[Tccc] 2nd CfP: First International Workshop on Cyber Crime - IWCC 2012

Krzysztof Szczypiorski ksz
Mon May 21 16:55:10 EDT 2012


Call for papers:
First International Workshop on Cyber Crime - IWCC 2012
========================================================================
October 3-5, 2012
St. Petersburg, Russia
co-located with International Congress on Ultra Modern
Telecommunications and Control Systems (ICUMT 2012)
========================================================================
IWCC website: http://stegano.net/iwcc
========================================================================
INTRODUCTION

The IWCC workshop is intended to be a follow-up of:
International Workshop on Network Steganography (IWNS) (held in 2009,
2010 and 2011) International Workshop on Digital Forensics (IWDF) (held
in 2011). Today's world's societies are becoming more and more dependent
on open networks such as the Internet - where commercial activities,
business transactions and government services are realized. This has led
to the fast development of new cyber threats and numerous information
security issues which are exploited by cyber criminals. The inability to
provide trusted secure services in contemporary computer network
technologies has a tremendous socio-economic impact on global
enterprises as well as individuals.

Moreover, the frequently occurring international frauds impose the
necessity to conduct the investigation of facts spanning across multiple 
international borders. Such examination is often subject to different 
jurisdictions and legal systems. A good illustration of the above being 
the Internet, which has made it easier to perpetrate traditional crimes. 
  It has acted as an alternate avenue for the criminals to conduct their 
activities, and launch attacks with relative anonymity. The increased 
complexity of the communications and the networking infrastructure is 
making investigation of the crimes difficult. Traces of illegal digital 
activities are often buried in large volumes of data, which are hard to 
inspect with the aim of detecting offences and collecting evidence. 
Nowadays, the digital crime scene functions like any other network, 
withdedicated administrators functioning as the first responders.

This poses new challenges for law enforcement policies and forces the
computer societies to utilize digital forensics to combat the increasing 
number of cybercrimes. Forensic professionals must be fully prepared in 
order to be able to provide court admissible evidence. To make these 
goals achievable, forensic techniques should keep pace with new 
technologies.

The aim of this workshop is to bring together the research
accomplishments provided by the researchers from academia and the
industry. The other goal is to show the latest research results in the
field of digital forensics and to present the development of tools and
techniques which assist the investigation process of potentially illegal 
cyber activity. We encourage prospective authors to submit related 
distinguished research papers on the subject of both: theoretical 
approaches and practical case reviews.

The workshop is an interesting supplement for ICUMT 2012 in area of
security of communication networks. It is especially important because
year 2011 has been named by mass media "the year of the hack" due to
numerous accounts of data security breaches in private companies and
governments. The amount of stolen data is estimated in petabytes. Large
amount of the damage can be attributed to Operation Shady RAT or Duqu
worm which is a successor of famous Stuxnet malware.

This year's workshop's main theme is network forensics.

========================================================================
TOPICS OF INTERESTS

Topics of interests include, but are not limited to:
- Cyber crimes: design and detection
- Cyber crime related investigations
- Digital forensics tools and applications
- Digital forensics case studies and best practices
- Formal standards, procedures and methods in digital forensics
- Privacy issues in digital forensics
- Steganography/steganalysis and covert/subliminal channels
- Network anomalies detection
- Novel applications of information hiding in networks
- Information hiding for multimedia services
- New methods for detecting and eliminating network steganography
- Localization of digital forensic techniques
- Computer and network forensics
- Network traffic analysis, traceback and attribution
- Incident response, investigation and evidence handling
- Integrity of digital evidence and live investigations
- Identification, authentication and collection of digital evidence
- Anti-forensic techniques and methods
- Watermarking and intellectual property theft
- Analysis techniques for digital forensics and information assurance
research
- Social networking forensics
- Political and business issues related to digital forensics and
anti-forensic techniques and methods

========================================================================
CHAIRS
Dr. Krzysztof Szczypiorski, Warsaw University of Technology, Poland
Prof. J?zef Lubacz, Warsaw University of Technology, Poland
Dr. Wojciech Mazurczyk, Warsaw University of Technology, Poland

========================================================================
PUBLICATION ISSUES
Papers will be accepted based on peer review (3 per paper) and should
contain original, high quality work. All papers must be written in
English. Page length is limited to 8-pages in the IEEE double-column
format with a font size no smaller than 10 points using IEEE Conference
Proceeding templates (same as ICUMT 2012 template).

The extended versions of high-quality papers selected from the workshop 
will be published in a special issue of the following journals: Security 
and Communication Networks (Wiley) or Informatica (Slovenian Society 
Informatika).

========================================================================
DATES
Manuscript Due: 15.06.2012
Acceptance Notification: 10.08.2012
Final Manuscript Due: 30.08.2012



More information about the TCCC mailing list