[Deadline for WCNC 2019 Workshop on Security and Forensics in Cyber
Space (SFCS) has been extended to January 30, 2019]

========================================================================
Call for Papers
========================================================================

IEEE Fifth international workshop on Security and Forensics in Cyber Space 
  (SFCS 2019)
In conjunction with IEEE Wireless Communications and Networking
Conference (WCNC 2019)
15-18 April 2019
Marrakech, Morocco

https://sites.google.com/view/ieee-wcnc-sfcs

Cyber attacks are continuing to increase at an alarming rate,
especially with the ever increasing nature of cyber connectivity. They
target a wide variety of protocols and communication systems ranging
from servers and end-user machines to wireless and mobile networks and
devices. The absence of active cyber defense and strategy, and
technically sound forensic methods may prevent administrators from
making suitable decisions on time against threats, proving the
identity of the guilty party, identifying the root vulnerability to
prevent a future occurrence of a similar incident, and understanding
the attacker's motivation for an efficient design of
cyber security solutions.

In this context, digital forensic engineering is emerging as a
disciplined science in charge of developing novel scientific and
theoretical methods, techniques, and approaches to collect, process,
and analyze information retrieved from systems affected by security
incidents to generate conclusive descriptions.

The fifth edition of the SFCS 2019 workshop will bring together
researchers, scientists, engineers and practitioners involved in
research in the fields of communication systems security and
forensics, to present their latest research findings, ideas, and
developments. The workshop will act as a forum for discussing open
issues, and presenting original and unpublished research results and
innovative ideas in the realm of security and digital forensics. We
encourage contributions describing innovative work in the realm of
cyber security, cyber defense, and digital forensics.

Topics of interest include, but are not limited to:

- Formal and theoretical techniques of cyber security and forensics
- Legal and policy issues in cyber security and defense

- Availability, privacy, authentication, trust, access control, 
  and key management
- Social networks security and forensics
- Intrusion Detection 
- Incident response techniques in networked and distributed systems
- Security and privacy in wireless and mobile systems
- Cyber security engineering
- Risk analysis and management in cyber security
- Storage systems protection and forensics
- Economic and management aspects of cyber security and privacy
- Automated reasoning techniques of incidents and evidence analysis
- Evidentiary aspects and forensics of digital crimes
- Cyber scenarios modeling, analysis, and investigation
- Hypothetical reasoning in forensics and incident response
- Collaborative and distributed techniques for cyber defense and cyber 
  investigation
- Active, adaptive, and intelligent defense systems
- Embedded security and device forensics
- Evidence preservation, management, storage and reassembly
- Anti-forensics and anti-anti forensics prevention, detection, and analysis
- Multimedia security and forensics
- Lightweight security techniques
- Large-scale security and investigation in large networks and Big Data
- Innovative forensic services
- Data visualization in forensic analysis
- Vulnerability analysis and assessment of cloud services
- Techniques for tracking and trace-back of attacks in networked and
  distributed systems
- Data hiding, extraction, and recovery technique
- Security and forensics in distributed, virtual, and cloud environments
- Cyber security architectures 
- Defense in depth
- Cybersecurity of Industrial Control Systems and Cyber physical systems 
- Security and forensics of critical infrastructures
- Supervisory control and data acquisition security 
- Bio-inspired security
- Security of Application-oriented solutions (Healthcare, Military,
  Supply Chains, Environment, Agriculture, Smart cities, Education,
  ...)


========================================================================
Initial Papers Submission Guidelines
========================================================================

All submissions should be written in English with a maximum paper
length of eight (8) printed pages (10-point font) including
figures. The papers exceeding 6 pages will be subject to an additional
100Eu fee/page. Papers exceeding 8 pages will not be
accepted at EDAS.

All papers should be formatted in conformance with the IEEE Manuscript
Templates for Conference Proceedings and should be submitted via EDAS
(http://edas.info/N25659).

Papers are reviewed on the basis that they do not contain plagiarized
material and have not been submitted to any other conference at the
same time (double submission). These matters are taken very seriously
and the IEEE Communications society will take action against any
author who has engaged in either practice.

Authors of accepted papers must guarantee that their papers will be
presented at the workshop.

To ensure appropriate consideration of conflicts of interest during
the review process, changes to the list of authors once a paper has
been submitted for review during review, revision, or (if accepted)
final publication are not allowed. The author list may be
changed only prior to the submission deadline.


Important Dates
==========
Paper Submission Deadline (Extended): 30 January 2019 
Acceptance/Rejection Notification: 15 February 2019 
Camera Ready Submission Deadline: 1 March 2019
Workshop date: 15 April 2019 

========================================================================
Organizing Committee
========================================================================
General Chairs
-----------------------------------
- Noureddine Boudriga, University of Carthage, Tunisia
- Slim Rekhis, University of Carthage, Tunisia


Technical Program Committee
------------------------------
Andrew Marrington, Zayed University, UAE
Antoine Bagula, University of the Western Cape, South Africa
Bruno Miguel Silva, University of Beira Interior, Portugal
Cosimo Anglano, Universitá del Piemonte Oriental, Italy
Gritzalis Stefanos, University of the Aegean, Greece
Harald Baier, Hochschule Darmstadt / CRISP, Germany
Helge Janicke, De Montfort University, United Kingdom 
Hervé Debar, Telecom SudParis, France
Jong-Hoon Kim, Kent State University, USA 
Krzysztof Szczypiorski, Warsaw University of Technology, Poland
Lamia Chaari, University of Sfax, Tunisia 
Michael Losavio, University of Louisville, USA
Sabrina De Capitani di Vimercati, Universitá degli Studi di Milano, Italy
Sami Habib, Kuwait University, Kuwait 
Stelvio Cimato, University of Milan, Italy
Walid Abdallah, Military Aviation School of Borj Elamri, Tunisia
Wojciech Mazurczyk, Warsaw University of Technology, Poland
Yacine Djemaiel, Institute of Technology in Communications at Tunis, Tunisia