4th International Workshop on Cyber Crime (IWCC 2015)
http://stegano.net/IWCC2015/
co-located with
10th International Conference on Availability, Reliability and Security
(ARES 2015)

Universite Paul Sabatier
Toulouse, France
August 24- 28, 2015

IMPORTANT DATES

April 10, 2015: Regular Paper Submission [submission link:
https://easychair.org/conferences/?conf=iwcc20150]
May 10, 2015: Notification Date
June 1, 2015: Camera-Ready Paper Deadline

IWCC Overview

Today's world's societies are becoming more and more dependent on open
networks such as the Internet - where commercial activities, business
transactions and government services are realized. This has led to the
fast development of new cyber threats and numerous information security
issues which are exploited by cyber criminals. The inability to provide
trusted secure services in contemporary computer network technologies
has a tremendous socio-economic impact on global enterprises as well as
individuals.

Moreover, the frequently occurring international frauds impose the
necessity to conduct the investigation of facts spanning across multiple
international borders. Such examination is often subject to different
jurisdictions and legal systems. A good illustration of the above being
the Internet, which has made it easier to perpetrate traditional crimes.
It has acted as an alternate avenue for the criminals to conduct their
activities, and launch attacks with relative anonymity. The increased
complexity of the communications and the networking infrastructure is
making investigation of the crimes difficult. Traces of illegal digital
activities are often buried in large volumes of data, which are hard to
inspect with the aim of detecting offences and collecting evidence.
Nowadays, the digital crime scene functions like any other network, with
dedicated administrators functioning as the first responders.

This poses new challenges for law enforcement policies and forces the
computer societies to utilize digital forensics to combat the increasing
number of cybercrimes. Forensic professionals must be fully prepared in
order to be able to provide court admissible evidence. To make these
goals achievable, forensic techniques should keep pace with new
technologies.

The aim of 4th International Workshop on Cyber Crime is to bring
together the research accomplishments provided by the researchers from
academia and the industry. The other goal is to show the latest research
results in the field of digital forensics and to present the development
of tools and techniques which assist the investigation process of
potentially illegal cyber activity. We encourage prospective authors to
submit related distinguished research papers on the subject of both:
theoretical approaches and practical case reviews.

The workshop will be accessible to both non-experts interested in
learning about this area and experts interesting in hearing about new
research and approaches.

Topics of interest include, but are not limited to:
- Cyber crimes: evolution, new trends and detection
- Cyber crime related investigations
- Computer and network forensics
- Digital forensics tools and applications
- Digital forensics case studies and best practices
- Privacy issues in digital forensics
- Network traffic analysis, traceback and attribution
- Incident response, investigation and evidence handling
- Integrity of digital evidence and live investigations
- Identification, authentication and collection of digital evidence
- Anti-forensic techniques and methods
- Watermarking and intellectual property theft
- Social networking forensics
- Steganography/steganalysis and covert/subliminal channels
- Network anomalies detection
- Novel applications of information hiding in networks
- Political and business issues related to digital forensics and
anti-forensic techniques

SUBMISSIONS AND REGISTRATION

Authors are invited to submit Papers will be accepted based on peer
review (3 per paper) and should contain original, high quality work. All
papers must be written in English. Authors are invited to submit their
papers according the following guidelines: two columns, single-spaced,
including figures and references, using 10 pt fonts and number each page.

Authors are invited to submit Regular Papers (maximum 8 pages) via
EasyChair (https://easychair.org/conferences/?conf=iwcc20150). Papers
accepted by the workshop will be published in the Conference Proceedings
published by IEEE Computer Society Press. Failure to adhere to the page
limit and formatting requirements will be grounds for rejection.

Submission of a paper implies that should the paper be accepted, at
least one of the authors will register and present the paper in the
conference.

The extended versions of high-quality papers selected from the workshop
will be published in a special issue of the EURASIP Journal on
Information Security (tentative).

ORGANIZING COMMITTEE
Wojciech Mazurczyk, Warsaw University of Technology, Poland
Krzysztof Szczypiorski, Warsaw University of Technology, Poland

CONTACTS
Contact IWCC 2015 Chair using this email address: iwcc.chairs@gmail.com