| |||||||||||||||
SFCS 2012 : First IEEE International Workshop on Security and Forensics in Communication Systems | |||||||||||||||
Link: http://sites.google.com/site/sfcs2012/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
First IEEE International Workshop on Security and Forensics in Communication Systems (SFCS 2012)
In conjunction with IEEE ICC 2012, Ottawa, Canada 10-15 June 2012 Digital attacks are continuing to increase at an alarming rate. They target a wide variety of protocols and communication systems ranging from servers and end-user machines to wireless and mobile networks and devices. The absence of supporting evidence and technically sound methods may prevent administrators from: proving the identity of the guilty party, identifying the root vulnerability to prevent a future occurrence of a similar incident, and understanding the attacker’s motivation for an efficient design of security solutions. In this context, digital forensic engineering is emerging as a disciplined science in charge of developing novel scientific and theoretical methods, techniques, and approaches to collect, process, and analyze information retrieved from systems affected by security incidents and generate conclusive descriptions. The SFCS 2012 Workshop will bring together researchers, scientists, engineers and practitioners involved in research in the fields of communication systems security and forensics, to present their latest research findings, ideas, and developments. Topics of interest include, but are not limited to: - Formal aspects of network security - Theoretical techniques of digital forensics - Embedded and handled devices forensic - Evidence preservation, management, storage, reassembly, and analysis - Anti-forensics prevention detection and analysis - Development of Investigation processes and procedures - Automated analysis of evidence - Forensics in multimedia and communication protocols - Security and Investigation techniques in wireless and mobile communication systems - Risk analysis and management in communication systems - Social networks security and forensics - Collaborative and distributed digital investigation - Hypothetical reasoning in forensics and incident response - Legal and policy issues in digital forensics - Intrusion Detection, incident response, and evidence handling - Vulnerability analysis and assessment, and analysis of malware - Cryptography and forensics techniques in multimedia communication - Data hiding, extraction, and recovery techniques - Techniques for Tracking and traceback of attacks in systems and networks - Availability, privacy, authentication, and anonymity - Secure e-services, e-government, e-learning, e-voting, and m-commerce applications - File systems memory analysis - Infrastructure protection, and Virtual Private Networks security - Storage system protection and forensics - Physical and Biometric security Authors are invited to submit papers representing original work, which must not be published previously or under consideration for publication elsewhere. All submissions should be written in English with a maximum paper length of five (5) printed pages (IEEE style), but one additional page is allowed with additional publication fee. All papers will be peer reviewed by TPC members and other experts in the field of security and digital forensics. A detailed description of papers submission procedure is available in the ICC 2012 web site. Papers submission is handled via EDAS. WORKSHOP CHAIRS --------------------------------- - Noureddine Boudriga, University of Carthage, Tunisia - Slim Rekhis, University of Carthage, Tunisia PROGRAM COMMITTEE ------------------------------------- - Alec Yasinsac, University of South Alabama beginning, USA - Amr Youssef, Concordia University, Canada - Carlisle Adams, University of Ottawa - Emmanuelle Anceaume, CNRS, France - Giampaolo Bella, Università di Catania, Italy - Gritzalis Stefanos, University of the Aegean, Greece - Habtamu Abie, Norwegian Computing Center, Norway - Helge Janicke, De Montfort University, England - Krzysztof Szczypiorski, Warsaw University of Technology, Poland - Kwangjo Kim, Korea Advanced Institute of Science and Technology, Korea - Lejla Batina, Radboud University Nijmegen, Netherlands - Luigi Logrippo, Université du Québec en Outaouais, Canada - Marcus Rogers, Purdue University, USA - Melek Önen, EURECOM, France - Michael Losavio, University of Louisville, USA - Mohamed Hamdi, University of Carthage, Tunisia - Mourad Debbabi, Concordia University, Canada - Narjes Robbana, University of Carthage, Tunisia - Nasir Memon, Polytechnic Institute of NYU, USA - Pavel Gladyshev, University College Dublin, Ireland - Peter Mueller, IBM Zurich Research Laboratory, Switzerland - Reijo Savola, VTT Technical Research Centre of Finland, Finland - Riadh Robbana, University of Carthage, Tunisia - Robert Erbacher, U.S. Army Research Laboratory, USA - Sabrina De Capitani di Vimercati, Università degli Studi di Milano, Italy - Simson Garfinkel, Naval Postgraduate School in Monterey, USA - Stelvio Cimato, University of Milan, Italy - Tahar Kechadi, University College Dublin, Ireland - Vassil Roussev, University of New Orleans, USA - Wojciech Mazurczyk, Warsaw University of Technology, Poland - Yan Zhang, Simula Research Laboratory, Norway - Yassine Lakhnech, University Joseph Fourier, France |
|