sem-grd
Threads by month
- ----- 2025 -----
- July
- June
- May
- April
- March
- February
- January
- ----- 2024 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2009 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2008 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2007 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2006 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2005 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2004 -----
- December
- November
October 2020
- 2 participants
- 2 discussions

[CFP] IEEE CCNC 2021 WKSHPS: 2nd International Workshop on Cyber Forensics & Advanced Threat Investigations in Emerging Networks
by Chilean Scholar 14 Oct '20
by Chilean Scholar 14 Oct '20
14 Oct '20
Dear Colleagues,
We cordially invite you to submit your paper to the 2nd International
Workshop on Cyber Forensics and Advanced Threat Investigations in
Emerging Networks (CFATI’21)
Held in conjunction with the IEEE CCNC 2021 (https://ccnc2021.ieee-ccnc.org)
9 January 2021, Virtual Conference
Website: https://ccnc2021.ieee-ccnc.org/workshop/2nd-international-workshop-cyber-fo…
- Submission deadline: October 16th, 2020
- Notification: November 2nd, 2020
- Camera ready: November 20th, 2020
- Workshop Day: January 9th, 2021
EDAS link for submissions: https://edas.info/newPaper.php?c=27781&track=103638
===========================
CALL FOR TECHNICAL PAPERS
===========================
The increasing proliferation of Information and communication
technologies (ICT) in our lives, has facilitated the connectivity
growth between distinct parts of our world. Various types of data are
continuously streaming across many boundaries in the world with
different models, policies, and purposes. Additionally, this data is
usually analyzed or stored on edge or gateways devices which have
highly limited capabilities and are vulnerable to sophisticated
attacks. With the growth of connectivity between various heterogeneous
systems, numerous attack vectors are constantly evolving, that can
potentially be exploited for malicious or criminal purposes (e.g. data
breaches, identity theft, and stealing of intellectual property and
trade secrets, etc.). Recent cyberattacks dangerously aim a broad
array of computing systems varying from data centers and personal
machines to mobile devices and industrial control systems.
There is a growing need for new methodologies, tools, and techniques,
capable of extracting, preserving, and analyzing different evidence
trails in various networked services and devices such as routers,
firewalls, web proxies, and network monitoring tools. Additionally,
there is also a growing need for research in new systems that are
capable of analyzing network traffic, netflows, and systems logs.
Satisfying these demands will aid in reconstructing the timeline of
the cyber-crime/attack under investigation and, possibly, the
identification of the potential actor(s).
The evolution of networked technologies, such as the internet of
things and cyber-physical systems, possess challenges based on the
highly limited capabilities of their infrastructure devices and the
type of data that can be processed by these devices. Complicated
efforts are required in suitable and timely manners against any
detected threats. Moreover, new frameworks are required to collect and
preserve potential evidential data in suitable and timely manners as
well. To guarantee proper cyber-defenses and strategies against the
expanding landscape of criminal activities as well as rapidly
advancing network technologies such as SDN or 5G and 6G.
Papers on practical as well as on theoretical topics and problems in
various topics related to cyber forensics and threat investigations,
are invited, with special emphasis on novel techniques and tools to
collect data from networked devices and services in emerging networks
(such as the ones can be found in cyber-physical systems and Internet
of things). Topics include (but are not limited to):
===========================
TOPICS
===========================
- Advanced threat investigations, forensic and anti-forensic techniques
- Cooperative and distributed forensics and threat investigations
- Data exfiltration techniques from networked devices and services
(e.g. cyber-physical systems, and Internet-of-Things)
- Attack detection, traceback and attribution in SDN, 5G, and 6G
- Methods for reconstruction of internet activities in SDN, 5G, and 6G
- Forensics and threat investigations in IoT, Smart Grid, Smart Cars and Drones
- Forensics and threat investigations in peer-to-peer, social, and
cloud networks
- Vulnerability & threat detection and mitigation techniques for
networked services
- Novel large-scale investigations techniques to analyze intelligence
data sets and logs
- Tools and services for cyber forensics and threat investigations
- Machine learning applications in cybersecurity and threat intelligence
- Adversarial machine learning
- Advances in critical infrastructure security
- VoIP forensics, VoIPoW forensics
- Network investigations and Traffic Analysis
- Hardware Vulnerabilities and Device investigations
- Privacy-enhancing techniques for cyber forensics and threat investigations
We also encourage contributions describing innovative work in the
realm of cybersecurity, cyber defense, and digital crimes.
===========================
IMPORTANT DATES
===========================
- Submission deadline: October 16th, 2020
- Notification: November 2nd, 2020
- Camera ready: November 20th, 2020
- Workshop Day: January 9th, 2021
===========================
The Workshop Supported by
===========================
Association of Cyber Forensics and Threat Investigators (ACFTI)
https://www.acfti.org/
Industrial Cybersecurity Center (CCI)
https://www.cci-es.org/
1
0
Dear Colleagues,
Paper submissions to SIN Conf 2020 are now due. Your proposals are awaited
at the *13th International Conference on Security of Information and
Networks @ *https://sinconf.org/
The proceedings will be published by ACM and uploaded to the ACM Digital
Library for perpetual access.
SIN 2020 will take place on Nov 4-7 due to COVID-19 fully online.
One each of the Best Paper and the Best Presentation awards will be given.
The awardees will receive keys to Kaspersky products complements of
Kaspersky Academy.
The full CFP is given below.
Cheers.
Let's retard the coronavirus: stay home, remain safe!
Haydi taçlı virüsü geriletelim: evde kal, güvende ol!
Atilla Elci, Ph.D., camp Erenköy, Çanakkale, TR.
My books on Amazon: https://www.amazon.com/s?k=Atilla+ELCI
https://scholar.google.com/citations?user=wpQvtlQAAAAJ&hl=en
CALL FOR CONTRIBUTIONS
======================
13th International Conference on Security of Information and Networks (SIN
2020)
4-7 November 2020
ONLINE (Istanbul, Turkey)
www.sinconf.org
-------------------------
Proceedings by ACM Press; all papers will be inserted into the ACM Digital
Library and subsequently indexed by SCOPUS.
-------------------------
In succession to the successful annual SIN 2007 - SIN 2019, the 13th
International Conference on Security of Information and Networks (SIN 2020)
provides an international forum for the presentation of research and
applications of security in information and networks. SIN 2020 conference
features contributed as well as invited papers, special sessions,
workshops, and tutorials on theory and practice of security of information
and networks.
SIN 2020 will feature the following keynote talks:
- Liudmila Babenko, Southern Federal University, Taganrog, Rostov-on-Don,
Russia.
- Albert Levi, Sabancı University, Turkey.
- Muhammed Ali Aydın, Istanbul University, Turkey
AWARDS:
========
Two prizes will be offered (complements of Kaspersky Labs):
- Best Paper Award
- Best Presentation Award
TUTORIAL:
=========
Kaspersky Labs will offer a workshop/tutorial for the conference
participants.
PROPOSALS
=========
Papers, special sessions, tutorials, and workshops addressing all aspects
of security in information and networks are being sought. Researchers and
industrial practitioners working on the following and related subjects are
especially encouraged: development and realization of cryptographic
solutions, security schemes, new algorithms; critical analysis of existing
approaches; secure information systems, security, privacy, and trust of
blockchain and distributed ledger technologies, secure smart contracts,
consensus mechanisms, especially distributed control and processing
applications, and security in networks; interoperability, service levels,
and quality issues in such systems; information assurance, security, and
public policy; detection and prevention of cybercrimes such as fraud and
phishing; next-generation network architectures, protocols, systems, and
applications; industrial experiences and challenges of the above. Doctoral
students are encouraged to propose papers on ongoing research.
Original papers will be considered; submissions must not substantially
duplicate work that any of the authors has published elsewhere or has
submitted in parallel to any other conference or workshop that has
proceedings. All submitted papers will be reviewed by at least three
members of the program committee judging its originality, significance,
correctness, presentation, and relevance. Authors are also encouraged to
propose position papers on practical studies and experiments, a critique of
existing work, emerging issues, and novel ideas under development.
Enterprises and research centers developing, implementing, or using
security tools and frameworks are encouraged to propose application/tool
demo.
Proposals of half-day tutorials on fundamental to advanced subjects
covering practical implementation aspects of security are welcome.
Proposals of special session(s) to be held in the main conference are
welcome.
Proposals of workshops to be held in conjunction with the conference are
welcome. The theme of a workshop proposal should be closely related to a
specific area of the conference topics.
Broad areas of interest in security theory, technology, and applications
will include, but are not limited to, the following:
* Access control and intrusion detection
* Security of cyber-physical systems
* Autonomous and adaptive security
* Security tools and development platforms
* Computational intelligence techniques in security
* Security ontology, models, protocols & policies
* Computer network defense
* Standards, guidelines, and certification
* Cryptographic techniques and key management
* Security-aware software engineering
* Industrial applications of security
* Trust and privacy
* Information assurance
* Next-generation network architectures
* Malware analysis
* Network security and protocols
* Security challenges in Mobile/Embedded Systems
* Cloud security
* Security, privacy, and trust of blockchain and distributed ledger
technologies
* Secure smart contracts
* Consensus mechanisms
* Security Awareness and Education
* Post Quantum Cryptography
* IoT Security and Trust
* <update as needed>
SUBMISSION OF PROPOSALS
=======================
Papers must be submitted electronically via the SIN 2020 Submission Site at
https://easychair.org/conferences/?conf=sin2020. Title, author's name(s),
affiliation, mailing address, telephone, fax, and email of the principal
author should be included. The maximum length for the proceedings is 8
pages for a full paper, 4 pages for a short paper, 2 pages for fast
abstract and position statement, and 2 pages for demo and tutorial
proposals. Extra page charges apply for full and short papers. All papers
should be written according to the double-column ACM conference format (
https://www.acm.org/publications/proceedings-template)
All proposals for organizing workshops, tutorials, demos, and special
sessions are expected at the conference e-mail sinconf(a)sinconf.org.
All accepted papers will be published by ACM Press in conference
proceedings and uploaded into ACM Digital Library. Extended versions of
selected papers will be invited for possible publication in a special
issue. Each accepted paper must be registered to be included in the
proceedings. Papers not presented during the conference may be removed from
the online proceedings.
IMPORTANT DATES
===============
Please consult www.sinconf.org site for the most up-to-date info on the
following:
Paper Submission by 10 October 2020 (**Extended**)
All Author Notification: 25 October 2020
All Camera-Ready and Author Registration: 1 November 2020
Tutorial Date: 7 November 2020
Conference Dates: 4-6 November 2020
ORGANIZATION & SPONSORS
=======================
Organized by
------------
- Istanbul Technical University, Istanbul, Turkey
- Aksaray University, Aksaray, Turkey
- The University of Glasgow, Glasgow, UK
- Rutgers University, Newark, USA
- Kennesaw State University, Georgia, USA
- Malaviya National Institute of Technology, Jaipur, India
- Manipal University Jaipur, India
- Macquarie University, Sydney, Australia
- Cardiff University, Wales, UK
- Southern Federal University, Taganrog, Rostov-on-Don, Russia
- Sochi State University, Sochi, Russia
Hosted by
---------
Department of Electronics and Communication Engineering, Istanbul Technical
University, Istanbul, Turkey
Venue: ONLINE
-----
ORGANIZERS
==========
Conference Chair: Berna Ors Yalcin, Istanbul Technical University, Turkey
Conference Co-Chair: Atilla Elçi, Aksaray University, Turkey
Conference Co-Chair: Ron Poet, University of Glasgow, Scotland
Conference Co-Chair: Jaideep Vaidya, Rutgers University, USA
Conference Co-Chair: Manoj S. Gaur, MNIT, India
Conference Co-Chair: Rajveer S. Shekhawat, MUJ, India
Conference Co-Chair: Mehmet Orgun, Macquarie University, Australia
Conference Co-Chair: Pete Burnap, Cardiff University, Wales
Conference Co-Chair: Oleg Makarevich, Ludmila Babenko, Southern Federal
University, Russia
Program Chair: Berna Ors Yalcin, Istanbul Technical University, Turkey
Program Co-Chair: Alexander Chefranov, Eastern Mediterranean University,
TRNC
Program Co-Chair: Maxim Anikeev, Southern Federal University, Russia; and,
Fraunhofer Institute for Secure Information Technology, Germany.
Program Co-Chair: Philipp Reinecke, Cardiff University, United Kingdom
Program Co-Chair: Hossain Shahriar, Kennesaw State University, USA
Program Co-Chair: Vijay Laxmi, MNIT, India
Program Co-Chair: Naghmeh Moradpoor Sheykhkanloo, Edinburgh Napier
University, United Kingdom
Program Co-Chair: Behnam Rahnama, Medis Inc., Iran
Program Co-Chair: Josef Pieprzyk, CSIRO, Australia and Polish Academy of
Sciences, Poland
Promotion Chair: Şerif Bahtiyar, Istanbul Technical University, Turkey
Promotion Co-Chair: Tahir Sandıkkaya, Istanbul Technical University, Turkey
Promotion Co-Chair: Rajan Shankaran, Macquarie University, Australia
Promotion Co-Chair: Manoj Kumar Bohra, Manipal University Jaipur, India
Promotion Co-Chair: Xavier Bellekens, Strathclyde University, Scotland
Local Committee
--------------------
Latif AKÇAY Istanbul Technical University
Mehmet Onur DEMİRTÜRK Istanbul Technical University
Yasin Fırat KULA Istanbul Technical University
Mustafa TANIŞ Istanbul Technical University
Serdar Duran Istanbul Technical University
Logo, certificates & covers designs: Efe Cem Elçi, Turkey
Volunteers Team: Students of Istanbul Technical University, Turkey
Advisory Committee Members:
Bart Preneel, Katholieke Universiteit Leuven, Belgium
Bülent Örencik, Beykent University, Turkey
Cetin Kaya Koc, University of California Santa Barbara, USA
Edward Dawson, Queensland University of Technology, Australia
Elisa Bertino, Purdue University, USA
N. Balakrishnan, IISc Bangalore, India
Willy Susilo, University of Wollongong, Australia
Alexander Shelupanov, Tomsk State University for Control Systems and Radio
Electronics, Russia
SPONSOR:
========
Kaspersky Labs offers rewards for the best paper and the best presentation.
INTERNATIONAL PROGRAM COMMITTEE
===============================
A full list of the IPC is available at www.sinconf.org.
GENERAL INQUIRIES
=================
For updated information, please refer to www.sinconf.org or the Conference
e-mail sinconf(a)sinconf.org.
Dated 2020-09-23.
1
0