SFCS 2015 - 3th IEEE International Workshopp on Security and Forensics in Communication Systems
Topics/Call fo Papers
The ever increasing number of applications, remotely delivered services, and networked systems have required the need for digital security. Today, more and more companies are experiencing security incidents and cybercrimes, by which attackers could generate fraudulent financial transactions, commit crimes, perform an industrial espionage, and disrupt the business processes.
The sophistication and the bordeless nature of the intrusion techniques used during a security incident, have triggered the need for developing efficient incident response plans. In this context, digital forensics has emerged as a disciplined science allowing to note and collect evidences left on the compromised system prior to the incident occurrence, and carry out an analysis to: (a) understand what occurred; (b) determine the set of exploited security weaknesses; (c) trace attackers to their source; (d) study the attackers trends and motives; and (e) propose a set of optimal countermeasures to stop and mitigate the effect of the attacks.
The third edition of the international workshop on Security and Forensics in Communication Systems (SFCS 2015) will be held in conjunction with the Twentieth IEEE Symposium on Computers and Communications (ISCC 2015). It promotes research and innovative ideas in the realm of security and digital forensics, and provides a prominent venue for researchers, scientists, engineers and practitioners to share their thoughts, exchange ideas, and prospect future and potential axes of collaboration. Papers focusing on any aspect of the theory and practice of security and digital forensic science are solicited. A large spectrum of advanced topics are covered, ranging from anti-forensics detection and recovery, protocols security and forensic in wireless and mobile communication systems, multimedia security and forensic content processing, development of novel theories and techniques of security and forensics analysis and validation, and forensics in cloud computing and social networks.
The workshop will act as a forum for discussing open issues, and presenting original and unpublished research results and innovative ideas in the realm of security and digital forensics. We encourage contributions describing innovative work in the realm of security and digital forensics. Topics of interest include, but are not limited to:
Formal and theoretical techniques of communication security
Legal and policy issues in security
Availability, privacy, authentication, anonymity, trust, and access control
Security aspects in e-services, e-government, e-learning, e-voting, and m-commerce applications
Social networks security
Incident response techniques in network and communication systems
Mobile security
Risk analysis and management in communication systems
Infrastructure protection, and Virtual Private Networks security
Storage systems protection and forensics
Physical and Biometric security
Security in networked and distributed systems
Economic and management aspects of security and privacy
Automated reasoning techniques of incidents and evidence analysis
Evidentiary aspects of digital forensics
Hypothetical reasoning in forensics and incident response
Collaborative and distributed digital investigation
Embedded devices forensics
Evidence preservation, management, storage and reassembly
Storage, memory, and file system forensics
Anti-forensics and anti-anti forensics prevention detection and analysis
Steganography, watermarking, and forensic techniques in multimedia content processing
Lightweight forensic techniques
Large-scale investigations in large networks and Big Data
Innovative forensic services
Data visualization in forensic analysis
Intrusion Detection, incident response, and evidence handling
Vulnerability analysis and assessment, and analysis of malware
Techniques for tracking and trace-back of attacks in systems and networks
Data hiding, extraction, and recovery technique
Security and Forensics in distributed, virtual, and cloud environment
Security and forensics in digital healthcare systems and applications
Forensic and security techniques in wireless and mobile communication systems
Development of investigation processes and security procedures
Security and forensic architectures
The sophistication and the bordeless nature of the intrusion techniques used during a security incident, have triggered the need for developing efficient incident response plans. In this context, digital forensics has emerged as a disciplined science allowing to note and collect evidences left on the compromised system prior to the incident occurrence, and carry out an analysis to: (a) understand what occurred; (b) determine the set of exploited security weaknesses; (c) trace attackers to their source; (d) study the attackers trends and motives; and (e) propose a set of optimal countermeasures to stop and mitigate the effect of the attacks.
The third edition of the international workshop on Security and Forensics in Communication Systems (SFCS 2015) will be held in conjunction with the Twentieth IEEE Symposium on Computers and Communications (ISCC 2015). It promotes research and innovative ideas in the realm of security and digital forensics, and provides a prominent venue for researchers, scientists, engineers and practitioners to share their thoughts, exchange ideas, and prospect future and potential axes of collaboration. Papers focusing on any aspect of the theory and practice of security and digital forensic science are solicited. A large spectrum of advanced topics are covered, ranging from anti-forensics detection and recovery, protocols security and forensic in wireless and mobile communication systems, multimedia security and forensic content processing, development of novel theories and techniques of security and forensics analysis and validation, and forensics in cloud computing and social networks.
The workshop will act as a forum for discussing open issues, and presenting original and unpublished research results and innovative ideas in the realm of security and digital forensics. We encourage contributions describing innovative work in the realm of security and digital forensics. Topics of interest include, but are not limited to:
Formal and theoretical techniques of communication security
Legal and policy issues in security
Availability, privacy, authentication, anonymity, trust, and access control
Security aspects in e-services, e-government, e-learning, e-voting, and m-commerce applications
Social networks security
Incident response techniques in network and communication systems
Mobile security
Risk analysis and management in communication systems
Infrastructure protection, and Virtual Private Networks security
Storage systems protection and forensics
Physical and Biometric security
Security in networked and distributed systems
Economic and management aspects of security and privacy
Automated reasoning techniques of incidents and evidence analysis
Evidentiary aspects of digital forensics
Hypothetical reasoning in forensics and incident response
Collaborative and distributed digital investigation
Embedded devices forensics
Evidence preservation, management, storage and reassembly
Storage, memory, and file system forensics
Anti-forensics and anti-anti forensics prevention detection and analysis
Steganography, watermarking, and forensic techniques in multimedia content processing
Lightweight forensic techniques
Large-scale investigations in large networks and Big Data
Innovative forensic services
Data visualization in forensic analysis
Intrusion Detection, incident response, and evidence handling
Vulnerability analysis and assessment, and analysis of malware
Techniques for tracking and trace-back of attacks in systems and networks
Data hiding, extraction, and recovery technique
Security and Forensics in distributed, virtual, and cloud environment
Security and forensics in digital healthcare systems and applications
Forensic and security techniques in wireless and mobile communication systems
Development of investigation processes and security procedures
Security and forensic architectures
Other CFPs
- 3rd International Workshop on Smart City and Ubiquitous Computing Applications (SCUCA 2015)
- 第1回患者メンタル支援学会学術総会
- 第 13 回日本予防医学リスクマネージメント学会学術総会
- NCRISET- National Conference on Recent Innovations in Science, Engineering and Technology (NCRISET-2015)
- IRAJ-International Conference on Computer Science and Mechanical Engineering (ICCSME-2015)
Last modified: 2015-02-02 23:02:52