Fwd: [TCCC-ANNOUNCE] Extended Deadline April 30: IEEE Network SI on Network Forensics and Surveillance for Emerging Networks
-------- Weitergeleitete Nachricht -------- Betreff: [TCCC-ANNOUNCE] Extended Deadline April 30: IEEE Network SI on Network Forensics and Surveillance for Emerging Networks Datum: Tue, 12 Apr 2016 12:29:02 +0800 Von: Dr Ying-Dar Lin ydlin@CS.NCTU.EDU.TW Antwort an: Dr Ying-Dar Lin ydlin@CS.NCTU.EDU.TW An: tccc-announce@COMSOC.ORG
Please accept our apologies if you receive multiple copies of this CFP.
CALL FOR PAPERS
IEEE Network Special Issue on Network Forensics and Surveillance for Emerging Networks
http://www.comsoc.org/netmag/cfp/network-forensics-and-surveillance-emerging...
Deadline extended to April 30, 2016
Information and communication technologies (ICT) are becoming more intertwined in our lives, and inter-connected world. The networked world has revolutionized our lives in many ways and led to a closer and much more accessible world. For example, we can reach out to anyone, anywhere and anytime, regardless of geographical distance. Our increased dependence on ICT, and the pervasive interconnectivity of systems used in our networked world are, however, vectors that can potentially be exploited for nefarious or criminal purposes (e.g. hacking, theft of intellectual property and trade secrets, and online child exploitation). Recent incidents include the compromise of millions of Sony's PlayStation Network user accounts (resulting in significant reputation and financial damages to Sony), and Stuxnet (allegedly state-sponsored). The increasing number of high profile cyberattacks, and their impacts highlighted the importance of ensuring the security of our connected world.
In a cyberattack, every action leaves an evidence trail — in routers, firewalls, web proxies, and within the network traffic. Consequently, there is a growing need for investigators to analyze network events, including network traffic, netflow, security device (or appliance) log, in order to ascertain how an attack was carried out or how an event occurred on a network. Such activities can assist in the reconstruction of a crime and, potentially, the identification of the perpetrator(s). To reduce the risk of digital evidence being called into question in judicial proceedings, it is important to have a rigorous methodology and set of procedures for conducting digital or network forensics. However, the increasing use of Internet and networked technologies, such as wearable devices and cyber physical systems in critical infrastructures, fast-advancing networking technologies, and the need to deal with volatile and dynamic data, complicate efforts to collect and preserve evidential data in a timely fashion. To keep pace with the growth and changing face of criminal activity as well as fast advancing network technologies such as SDN or wireless SDN, 4G/LTE and 5G, it is important for the forensic research and practitioner communities to have an up-to-date and in-depth understanding of the types of terrestrial artefacts that are likely to remain on the network and on networked devices, as well as the capability to undertake data collection and acquisition in a timely and forensically sound manner.
This feature topic aims to foster the dissemination of the state-of-the-art advances in network forensics and surveillance for emerging networks. Only technical papers describing previously unpublished, original, state-of-the-art research, and not currently under review by a conference or a journal will be considered. Specifically, this issue welcomes two categories of papers: 1) invited articles from qualified experts; and 2) contributed papers from open call with list of addressed topics.
We solicit papers in a variety of topics related to network forensics and surveillance, with a particular emphasis on novel techniques to collect or exfiltrate data from the network and networked devices (such as those found in cyber-physical systems) in emerging networks. Topics of interest include:
• Advanced network surveillance, forensic and anti-forensic techniques
• Cooperative and distributed forensics and surveillance
• Data exfiltration techniques from the network and networked devices (e.g. Internet-of-Things)
• Attack detection, traceback and attribution in SDN, 4G and 5G
• Network covert channel detection and elimination
• Methods for reconstruction of internet activities in SDN, 4G and 5G
• Forensics and surveillance in IoT
• Forensics and surveillance in peer-to-peer, social, and cloud networks
• Vulnerability detection techniques as well as mitigation techniques for networked systems
• Novel techniques to analyze intelligence gathered from different or disparate data sets
• Tools and systems for network forensics and surveillance
• Network forensic process modeling
• VoIP forensics, VoIPoW forensics
High quality survey papers on the above topics are also welcome.
SUBMISSIONS
Submitted papers should not be under consideration elsewhere for publication and the authors must follow the IEEE Network guidelines regarding manuscript content and format for preparation of the manuscripts. For details, please refer to the “Author Guidelines” at the IEEE Network Web site at http://www.comsoc.org/netmag/author-guidelines. Authors must submit their manuscripts via the IEEE Network manuscript submission system at http://mc.manuscriptcentral.com/network-ieee. All papers will be reviewed by at least three (3) reviewers for their technical merit, scope, and relevance to the CFP.
IMPORTANT DATES
• Manuscript Submission: April 30, 2016 (Extended Deadline)
• First Revision/Reject Notification: June 15, 2016
• Acceptance Notification: August 15, 2016
• Final Manuscript Due: September 15, 2016
• Publication Date: November, 2016
GUEST EDITORS
Dr. Xiaodong Lin (corresponding guest editor)
Associate Professor (Information Security)
Business and Information Technology
University of Ontario Institute of Technology (UOIT), Canada
Xiaodong.lin@uoit.ca
Dr. Kim-Kwang Raymond Choo
Senior Lecturer
School of Information Technology and Mathematical Sciences
University of South Australia, Australia
Raymond.Choo@unisa.edu.au
Dr. Ying-Dar Lin
Professor, Department of Computer Science
National Chiao Tung University Hsinchu, Taiwan
ydlin@cs.nctu.edu.tw
Dr. Peter Mueller
Researcher, IBM Zurich, Switzerland
pmu@zurich.ibm.com
______________________________________________________________ IEEE Communications Society Tech. Committee on Computer Communications http://committees.comsoc.org/tccc/ TCCC Announce: For announcements concerning computer networking and communications. tccc-announce@comsoc.org https://comsoc-listserv.ieee.org/
participants (1)
-
Lars Wolf