Call for Papers
Fourth International Workshop on Security and Forensics in Cyber Space
(SFCS 2016), In conjunction with 17th International Conference on
Distributed Computing and Networking (ICDCN 2016)
Singapore, January 4-6, 2016


With the continuous growth of cyber connectivity and the ever
increasing number of applications, remotely delivered services, and
networked systems have required the need for digital security. Today,
more and more government agencies, financial institutions, and
business enterprises are experiencing security incidents and
cyber-crimes, by which attackers could generate fraudulent financial
transactions, commit crimes, perform an industrial espionage, and
disrupt the business processes.

The sophistication and the borderless nature of the intrusion
techniques used during a cyber security incident, have triggered the
need for designing new active cyber defense solutions, and developing
efficient incident response plans. In this context, digital forensics
has emerged as a disciplined science allowing to note and collect
evidences left on the compromised system prior to the incident
occurrence, and carry out an analysis to: (a) understand what
occurred; (b) determine the set of exploited security weaknesses; (c)
trace attackers to their source; (d) study the attackers trends and
motives; and (e) propose a set of optimal countermeasures to stop and
mitigate the effect of the attacks.

The fourth edition of the international workshop on Security and
Forensics in Cyber Space (SFCS 2016) will be held in conjunction with
the 17th International Conference on Distributed Computing and
Networking (ICDCN 2016). The workshop promotes research and innovative
ideas in the realm of cyber security and digital forensics. It
provides a prominent venue for researchers, scientists, engineers and
practitioners to share their thoughts, exchange ideas, and prospect
future and potential axes of collaboration. Papers focusing on any
aspect of the theory and practice of cyber security, defense, and
digital forensics are solicited. A large spectrum of advanced topics
are covered, ranging from anti-forensics detection and recovery, cyber
security and forensic in wireless and mobile communication systems,
multimedia security and forensic content processing, development of
novel theories and techniques of cyber security and forensics analysis
and validation, and forensics in cloud computing and social networks.

The workshop will act as a forum for discussing open issues, and
presenting original and unpublished research results and innovative
ideas in the realm of security and digital forensics. We encourage
contributions describing innovative work in the realm of security and
digital forensics. Topics of interest include, but are not limited to:

- Formal and theoretical techniques of cyber security and forensics
- Legal and policy issues in cyber security and defense
- Availability, privacy, authentication, trust, access control, and
  key management
- Social networks security
- Incident response techniques in networked and distributed systems
- Security and privacy in wireless and mobile systems
- Cyber security engineering
- Risk analysis and management in cyber security
- Critical infrastructures security
- Storage systems protection and forensics
- Economic and management aspects of cyber security and privacy
- Automated reasoning techniques of incidents and evidence analysis
- Evidentiary aspects and forensics of digital crimes
- Cybercrime scenarios modeling, analysis, and investigation
- Hypothetical reasoning in forensics and incident response
- Collaborative and distributed techniques for cyber defense and cyber
- Active, adaptive, and intelligent defense systems
  - Embedded devices forensics
- Evidence preservation, management, storage and reassembly
- Anti-forensics and anti-anti forensics prevention, detection, and analysis
- Multimedia security and forensics
- Lightweight forensic techniques
- Large-scale investigations in large networks and Big Data
- Innovative forensic services
- Data visualization in forensic analysis
- Vulnerability analysis and assessment of cloud services
- Techniques for tracking and trace-back of attacks in networked and
  distributed systems
- Data hiding, extraction, and recovery technique
- Security and forensics in distributed, virtual, and cloud environments
- Cyber security and forensic architectures
- Defense in depth
- Cybersecurity of Industrial Control Systems
- Cyber physical systems security
- Bio-inspired security

ICDCN-SFCS 2016 will be soliciting regular research papers. At least
one author of each accepted paper must register for the conference and
present the paper.

Regular papers should not exceed 6 pages double column, including
figures, tables and references, in accordance with the ACM author
guidelines. The ACM LaTeX and Microsoft Word templates, as well as
related information, can be found at the ACM website
( No
changes to margins, spacing, or font sizes are allowed from those
specified by the style files. The proceedings of the workshop will be
published in the ACM Digital library.

All submissions must be made electronically in printable pdf form via
the EasyChair submission management system.

Important Dates
Paper Submission Deadline (extended): October 16, 2015 (23:59:00 UTC)
Paper Notification: November 13, 2015
Camera Ready Submission Deadline: November 23, 2015
Author Registration Deadline: November 16, 2015

- Noureddine Boudriga, University of Carthage, Tunisia
- Slim Rekhis, University of Carthage, Tunisia

- Amr Youssef, Concordia University, Canada
- Helge Janicke, De Montfort University, UK
- Giampaolo Bella, Università di Catania, Italy
- Krzysztof Szczypiorski, Warsaw University of Technology, Poland
- Peter Mueller, IBM Zurich Research Laboratory, Switzerland
- Raymond Choo, University of South Australia, Australia
- Michael Losavio, University of Louisville, USA
- Raymond Choo, University of South Australia, Australia
- Sabrina De Capitani di Vimercati, Università degli Studi di Milano, Italy
- Stefanos Gritzalis, University of the Aegean, Greece
- Vassil Roussev, University of New Orleans, USA
- Walid Abdallah, Military Aviation School of Borj Elamri, Tunisia
- Wojciech Mazurczyk, Warsaw University of Technology, Poland
- Yacine Djemaiel, Institute of Technology in Communications at Tunis, Tunisia