| |||||||||||||||
IEEE-WCNC-SFCS 2019 : IEEE Fifth international workshop on Security and Forensics in Cyber Space | |||||||||||||||
Link: https://sites.google.com/view/ieee-wcnc-sfcs | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
[Apologies if you receive multiple copies of this message]
========================================================================= Call for Papers ========================================================================= IEEE Fifth international workshop on Security and Forensics in Cyber Space (SFCS 2019) In conjunction with IEEE Wireless Communications and Networking Conference (WCNC 2019) 15-18 April 2019, Marrakech, Morocco https://sites.google.com/view/ieee-wcnc-sfcs Cyber attacks are continuing to increase at an alarming rate, especially with the ever increasing nature of cyber connectivity. They target a wide variety of protocols and communication systems ranging from servers and end-user machines to wireless and mobile networks and devices. The absence of active cyber defense and strategy, and technically sound forensic methods may prevent administrators from making suitable decisions on time against threats, proving the identity of the guilty party, identifying the root vulnerability to prevent a future occurrence of a similar incident, and understanding the attacker’s motivation for an efficient design of cyber security solutions. In this context, digital forensic engineering is emerging as a disciplined science in charge of developing novel scientific and theoretical methods, techniques, and approaches to collect, process, and analyze information retrieved from systems affected by security incidents to generate conclusive descriptions. The fifth edition of the SFCS 2019 workshop will bring together researchers, scientists, engineers and practitioners involved in research in the fields of communication systems security and forensics, to present their latest research findings, ideas, and developments. The workshop will act as a forum for discussing open issues, and presenting original and unpublished research results and innovative ideas in the realm of security and digital forensics. We encourage contributions describing innovative work in the realm of cyber security, cyber defense, and digital forensics. Topics of interest include, but are not limited to: - Formal and theoretical techniques of cyber security and forensics - Legal and policy issues in cyber security and defense - Availability, privacy, authentication, trust, access control, and key management - Social networks security and forensics - Intrusion Detection - Incident response techniques in networked and distributed systems - Security and privacy in wireless and mobile systems - Cyber security engineering - Risk analysis and management in cyber security - Storage systems protection and forensics - Economic and management aspects of cyber security and privacy - Automated reasoning techniques of incidents and evidence analysis - Evidentiary aspects and forensics of digital crimes - Cyber scenarios modeling, analysis, and investigation - Hypothetical reasoning in forensics and incident response - Collaborative and distributed techniques for cyber defense and cyber investigation - Active, adaptive, and intelligent defense systems - Embedded security and device forensics - Evidence preservation, management, storage and reassembly - Anti-forensics and anti-anti forensics prevention, detection, and analysis - Multimedia security and forensics - Lightweight security techniques - Large-scale security and investigation in large networks and Big Data - Innovative forensic services - Data visualization in forensic analysis - Vulnerability analysis and assessment of cloud services - Techniques for tracking and trace-back of attacks in networked and distributed systems - Data hiding, extraction, and recovery technique - Security and forensics in distributed, virtual, and cloud environments - Cyber security architectures - Defense in depth - Cybersecurity of Industrial Control Systems and Cyber physical systems - Security and forensics of critical infrastructures - Supervisory control and data acquisition security - Bio-inspired security - Security of Application-oriented solutions (Healthcare, Military, Supply Chains, Environment, Agriculture, Smart cities, Education, ...) ========================================================================= Initial Papers Submission Guidelines ========================================================================= All submissions should be written in English with a maximum paper length of eight (8) printed pages (10-point font) including figures. The papers exceeding 6 pages will be subject to an additional 100€ fee/page. Papers exceeding 8 pages will not be accepted at EDAS. All papers should be formatted in conformance with the IEEE Manuscript Templates for Conference Proceedings and should be submitted via EDAS (http://edas.info/N25659). Papers are reviewed on the basis that they do not contain plagiarized material and have not been submitted to any other conference at the same time (double submission). These matters are taken very seriously and the IEEE Communications society will take action against any author who has engaged in either practice. Authors of accepted papers must guarantee that their papers will be presented at the workshop. To ensure appropriate consideration of conflicts of interest during the review process, changes to the list of authors once a paper has been submitted for review during review, revision, or (if accepted) final publication are not allowed. The author list may be changed only prior to the submission deadline. ========================================================================= Important Dates ========================================================================= Paper Submission Deadline: 30 January 2019 Acceptance/Rejection Notification: 15 February 2019 Camera Ready Submission Deadline: 1 March 2019 Workshop date: 15 April 2019 ========================================================================= Organizing Committee ========================================================================= General Chairs ----------------------------------- - Noureddine Boudriga, University of Carthage, Tunisia - Slim Rekhis, University of Carthage, Tunisia Technical Program Committee ------------------------------ Andrew Marrington, Zayed University, UAE Antoine Bagula, University of the Western Cape, South Africa Bruno Miguel Silva, University of Beira Interior, Portugal Cosimo Anglano, Universitá del Piemonte Oriental, Italy Gritzalis Stefanos, University of the Aegean, Greece Harald Baier, Hochschule Darmstadt / CRISP, Germany Helge Janicke, De Montfort University, United Kingdom Hervé Debar, Telecom SudParis, France Jong-Hoon Kim, Kent State University, USA Krzysztof Szczypiorski, Warsaw University of Technology, Poland Lamia Chaari, University of Sfax, Tunisia Michael Losavio, University of Louisville, USA Sabrina De Capitani di Vimercati, Università degli Studi di Milano, Italy Sami Habib, Kuwait University, Kuwait Stelvio Cimato, University of Milan, Italy Walid Abdallah, Military Aviation School of Borj Elamri, Tunisia Wojciech Mazurczyk, Warsaw University of Technology, Poland Yacine Djemaiel, Institute of Technology in Communications at Tunis, Tunisia |
|