SFCS 2014 - Second international workshop on Security and Forensics in Communication Systems (ASIACCS-SFCS2014)
Topics/Call fo Papers
Digital attacks are continuing to increase at an alarming rate. They target a wide variety of protocols and communication systems ranging from servers and end-user machines to wireless and mobile networks and devices. The absence of supporting evidence and technically sound methods may prevent administrators from: proving the identity of the guilty party, identifying the root vulnerability to prevent a future occurrence of a similar incident, and understanding the attacker’s motivation for an efficient design of security solutions.
In this context, digital forensic engineering is emerging as a disciplined science in charge of developing novel scientific and theoretical methods, techniques, and approaches to collect, process, and analyze information retrieved from systems affected by security incidents to generate conclusive descriptions.
The SFCS 2014 Workshop will be held in conjunction with the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS). It will bring together researchers, scientists, engineers and practitioners involved in research in the fields of communication systems security and forensics, to present their latest research findings, ideas, and developments. The workshop will act as a forum for discussing open issues, and presenting original and unpublished research results and innovative ideas in the realm of security and digital forensics. We encourage contributions describing innovative work in the realm of security and digital forensics. Topics of interest include, but are not limited to:
Formal and theoretical techniques of digital forensics
Automated reasoning techniques of evidence analysis
Evidentiary aspects of digital forensics
Hypothetical reasoning in forensics and incident response
Legal and security policy issues in digital forensics
Development of investigation processes and security procedures
Collaborative and distributed digital investigation
Embedded and mobile devices forensics
Evidence preservation, management, storage and reassembly
Storage, memory, and file system forensics
Anti-forensics and anti-anti forensics prevention detection and analysis
Forensic and security techniques in wireless and mobile communication systems
Incident response techniques in networks and communication systems
Malware forensics techniques
Techniques for tracking and trace-back of attacks in systems and networks
Data hiding, extraction, and recovery techniques
Steganography, watermarking, security, and forensic techniques in multimedia content processing
Forensic and security aspects in e-services, e-government, e-learning, e-voting, and m-commerce applications
Social networks security and forensics
Lightweight forensic techniques
Forensics in distributed, virtual, and cloud environment
Forensics in digital healthcare systems and applications
Large-scale investigations in large networks and Big Data
Innovative forensics services
Data visualization in forensic analysis
In this context, digital forensic engineering is emerging as a disciplined science in charge of developing novel scientific and theoretical methods, techniques, and approaches to collect, process, and analyze information retrieved from systems affected by security incidents to generate conclusive descriptions.
The SFCS 2014 Workshop will be held in conjunction with the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS). It will bring together researchers, scientists, engineers and practitioners involved in research in the fields of communication systems security and forensics, to present their latest research findings, ideas, and developments. The workshop will act as a forum for discussing open issues, and presenting original and unpublished research results and innovative ideas in the realm of security and digital forensics. We encourage contributions describing innovative work in the realm of security and digital forensics. Topics of interest include, but are not limited to:
Formal and theoretical techniques of digital forensics
Automated reasoning techniques of evidence analysis
Evidentiary aspects of digital forensics
Hypothetical reasoning in forensics and incident response
Legal and security policy issues in digital forensics
Development of investigation processes and security procedures
Collaborative and distributed digital investigation
Embedded and mobile devices forensics
Evidence preservation, management, storage and reassembly
Storage, memory, and file system forensics
Anti-forensics and anti-anti forensics prevention detection and analysis
Forensic and security techniques in wireless and mobile communication systems
Incident response techniques in networks and communication systems
Malware forensics techniques
Techniques for tracking and trace-back of attacks in systems and networks
Data hiding, extraction, and recovery techniques
Steganography, watermarking, security, and forensic techniques in multimedia content processing
Forensic and security aspects in e-services, e-government, e-learning, e-voting, and m-commerce applications
Social networks security and forensics
Lightweight forensic techniques
Forensics in distributed, virtual, and cloud environment
Forensics in digital healthcare systems and applications
Large-scale investigations in large networks and Big Data
Innovative forensics services
Data visualization in forensic analysis
Other CFPs
- Asia Workshop on Security, Privacy and Dependability for Cyber Vehicle (AsiaCyCAR2014)
- The 2014 International Workshop on Security in Cloud Computing (SCC'14)
- The First International Workshop on Information Hiding and its Criteria for evaluation (IWIHC2014)
- 2014 ACM Asia Public Key Cryptography Workshop (ASIAPKC'14)
- Workshop on Visible Light Communication for Vehicular Networks (VLCVN 2014)
Last modified: 2014-01-18 21:53:59