[Owasp-cuiaba] Fwd: [SC-L] Cfp: IEEE S&P Workshop on Cyber Crime 2014

Kembolle Amilkar contato em kembolle.com.br
Sábado Fevereiro 8 21:34:48 UTC 2014


Dear Collegues,
Please consider submitting papers to *IWCC *(International Workshop on
Cyber Crime) 2014 which is is part of the IEEE CS Security & Privacy
Workshops (SPW 2014), an event of the IEEE CS Technical Committee on
Security and Privacy and like last year will be co-located with *IEEE S&P
2014 *in  the *Fairmont Hotel, San Jose, CA, USA, May 17-18, 2014.*

*CALL FOR PAPERS* *- deadline in 6 days!*

*Submission page: *https://www.easychair.org/conferences/?conf=iwcc2014

The extended versions of high-quality papers selected from the workshop
will be published in a special issue of the *EURASIP Journal on Information
Security, Springer (confirmed!)*

IWCC 2014 is part of the IEEE CS Security & Privacy Workshops (SPW 2014),
an event of the IEEE CS Technical Committee on Security and Privacy.

*IWCC 2014 website*: http://stegano.net/IWCC2014/


February 10, 2014: Regular & Short Paper Submission
March 17, 2014: Notification Date
April, 2014: Camera-Ready & Early Registration Deadline

Today's world's societies are becoming more and more dependent on open
networks such as the Internet - where commercial activities, business
transactions and government services are realized. This has led to the fast
development of new cyber threats and numerous information security issues
which are exploited by cyber criminals. The inability to provide trusted
secure services in contemporary computer network technologies has a
tremendous socio-economic impact on global enterprises as well as

Moreover, the frequently occurring international frauds impose the
necessity to conduct the investigation of facts spanning across multiple
international borders. Such examination is often subject to different
jurisdictions and legal systems. A good illustration of the above being the
Internet, which has made it easier to perpetrate traditional crimes. It has
acted as an alternate avenue for the criminals to conduct their activities,
and launch attacks with relative anonymity. The increased complexity of the
communications and the networking infrastructure is making investigation of
the crimes difficult. Traces of illegal digital activities are often buried
in large volumes of data, which are hard to inspect with the aim of
detecting offences and collecting evidence. Nowadays, the digital crime
scene functions like any other network, with dedicated administrators
functioning as the first responders.

This poses new challenges for law enforcement policies and forces the
computer societies to utilize digital forensics to combat the increasing
number of cybercrimes. Forensic professionals must be fully prepared in
order to be able to provide court admissible evidence. To make these goals
achievable, forensic techniques should keep pace with new technologies.
The aim of this workshop is to bring together the research accomplishments
provided by the researchers from academia and the industry. The other goal
is to show the latest research results in the field of digital forensics
and to present the development of tools and techniques which assist the
investigation process of potentially illegal cyber activity. We encourage
prospective authors to submit related distinguished research papers on the
subject of both: theoretical approaches and practical case reviews.

The workshop will be accessible to both non-experts interested in learning
about this area and experts interesting in hearing about new research and

Topics of interest include, but are not limited to:

    * Cyber crimes: evolution, new trends and detection
    * Cyber crime related investigations
    * Computer and network forensics
    * Digital forensics tools and applications
    * Digital forensics case studies and best practices
    * Privacy issues in digital forensics
    * Network traffic analysis, traceback and attribution
    * Incident response, investigation and evidence handling
    * Integrity of digital evidence and live investigations
    * Identification, authentication and collection of digital evidence
    * Anti-forensic techniques and methods
    * Watermarking and intellectual property theft
    * Social networking forensics
    * Steganography/steganalysis and covert/subliminal channels
    * Network anomalies detection
    * Novel applications of information hiding in networks
    * Political and business issues related to digital forensics and
anti-forensic techniques


Authors are invited to submit Regular Papers (maximum 8 pages) or Short
Papers (maximum 4 pages) via EasyChair. Papers accepted by the workshop
will be published in the Conference Proceedings published by IEEE Computer
Society Press.

Papers must be formatted for US letter (not A4) size paper with margins of
at least 3/4 inch on all sides. The text must be formatted in a two-column
layout, with columns no more than 9 in. high and 3.375 in. wide. The text
must be in Times font, 10-point or larger, with 12-point or larger line
spacing. Authors are encouraged to use the IEEE conference proceedings
templates found here. Failure to adhere to the page limit and formatting
requirements will be grounds for rejection.

The following is a URL link to the "Author's Final Paper Formatting and
Submission Instructions" Webpage (Online Author Kit) for 2014 IEEE Security
and Privacy Workshops (SPW 2014).

The extended versions of high-quality papers selected from the workshop
will be published in a special issue of the EURASIP Journal on Information
Security (tentative).


Krzysztof Szczypiorski, Warsaw University of Technology, Poland
Wojciech Mazurczyk, Warsaw University of Technology, Poland
Amir Houmansadr, University of Texas at Austin, USA
Hui Tian, National Huaqiao University, China
-------------- Próxima Parte ----------
Um anexo em HTML foi limpo...
URL: <http://lists.owasp.org/pipermail/owasp-cuiaba/attachments/20140208/fa7438ec/attachment-0001.html>

More information about the Owasp-cuiaba mailing list