ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

CCSI 2016 - International Workshop on Cyber Crime Scene Investigations

Date2016-08-15 - 2016-08-18

Deadline2016-03-27

VenueMontreal, Canada Canada

Keywords

Websitehttp://cs-conferences.acadiau.ca/fnc-16

Topics/Call fo Papers

Nowadays, cyber space is an integral part of human society. While it
provides significant convenience to our lives, it has also turned into
an attractive platform for crimes such as financial fraud, information
phishing, distributed denial of service attacks, and fake message or
rumor propagation. Security and privacy issues in cyber space have
become more and more imminent. The emergence of social networks and
cloud computing significantly increases the severeness and calls for
solutions. To fight against criminals in the cyber space requires no
less, if not more, intelligence than that needed for combating outlaws
in real life. It needs to involve multiple disciplines, such as
networking, information theory, mathematical modelling, data mining,
machine learning, image and voice processing, neural network, pattern
recognition, cryptography and forensic criminology. To facilitate the
study and contribute to the fight, the workshop aims to provide an
interdisciplinary venue that brings together researchers from relevant
fields to exchange their ideas and experiences as well as to build
collaborations.
Topics of interest include, but not limited to:
Anonymous system and forensics
IP traceback
Malware detection
Botnet identification
Networked video system
Biometric security and forensics
Emotion identification via video
Wireless forensics, security and privacy
Game theory in forensics, security and privacy
Data Mining in forensics, security and privacy
Forensics laws and policies
DDoS attacks
Virus source traceback
Malware source traceback
Botmaster traceback
Distributed systems and forensics
System security and forensics
Intrusion detection
Social networks forensics, security and privacy
Information theory in network security
Multimedia in network security

Last modified: 2015-10-27 22:51:21