*CALL FOR PAPERS*

Please consider submitting papers to IWCC 2014 (International Workshop
on Cyber Crime) which is is part of the IEEE CS Security & Privacy
Workshops (SPW 2014), an event of the IEEE CS Technical Committee on
Security and Privacy and like last year will be co-located with IEEE S&P
2014 in  the *Fairmont Hotel, San Jose, CA, USA, May 17-18, 2014.

***

IWCC 2014 is part of the IEEE CS Security & Privacy Workshops (SPW
2014), an event of the IEEE CS Technical Committee on Security and Privacy.

    *IWCC 2014* website: http://stegano.net/IWCC2014/

    Today's world's societies are becoming more and more dependent on
    open networks such as the Internet - where commercial activities,
    business transactions and government services are realized. This has
    led to the fast development of new cyber threats and numerous
    information security issues which are exploited by cyber criminals.
    The inability to provide trusted secure services in contemporary
    computer network technologies has a tremendous socio-economic impact
    on global enterprises as well as individuals.

    Moreover, the frequently occurring international frauds impose the
    necessity to conduct the investigation of facts spanning across
    multiple international borders. Such examination is often subject to
    different jurisdictions and legal systems. A good illustration of
    the above being the Internet, which has made it easier to perpetrate
    traditional crimes. It has acted as an alternate avenue for the
    criminals to conduct their activities, and launch attacks with
    relative anonymity. The increased complexity of the communications
    and the networking infrastructure is making investigation of the
    crimes difficult. Traces of illegal digital activities are often
    buried in large volumes of data, which are hard to inspect with the
    aim of detecting offences and collecting evidence. Nowadays, the
    digital crime scene functions like any other network, with dedicated
    administrators functioning as the first responders.

    This poses new challenges for law enforcement policies and forces
    the computer societies to utilize digital forensics to combat the
    increasing number of cybercrimes. Forensic professionals must be
    fully prepared in order to be able to provide court admissible
    evidence. To make these goals achievable, forensic techniques should
    keep pace with new technologies.
    The aim of this workshop is to bring together the research
    accomplishments provided by the researchers from academia and the
    industry. The other goal is to show the latest research results in
    the field of digital forensics and to present the development of
    tools and techniques which assist the investigation process of
    potentially illegal cyber activity. We encourage prospective authors
    to submit related distinguished research papers on the subject of
    both: theoretical approaches and practical case reviews.

    The workshop will be accessible to both non-experts interested in
    learning about this area and experts interesting in hearing about
    new research and approaches.

    Topics of interest include, but are not limited to:

        . Cyber crimes: evolution, new trends and detection
        . Cyber crime related investigations
        . Computer and network forensics
        . Digital forensics tools and applications
        . Digital forensics case studies and best practices
        . Privacy issues in digital forensics
        . Network traffic analysis, traceback and attribution
        . Incident response, investigation and evidence handling
        . Integrity of digital evidence and live investigations
        . Identification, authentication and collection of digital evidence
        . Anti-forensic techniques and methods
        . Watermarking and intellectual property theft
        . Social networking forensics
        . Steganography/steganalysis and covert/subliminal channels
        . Network anomalies detection
        . Novel applications of information hiding in networks
        . Political and business issues related to digital forensics and
    anti-forensic techniques

    *SUBMISSIONS AND REGISTRATION*

    Authors are invited to submit Regular Papers (maximum 8 pages) or
    Short Papers (maximum 4 pages) via EasyChair. Papers accepted by the
    workshop will be published in the Conference Proceedings published
    by IEEE Computer Society Press.

    Papers must be formatted for US letter (not A4) size paper with
    margins of at least 3/4 inch on all sides. The text must be
    formatted in a two-column layout, with columns no more than 9 in.
    high and 3.375 in. wide. The text must be in Times font, 10-point or
    larger, with 12-point or larger line spacing. Authors are encouraged
    to use the IEEE conference proceedings templates found here. Failure
    to adhere to the page limit and formatting requirements will be
    grounds for rejection.

    The following is a URL link to the "Author's Final Paper Formatting
    and Submission Instructions" Webpage (Online Author Kit) for 2014
    IEEE Security and Privacy Workshops (SPW 2014).

    The extended versions of high-quality papers selected from the
    workshop will be published in a special issue of the EURASIP Journal
    on Information Security (tentative).

    *IMPORTANT DATES*

    February 10, 2014: Regular & Short Paper Submission
    March 10, 2014: Notification Date
    April, 2014: Camera-Ready & Early Registration Deadline

    *ORGANIZING COMMITTEE*

    Krzysztof Szczypiorski, Warsaw University of Technology, Poland
    Wojciech Mazurczyk, Warsaw University of Technology, Poland
    Amir Houmansadr, University of Texas at Austin, USA
    Hui Tian, National Huaqiao University, China