially illegal cyber activity. We encourage prospective authors to submit related distinguished research papers on the subject of both: theoretical approaches and practical case reviews.

    The workshop is an interesting supplement for ICUMT 2012 in area of security of communication networks. It is especially important because year 2011 has been named by mass media "the year of the hack" due to numerous accounts of data security breaches in private companies and governments. The amount of stolen data is estimated in petabytes. Large amount of the damage can be attributed to Operation Shady RAT or Duqu worm which is a successor of famous Stuxnet malware.

    This year's workshop's main theme is network forensics.

    Topics of interests include, but are not limited to:

    Cyber crimes: design and detection

    Cyber crime related investigations

    Digital forensics tools and applications

    Digital forensics case studies and best practices

    Formal standards, procedures and methods in digital forensics

    Privacy issues in digital forensics

    Steganography/steganalysis and covert/subliminal channels

    Network anomalies detection

    Novel applications of information hiding in networks

    Information hiding for multimedia services

    New methods for detecting and eliminating network steganography

    Localization of digital forensic techniques

    Computer and network forensics

    Network traffic analysis, traceback and attribution

    Incident response, investigation and evidence handling

    Integrity of digital evidence and live investigations

    Identification, authentication and collection of digital evidence

    Anti-forensic techniques and methods

    Watermarking and intellectual property theft

    Analysis techniques for digital forensics and information assurance research

    Social networking forensics

    Political and business issues related to digital forensics and anti-forensic techniques and methods

    Chairs

    Krzysztof Szczypiorski, Warsaw University of Technology, Poland (e-mail: ksz{at}tele.pw.edu.pl)

    Józef Lubacz, Warsaw University of Technology, Poland (e-mail: jl{at}tele.pw.edu.pl)

    Wojciech Mazurczyk, Warsaw University of Technology, Poland (e-mail: wmazurczyk{at}tele.pw.edu.pl)

    List of Program Committee members (tentative)

    Costas Constantinou, University of Birmingham, UK

    Nicolas T. Courtois, University College London, UK

    Jana Dittmann, Otto-von-Guericke University of Magdeburg, Germany

    Michael Fisk, University of California San Diego, USA

    Zeno Geradts, Digital Evidence R&D Netherlands Forensic Institute, The Hague, Netherlands

    Pavel Gladyshev, University College Dublin, Ireland

    Stefan Katzenbeisser, Technische Universität Darmstadt, Germany

    Jerzy Konorski, Gdansk University of Technology, Poland

    Igor Kotenko, Russian Academy of Sciences, Russia

    Zbigniew Kotulski, Warsaw University of Technology and IPPT PAN, Poland

    Christian Kraetzer, Otto-von-Guericke University of Magdeburg, Germany

    Deepa Kundur, Texas A&M University, USA

    Miroslaw Kutylowski, Wroclaw Universtity of Technology, Poland

    Ke Liao, Institute of Electronics, Chinese Academy of Sciences, China

    Guangjie Liu, Nanjing University of Science and Technology, China

    Josef Pieprzyk, Macquarie University, Australia

    Marcus K. Rogers, Purdue University, USA

    Vassil Roussev, University of New Orleans, USA

    Pedro Luis Prospero Sanchez, University of Sao Paulo, Sao Paulo, Brazil

    Janusz Stoklosa, Poznan University of Technology, Poland

    Hui Tian, National Huaqiao University, China

    Jinwei Wang, The 28th Research Institute of CETC, China

    Jozef Wozniak, Gdansk University of Technology, Poland

    Sebastian Zander, Swinburne University of Technology Melbourne, Australia

    Papers will be accepted based on peer review (3 per paper) and should contain original, high quality work. All papers must be written in English. Page length is limited to 8-pages in the IEEE double-column format with a font size no smaller than 10 points using IEEE Conference Proceeding templates (same as ICUMT 2012 template).


    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.