caml-list - the Caml user's mailing list
 help / color / mirror / Atom feed
* [Caml-list] [CFP] IEEE CCNC 2021 WKSHPS: 2nd International Workshop on Cyber Forensics & Advanced Threat Investigations in Emerging Networks
       [not found]                     ` <CACsGmeRFV3whMUivpJusgLEhG9V2b89yj1rNENOmeRweTMe5ZA@mail.gmail.com>
@ 2020-09-14 10:35                       ` Chilean Scholar
  0 siblings, 0 replies; only message in thread
From: Chilean Scholar @ 2020-09-14 10:35 UTC (permalink / raw)
  To: caml-list

Dear Colleagues,

We cordially invite you to submit your paper to the 2nd International
Workshop on Cyber Forensics and Advanced Threat Investigations in
Emerging Networks (CFATI’21)

Held in conjunction with the IEEE CCNC 2021 (https://ccnc2021.ieee-ccnc.org)
9 January 2021, Virtual Conference

Website: https://ccnc2021.ieee-ccnc.org/workshop/2nd-international-workshop-cyber-forensics-and-advanced-threat-investigations-emerging

- Submission deadline: October 16th, 2020
- Notification: November 2nd, 2020
- Camera ready: November 20th, 2020
- Workshop Day: January 9th, 2021

EDAS link for submissions: https://edas.info/newPaper.php?c=27781&track=103638

===========================
CALL FOR TECHNICAL PAPERS
===========================

The increasing proliferation of Information and communication
technologies (ICT) in our lives, has facilitated the connectivity
growth between distinct parts of our world. Various types of data are
continuously streaming across many boundaries in the world with
different models, policies, and purposes. Additionally, this data is
usually analyzed or stored on edge or gateways devices which have
highly limited capabilities and are vulnerable to sophisticated
attacks. With the growth of connectivity between various heterogeneous
systems, numerous attack vectors are constantly evolving, that can
potentially be exploited for malicious or criminal purposes (e.g. data
breaches, identity theft, and stealing of intellectual property and
trade secrets, etc.). Recent cyberattacks dangerously aim a broad
array of computing systems varying from data centers and personal
machines to mobile devices and industrial control systems.

There is a growing need for new methodologies, tools, and techniques,
capable of extracting, preserving, and analyzing different evidence
trails in various networked services and devices such as routers,
firewalls, web proxies, and network monitoring tools. Additionally,
there is also a growing need for research in new systems that are
capable of analyzing network traffic, netflows, and systems logs.
Satisfying these demands will aid in reconstructing the timeline of
the cyber-crime/attack under investigation and, possibly, the
identification of the potential actor(s).

The evolution of networked technologies, such as the internet of
things and cyber-physical systems, possess challenges based on the
highly limited capabilities of their infrastructure devices and the
type of data that can be processed by these devices. Complicated
efforts are required in suitable and timely manners against any
detected threats. Moreover, new frameworks are required to collect and
preserve potential evidential data in suitable and timely manners as
well. To guarantee proper cyber-defenses and strategies against the
expanding landscape of criminal activities as well as rapidly
advancing network technologies such as SDN or 5G and 6G.

Papers on practical as well as on theoretical topics and problems in
various topics related to cyber forensics and threat investigations,
are invited, with special emphasis on novel techniques and tools to
collect data from networked devices and services in emerging networks
(such as the ones can be found in cyber-physical systems and Internet
of things). Topics include (but are not limited to):


===========================
TOPICS
===========================

- Advanced threat investigations, forensic and anti-forensic techniques
- Cooperative and distributed forensics and threat investigations
- Data exfiltration techniques from networked devices and services
(e.g. cyber-physical systems, and Internet-of-Things)
- Attack detection, traceback and attribution in SDN, 5G, and 6G
- Methods for reconstruction of internet activities in SDN, 5G, and 6G
- Forensics and threat investigations in IoT, Smart Grid, Smart Cars and Drones
- Forensics and threat investigations in peer-to-peer, social, and
cloud networks
- Vulnerability & threat detection and mitigation techniques for
networked services
- Novel large-scale investigations techniques to analyze intelligence
data sets and logs
- Tools and services for cyber forensics and threat investigations
- Machine learning applications in cybersecurity and threat intelligence
- Adversarial machine learning
- Advances in critical infrastructure security
- VoIP forensics, VoIPoW forensics
- Network investigations and Traffic Analysis
- Hardware Vulnerabilities and Device investigations
- Privacy-enhancing techniques for cyber forensics and threat investigations

We also encourage contributions describing innovative work in the
realm of cybersecurity, cyber defense, and digital crimes.

===========================
IMPORTANT DATES
===========================

- Submission deadline: October 16th, 2020
- Notification: November 2nd, 2020
- Camera ready: November 20th, 2020
- Workshop Day: January 9th, 2021

===========================
The Workshop Supported by
===========================

Association of Cyber Forensics and Threat Investigators (ACFTI)
https://www.acfti.org/

Industrial Cybersecurity Center (CCI)
https://www.cci-es.org/

^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2020-09-14 10:36 UTC | newest]

Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
     [not found] <CACsGmeQYYyEtN7DUfH=Z4WfZNKN3BVqOSZWwRTvxRwyQSWB0Ag@mail.gmail.com>
     [not found] ` <CACsGmeTfErsDaHDbptc=Hu_BtYpodQX3jm17R_xfywV_Udd-UA@mail.gmail.com>
     [not found]   ` <CACsGmeRnMkvR5GBygcZhO-xghpAJkGrKTBErJkYq8mGeF-uiAw@mail.gmail.com>
     [not found]     ` <CACsGmeT30URHCx=w3rwD3aB4UFLjxt1Y1u+41FHG_aiCkifLAA@mail.gmail.com>
     [not found]       ` <CACsGmeTBFJU+1RfncAhUBPy5KiBrS4Ejw5UT-hF8YO9U+n1pdg@mail.gmail.com>
     [not found]         ` <CACsGmeQKbB_UdDEC_aAMx+UNpgt4MQo8=cnD2aEcFkAeQYusXw@mail.gmail.com>
     [not found]           ` <CACsGmeRioeUJAd=9A6PgHeznmg8cyKrrtvugmr-Kso4jRhTA9Q@mail.gmail.com>
     [not found]             ` <CACsGmeRnqPawpm-ZdE1_E0gtsEACBM4cinaMmgjAuGg0gorptg@mail.gmail.com>
     [not found]               ` <CACsGmeS0Fh=qf87Lr-Gd1fQkN9tFPXqyhBOB=F6kNn0T21+o_g@mail.gmail.com>
     [not found]                 ` <CACsGmeTr_P1wABFzqa-+D8OQWqAifr-NMOXxWwOBwQxAyWqGeg@mail.gmail.com>
     [not found]                   ` <CACsGmeSv56HV2CMQdvNZAMy6FjA5O_iwfV0P57-UZPDfVekveQ@mail.gmail.com>
     [not found]                     ` <CACsGmeRFV3whMUivpJusgLEhG9V2b89yj1rNENOmeRweTMe5ZA@mail.gmail.com>
2020-09-14 10:35                       ` [Caml-list] [CFP] IEEE CCNC 2021 WKSHPS: 2nd International Workshop on Cyber Forensics & Advanced Threat Investigations in Emerging Networks Chilean Scholar

caml-list - the Caml user's mailing list

This inbox may be cloned and mirrored by anyone:

	git clone --mirror http://inbox.vuxu.org/caml-list
	git clone --mirror https://inbox.ocaml.org/caml-list

	# If you have public-inbox 1.1+ installed, you may
	# initialize and index your mirror using the following commands:
	public-inbox-init -V1 caml-list caml-list/ http://inbox.vuxu.org/caml-list \
		caml-list@inria.fr
	public-inbox-index caml-list

Example config snippet for mirrors.
Newsgroup available over NNTP:
	nntp://inbox.vuxu.org/vuxu.archive.caml-list


AGPL code for this site: git clone https://public-inbox.org/public-inbox.git