what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

IWCC 2024 Call For Papers

IWCC 2024 Call For Papers
Posted Mar 28, 2024
Site ares-conference.eu

The 13th International Workshop on Cyber Crime, or IWCC, 2024 call for papers has been announced. It will take place July 30th through August 2nd, 2024 in Vienna, Austria.

tags | paper, conference
SHA-256 | 1733e3ae10dcafe0a95572942e32ff6c6d0ff3ba67769c57dd88c93c006e53e6

IWCC 2024 Call For Papers

Change Mirror Download
[APOLOGIES FOR CROSS-POSTING]

CALL FOR PAPERS
13th International Workshop on Cyber Crime (IWCC 2024 -
https://www.ares-conference.eu/iwcc/)
to be held in conjunction with the 19th International Conference on
Availability, Reliability and Security (ARES 2024 -
http://www.ares-conference.eu)

July 30 - August 02, 2024, Vienna, Austria

IMPORTANT DATES
Submission Deadline May 12, 2024
Author Notification May 29, 2024
Proceedings Version June 18, 2024
Conference July 30 - August 02, 2024

WORKSHOP DESCRIPTION
The societies of today's world are becoming increasingly dependent on online
services, where commercial activities, business transactions, government
services and biomedical diagnostics are realized. This tendency has been
evident during the recent COVID-19 pandemic. These developments, along with
the growing number of military conflicts worldwide (Ukraine, Israel, etc.),
have led to the fast development of new cyber threats and numerous
information security issues that are exploited by cybercriminals. The
inability to provide trusted, secure services in contemporary computer
network technologies has a tremendous socio-economic impact on global
enterprises as well as individuals.

Moreover, the frequently occurring international frauds impose the necessity
to conduct investigations spanning multiple domains and countries. Such
examination is often subject to different jurisdictions and legal systems. A
good illustration of the above is the Internet, which has made it easier to
prepare and perpetrate traditional - but now cyber-enabled - crimes. It has
acted as an alternate avenue for criminals to conduct their activities and
launch attacks with relative anonymity, a high degree of deniability, and
the opportunity to operate in a border-agnostic environment. Worrying
developments in the abuse of artificial intelligence and machine learning
technologies lead to the increased capabilities of malign actors who
leverage these tools to design and propagate disinformation, which is
especially dangerous (and effective) during emergencies and crises of all
kinds. The developments in Generative Artificial Intelligence have also
enabled the increase of criminal capabilities in the production,
dissemination, and weaponization of high-quality, convincing fake contact
(text, audio, images, and videos), which translates not only to the truth
and trust decay among the affected societies but also to the enhanced
capabilities in orchestrating the sophisticated cyber crimes.

Furthermore, nowadays, the majority of life-science-based techniques and
resulting data hinge on information technologies. Despite their considerable
advantages, dependence on cyber technologies also exposes vulnerabilities.
Various threats in the digital realm could target biomedical systems,
leading to adverse consequences. The field of CyberBioSecurity was
established to assist bio-related sciences in comprehending potential cyber
threats and formulating defense approaches, recovery protocols, and
resilience strategies. The increased complexity of communications and the
networking infrastructure is making the investigation of these new types of
crimes difficult. Traces of illegal digital activities are difficult to
analyze due to large volumes of data. Nowadays, the digital crime scene
functions like any other network, with dedicated administrators functioning
as the first responders.

This poses new challenges for law enforcement and intelligence communities
and forces computer societies to utilize digital forensics to combat the
increasing number of cybercrimes. Forensic professionals must be fully
prepared to be able to provide court-admissible evidence. To make these
goals achievable, forensic techniques should keep pace with new
technologies. Prevention, mitigation, and interdiction of new and emerging
threats necessitates an increasingly thorough and multidisciplinary
approaches, but also requires the collaboration of all relevant actors and
stakeholders in designing the technology regulation and cyber governance
measures.

The aim of this workshop is to bring together the research outcomes provided
by researchers from academia and the industry. The other goal is to show the
latest research results in digital forensics and cyberbiosecurity amongst
others. We strongly encourage prospective authors to submit articles
presenting both theoretical approaches and practical case reviews, including
work-in-progress reports.

TOPICS OF INTEREST INCLUDE, BUT ARE NOT LIMITED TO:
- Big Data analytics helping to track cybercrimes
- Protecting Big Data against cybercrimes
- Crime-as-a-service
- Criminal abuse of clouds and social networks
- Criminal to criminal (C2C) communications
- Criminal to victim (C2V) communications
- Criminal use of IoT, e.g., IoT-based botnets
- Cyberbiosecurity
- Cybercrime-related investigations
- Cybercrimes: evolution, new trends and detection
- Darknets and hidden services
- Fake (incl. deepfake) and disinformation detection
- Generative Artificial Intelligence and cyber crime
- AI-enabled crime and terrorism
- Mobile malware
- Network anomaly detection
- Network traffic analysis, traceback and attribution
- Incident response, investigation and evidence handling
- Internet governance
- Novel techniques in exploit kits
- Political and business issues related to digital forensics and
anti-forensic - techniques
- Anti-forensic techniques and methods
- Identification, authentication and collection of digital evidence
- Integrity of digital evidence and live investigations
- Privacy issues in digital forensics
- Ransomware: evolution, functioning, types, etc.
- Steganography/steganalysis and covert/subliminal channels
- Technology regulation
- Novel applications of information hiding in networks
- Watermarking and intellectual property theft
- Weaponization of information - cyber-enhanced disinformation campaigns

WORKSHOP CHAIRS
Artur Janicki, Warsaw University of Technology, Poland;
Kacper GradoƱ, Warsaw University of Technology, Poland;
Katarzyna KamiƱska, Warsaw University of Technology, Poland

SUBMISSION GUIDELINES
The submission guidelines valid for the workshop are the same as for the
ARES conference. They can be found at
https://www.ares-conference.eu/authors-area.




Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close