|
|
News, from the Media
Listing of academic positions available by
Cynthia Irvine
The Computer Science (CS) Department at the University of Idaho (UI) College of Engineering (CoEngr) seeks 3 faculty at the rank of Assistant/Associate Professor in either Moscow or Idaho Falls with emphasis in 1) large-scale database management (big data), data analytics and data mining, machine learning, visualization, and/or high performance computing or 2) Expertise in cybersecurity is sought for industrial control systems including embedded systems security, computer and network security, or digital forensics, reverse engineering hardware/software, malware analysis, specialized experience with power and energy systems, operations technology (OT). Startup funding and research support will be extended to help the new appointees establish a successful career and develop an externally funded research program. The successful candidates will have an earned PhD in CS or a closely related field, demonstrated strong commitment to research and teaching, excellent written and oral communication skills, ability to work with collaborating entities (industry, national laboratories, government and academia) and authorized to work in the US.
The Idaho Falls campus is located at University Place at the Center for Advanced Energy Studies (CAES) and the Idaho National Laboratory (INL). Teaching/advising is primarily graduate (MS and PhD) studies although video conferencing delivery of upper division undergraduate (UG) courseware to either Moscow or Coeur d'Alene may be required. The main campus in Moscow is home to nearly 12,000 students where the CS program provides BS, MS and PhD degrees and the Coeur d'Alene campus provides upper division UG courseware for the BSCS as well as CS graduate degrees. Faculty will engage and teach graduate students, mentor graduate student research and demonstrate success in scholarly pursuits (funding, publications, and presentations) toward sustaining research program funding.
Data Science and Analytics (Idaho Falls https://uidaho.peopleadmin.com/postings/15335 )
We seek candidates with the ability to conduct numeral analysis, manage experimental facilities, engineer/analyze and manage (big) data, utilize/innovate data visualization tools and techniques (machine learning, data mining, distributed storage and processing and/or high performance computing (HPC) and related AI data analytics techniques.
Security of Cyber Physical Systems (Idaho Falls https://uidaho.peopleadmin.com/postings/15996) and Moscow https://uidaho.peopleadmin.com/postings/15978) The CoEngr has received a $2.1M Idaho Global Entrepreneurial Mission (IGEM) grant to build educational and research capacity in Security Management of Cyber Physical Control Systems (CPCS). CPCS are the systems that underpin key sectors of our national economy, from our transportation network to our water supply to the fundamental elements of our power grid (e.g., SCADA and ICS). We seek candidates that can team with industry including Idaho National Laboratory (INL) and other universities (including Boise State University and Idaho State University) to develop products and build expertise to protect these vital systems including foster technology transfer/commercialization to strengthen and expand the workforce by delivering cyber security expertise to Idaho industry and improve the talent pipeline for computer science and engineering graduates. These faculty will become a members of the research Center for Secure and Dependable Systems (CSDS). We seek candidates with expertise in cybersecurity is sought for industrial control systems including embedded systems security, computer and network security, or digital forensics, reverse engineering hardware/software, malware analysis, specialized experience with power and energy systems, operations technology (OT).
Existing research centers of excellence include the Institute for Bioinformatics and Evolutionary Studies, National Institute for Advanced Transportation Technology, Center for Secure and Dependable Systems, Center for Modeling Complex Interactions and the Northwest Knowledge Network. A significant number of our faculty have joint appointments with INL. We are a certified National Center of Academic Excellence (CAE) in Information Assurance and Cybersecurity Education which is also a $3.7M NSF Scholarship for Service funded enterprise.
We highly encourage candidates from underrepresented US minority groups and/or females to apply for this position. The UI is an affirmative action/equal opportunity employer and does not discriminate on the basis of age, color, disability, gender, gender identity, marital status, national or ethnic origin, race, religion, sexual orientation or veteran status.
Jennifer Flynn, MPA
Assistant to the Center Executive Officer, Dr. Marc Skinner
Office-208-757-5402
Cell-503-621-7718
http://www.uidaho.edu/idahofalls/
Conference and Workshop Announcements
Cipher
calls-for-papers
and
calendar
Calendar
Cipher calendar announcements are on Twitter; follow "ciphernews"
new calls or announcements added since Cipher E134
(the calls-for-papers and the calendar announcements may differ
slightly in content or time of update):
PETS 2017 17th Privacy Enhancing Technologies Symposium, Minneapolis, MN, USA, July 18 - July 21, 2017. (Submissions Due 31 August 31 2016; 30 November 2016; 28 February 28 2017)
The annual Privacy Enhancing Technologies Symposium (PETS) brings together privacy experts from around the world to present and discuss recent advances and new perspectives on research in privacy technologies. Papers undergo a journal-style reviewing process and accepted papers are published in Proceedings on Privacy Enhancing Technologies (PoPETs), a scholarly, open access journal. Submitted papers should present novel practical and/or theoretical research into the design, analysis, experimentation, or fielding of privacy-enhancing technologies. While PETS/PoPETs has traditionally been home to research on anonymity systems and privacy-oriented cryptography, we strongly encourage submissions on a number of both well-established and emerging privacy-related topics, for which examples are provided below. PoPETs also solicits submissions for Systematization of Knowledge (SoK) papers. These are papers that critically review, evaluate, and contextualize work in areas for which a body of prior literature exists, and whose contribution lies in systematizing the existing knowledge in that area.
IEEE MultiMedia, Special Issue on Cybersecurity for Cyber-Enabled Multimedia Applications, (Submissions Due 1 December 2016)
Guest Editors: Qun Jin (Waseda University, Japan),
Yong Xiang (Deakin University, Australia),
Guozi Sun (Nanjing University of Posts and Telecommunications, China),
Yao Liu (University of South Florida, USA),
and Chin-Chen Chang (Feng Chia University, Taiwan)
With the rapid popularity of social network applications and advanced
digital devices, the past few years have witnessed the explosive growth
of multimedia big data in terms of both scale and variety. Such
increasing multimedia data determines a new way of communication:
seamless network connection, the joyfulness user experience, and free
information sharing. Meanwhile, security issues related to such multimedia
big data have arisen, and an urgent demand for novel technologies has
emerged to deal with copyright protection, multimedia forgery detection,
and cybersecurity, especially for cyber-enabled multimedia applications.
Although many promising solutions have been proposed recently, it is
still challenging for the multimedia community to effectively and
efficiently handle security challenges over large-scale multimedia
data, especially when the scale comes up from tens of thousands to
tens of millions or even billions. This special issue aims to bring
together the greatest research efforts in cybersecurity for cyber-enabled
multimedia applications to specifically deal with the security
challenges in the multimedia big data era. The main goals are to
investigate novel ideas and research work of cybersecurity issues with
multimedia big data; find or develop effective and efficient techniques
and methods in computer vision, multimedia processing, and sensor
networks for specific cybersecurity tasks, such as data hiding, and
forensics; survey the progress of this area in the past years; and
explore interesting and practical cyber-enabled multimedia applications.
Submissions should be unpublished and present innovative research work
offering contributions either from a methodological or application
point of view. Topics of interest include, but are not limited to,
the following:
CPSS 2017 3rd ACM Cyber-Physical System Security Workshop, Abu Dhabi, UAE, April 2, 2017. (Submissions Due 1 December 2016)
Cyber-Physical Systems (CPS) consist of large?scale interconnected systems of heterogeneous components interacting with their physical environments. There are a multitude of CPS devices and applications being deployed to serve critical functions in our lives. The security of CPS becomes extremely important. This workshop will provide a platform for professionals from academia, government, and industry to discuss how to address the increasing security challenges facing CPS. Besides invited talks, we also seek novel submissions describing theoretical and practical security solutions to CPS. Papers that are pertinent to the security of embedded systems, SCADA, smart grid, and critical infrastructure networks are all welcome, especially in the domains of energy and transportation. Topics of interest include, but are not limited to:
USEC 2017 Usable Security Mini Conference, Co-located with NDSS 2017, San Diego, California, USA, February 26, 2017. (Submissions Due 1 December 2016)
One cannot have security and privacy without considering both the technical and human aspects thereof. If the user is not given due consideration in the development process, the system is likely to enable users to protect their privacy and security in the Internet. Usable security and security is more complicated than traditional usability. This is because traditional usability principles cannot always be applied. For example, one of the cornerstones of usability is that people are given feedback on their actions, and are helped to recover from errors. In authentication, we obfuscate password entry (a usability fail) and we give people no assistance to recover from errors. Moreover, security is often not related to the actual functionality of the system, so people often see it as a bolt-on, and an annoying hurdle. These and other usability challenges of security are the focus of this workshop. We invite submissions on all aspects of human factors including mental models, adoption, and usability in the context of security and privacy. USEC 2017 aims to bring together researchers already engaged in this interdisciplinary effort with other computer science researchers in areas such as visualization, artificial intelligence, machine learning and theoretical computer science as well as researchers from other domains such as economics, legal scientists, social scientists, and psychology. We particularly encourage collaborative research from authors in multiple disciplines. It is the aim of USEC to contribute to an increase of the scientific quality of research in human factors in security and privacy. To this end, we encourage the use of replication studies to validate research findings. This important and often very insightful branch of research is sorely under-represented in human factors in security and privacy research to date. Papers in these categories should be clearly marked as such and will not be judged against regular submissions on novelty. Rather, they will be judged based on scientific quality and value to the community. We also encourage reports of failed experiments, since their publication will serve to prevent others falling into the same traps. Topics include, but are not limited to:
Advances in Multimedia journal, Special Issue on Emerging Challenges and Solutions for Multimedia Security, (Submissions Due 2 December 2016)
Guest Editors: Wojciech Mazurczyk (Warsaw University of Technology, Poland),
Artur Janicki (Warsaw University of Technology, Poland),
Hui Tian (National Huaqiao University, China),
and Honggang Wang (University of Massachusetts Dartmouth, USA)
Today's world's societies are becoming more and more dependent on open
networks such as the Internet, where commercial activities, business
transactions, government services, and entertainment services are
realized. This has led to the fast development of new cyber threats
and numerous information security issues which are exploited by cyber
criminals. The inability to provide trusted secure services in
contemporary computer network technologies could have a tremendous
socioeconomic impact on global enterprises as well as on individuals.
In the recent years, rapid development in digital technologies has been
augmented by the progress in the field of multimedia standards and the
mushrooming of multimedia applications and services penetrating and
changing the way people interact, communicate, work, entertain, and
relax. Multimedia services are becoming more significant and popular
and they enrich humans' everyday life. Currently, the term multimedia
information refers not only to text, image, video, or audio content
but also to graphics, flash, web, 3D data, and so forth. Multimedia
information may be generated, processed, transmitted, retrieved,
consumed, or shared in various environments. The lowered cost of
reproduction, storage, and distribution, however, also invites much
motivation for large-scale commercial infringement. The above-mentioned
issues have generated new challenges related to protection of multimedia
services, applications, and digital content. Providing multimedia security
is significantly different from providing typical computer information
security, since multimedia content usually involves large volumes of
data and requires interactive operations and real-time responses.
Additionally, ensuring digital multimedia security must also signify
safeguarding of the multimedia services. Different services require
different methods for content distribution, payment, interaction, and
so forth. Moreover, these services are also expected to be "smart" in
the environment of converged networks, which means that they must adapt
to different network conditions and types as multimedia information can
be utilized in various networked environments, for example, in fixed,
wireless, and mobile networks. All of these make providing security for
multimedia even harder to perform. This special issue intends to bring
together diversity of international researchers, experts, and practitioners
who are currently working in the area of digital multimedia security.
Researchers both from academia and industry are invited to contribute
their work for extending the existing knowledge in the field. The aim of
this special issue is to present a collection of high-quality research papers
that will provide a view on the latest research advances not only on secure
multimedia transmission and distribution but also on multimedia content
protection. Potential topics include, but are not limited to:
IWSPA 2017 3rd ACM International Workshop on Security and Privacy Analytics, Co-located with ACM CODASPY 2017, Scottsdale, Arizona, USA, March 24, 2017. (Submissions Due 6 December 2016)
Increasingly, sophisticated techniques from machine learning, data mining, statistics and natural language processing are being applied to challenges in security and privacy fields. However, experts from these areas have no medium where they can meet and exchange ideas so that strong collaborations can emerge, and cross-fertilization of these areas can occur. Moreover, current courses and curricula in security do not sufficiently emphasize background in these areas and students in security and privacy are not emerging with deep knowledge of these topics. Hence, we propose a workshop that will address the research and development efforts in which analytical techniques from machine learning, data mining, natural language processing and statistics are applied to solve security and privacy challenges ("security analytics"). Submissions of papers related to methodology, design, techniques and new directions for security and privacy that make significant use of machine learning, data mining, statistics or natural language processing are welcome. Furthermore, submissions on educational topics and systems in the field of security analytics are also highly encouraged.
IFIPSEC 2017 32nd IFIP TC-11 SEC 2017 International Information Security and Privacy Conference, Rome, Italy, May 29-31, 2017. (Submissions Due 23 December 2016)
The IFIP SEC conference is the flagship event of the International Federation for Information Processing (IFIP) Technical Committee 11 on Security and Privacy Protection in Information Processing Systems (TC-11, www.ifiptc11.org). Previous SEC conferences were held in Ghent (Belgium) 2016, Hamburg (Germany) 2015, Marrakech (Morroco) 2014, Auckland (New Zealand) 2013, Heraklion (Greece) 2012, Lucerne (Switzerland) 2011, and Brisbane (Australia) 2010. We seek submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and privacy protection in ICT Systems. Topics of interest include, but are not limited to:
BioSTAR 2017 International Workshop on Bio-inspired Security, Trust, Assurance and Resilience, Co-located with the 38th IEEE Symposium on Security and Privacy (IEEE S&P 2017), San Jose, CA, USA, May 25, 2017. (Submissions Due 15 January 2017)
As computing and communication systems continue to expand and offer new services, these advancements require more dynamic, diverse, and interconnected computing infrastructures. Unfortunately, defending and maintaining resilient and trustworthy operation of these complex systems are increasingly difficult challenges. Conventional approaches to Security, Trust, Assurance and Resilience (STAR for short) are often too narrowly focused and cannot easily scale to manage large, coordinated and persistent attacks in these environments. Designs found in nature are increasingly used as a source of inspiration for STAR and related networking and intelligence solutions for complex computing and communication environments. Nature's footprint is present in the world of Information Technology, where there are an astounding number of computational bio-inspired techniques. These well-regarded approaches include genetic algorithms, neural networks, ant algorithms, immune systems just to name a few. For example several networking management and security technologies have successfully adopted some of nature's approaches, such as swarm intelligence, artificial immune systems, sensor networks, moving target defense, diversity-based software design, etc. Nature has also developed an outstanding ability to recognize individuals or foreign objects and adapt/evolve to protect a group or a single organism. Solutions that incorporate these nature-inspired characteristics often have improved performance and/or provided new capabilities beyond more traditional methods. The aim of this workshop is to bring together the research accomplishments provided by the researchers from academia and the industry. The other goal is to show the latest research results in the field of nature-inspired STAR aspects in computing and communications. Topics of interests include, but are not limited to:
WTMC 2017 2nd International Workshop on Traffic Measurements for Cybersecurity, Co-located with the 38th IEEE Symposium on Security and Privacy (IEEE S&P 2017), San Jose, CA, USA, May 25, 2017. (Submissions Due 15 January 2017)
Current communication networks are increasingly becoming pervasive, complex, and ever-evolving due to factors like enormous growth in the number of network users, continuous appearance of network applications, increasing amount of data transferred, and diversity of user behaviors. Understanding and measuring traffic in such networks is a difficult yet vital task for network management but recently also for cybersecurity purposes. Network traffic measuring and monitoring can, for example, enable the analysis of the spreading of malicious software and its capabilities or can help to understand the nature of various network threats including those that exploit users' behavior and other users' sensitive information. On the other hand network traffic investigation can also help to assess the effectiveness of the existing countermeasures or contribute to building new, better ones. Recently, traffic measurements have been utilized in the area of economics of cybersecurity e.g. to assess ISP or to estimate the revenue of cyber criminals. The aim of this workshop is to bring together the research accomplishments provided by the researchers from academia and the industry. The other goal is to show the latest research results in the field of cybersecurity and understand how traffic measurements can influence it. We encourage prospective authors to submit related distinguished research papers on the subject of both: theoretical approaches and practical case reviews. This workshop presents some of the most relevant ongoing research in cybersecurity seen from the traffic measurements perspective. The workshop will be accessible to both non-experts interested in learning about this area and experts interesting in hearing about new research and approaches. Topics of interest include, but are not limited to:
WoC 2017 3rd IEEE International Workshop on Container Technologies and Container Clouds, Held in conjunction with IEEE International Conference on Cloud Engineering (IC2E 2017), Vancouver, Canada, April 4-7, 2017. (Submissions Due 15 January 2017)
Containers are a lightweight OS-level virtualization abstraction primarily based on namespace isolation and control groups. In the recent years, container-based virtualization for applications has gained immense popularity thanks to the success of technologies like Docker. Container packaging mechanisms like Docker, LXD and Rkt, as well as management frameworks like Kubernetes, Mesos, etc., are witnessing widespread adoption in the industry today. Container technologies have eliminated the feature parity between development and production environment by enabling developers to package applications and their dependencies as a single unit that can be run across diverse operating environments. Though containers provide a great amount of flexibility and portability from a developer's perspective, there are several important challenges that need to be addressed by the infrastructure provider, in order to run these virtualized applications in a cloud environment. The second workshop on container technologies and container clouds solicits contributions in this area from researchers and practitioners in both the academia and industry. The workshop welcomes submissions describing unpublished research, position papers as well as deployment experiences on various topics related to containers as outlined below:
WACC 2017 International Workshop on Assured Cloud Computing and QoS aware Big Data, Held in conjunction with 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID 2017), Madrid, Spain, May 14-17, 2017. (Submissions Due 15 January 2017)
WACC draws together researchers, practitioners, and thought leaders from government, industry, and academia. The workshop provides a forum of dialogue centered upon the development and advancement of an effort to design, implement, and evaluate dependable cloud architectures that can provide assurances with respect to security, reliability, and timeliness of computations (or services). Some new "assured" target applications include, but are not limited to, dependable Big Data applications and streaming, data analytics and its tools, real-time computations for monitoring, control of cyber-physical systems such as power systems, and mission critical computations for rescue and recovery. The technical emphasis of WACC is design, implementation, and evaluation of cloud services, data analytics tools, and security solutions to enable dependable Big Data applications. Research on cloud services, ICT-skilled data scientists and application developers can find complementary solutions and partnerships to evaluate and integrate additional solutions. Data scientists can find new tools that could address existing needs.
IoTPTS 2017 3rd International Workshop on IoT Privacy, Trust, and Security, Held in conjunction with the 12th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2017), Abu Dhabi, UAE, April 2, 2017. (Submissions Due 20 January 2017)
The Internet of Things (IoT) is the next great technology frontier. At a basic level, IoT refers simply to networked devices, but the IoT vision is a complex ecosystem that ranges from cloud backend services and big-data analytics to home, public, industrial, and wearable sensor devices and appliances. Architectures for these systems are in the formative stages, and now is the time to ensure privacy, trust, and security are designed into these systems from the beginning. We encourage submissions on all aspects of IoT privacy, trust, and security. Topics of interest include (but are not limited) to the following areas:
DSC 2017 IEEE Conference on Dependable and Secure Computing, Taipei, Taiwan, August 7-10, 2017. (Submissions Due 21 January 2017)
The IEEE Conference on Dependable and Secure Computing solicits papers, posters, practices, and experiences for presenting innovative research results, problem solutions, and new challenges in the field of dependable and secure computing. The whole spectrum of IT systems and application areas, including hardware design and software systems, with stringent relevant to dependability and security concerns are of interest to DSC. Authors are invited to submit original works on research and practice of creating, validating, deploying, and maintaining dependable and secure systems. The conference has two tracks for research papers, the "Computer Systems, Networks, and Software" track and the "System Electronics, VLSI, and CAD" track. In addition to research papers, the DSC conference will also include a submission category for experience and practice papers on new findings in the two aforementioned categories. The PC will evaluate a submission to the experience and practice track with the understanding that it predominantly contributes to the VLSI/CAD design knowhow or the extension of the community's knowledge about how the security protection of known techniques fares in real-world operations. Authors have to submit a short paper along with slides and an optional supplemental video to demonstrate the implementation and/or the practicability of the work.
IWPE 2017 3rd International Workshop on Privacy Engineering, Co-located with IEEE Symposium on Security and Privacy (SP 2017), San Jose, CA, USA, May 25, 2017. (Submissions Due 3 February 2017)
Ongoing news reports regarding global surveillance programs, massive personal data breaches in corporate databases, and notorious examples of personal tragedies due to privacy violations have intensified societal demands for privacy-friendly systems. In response, current legislative and standardization processes worldwide aim to strengthen individual's privacy by introducing legal, organizational and technical frameworks that personal data collectors and processors must follow. However, in practice, these initiatives alone are not enough to guarantee that organizations and software developers will be able to identify and adopt appropriate privacy engineering techniques in their daily practices. Even if so, it is difficult to systematically evaluate whether the systems they develop using such techniques comply with legal frameworks, provide necessary technical assurances, and fulfill users' privacy requirements. It is evident that research is needed in developing techniques and tools that can aid the translation of legal and normative concepts, as well as user expectations into systems requirements. Furthermore, methods that can support organizations and engineers in developing (socio-)technical systems that address these requirements is of increasing value to respond to the existing societal challenges associated with privacy. In this context, privacy engineering research is emerging as an important topic. Engineers are increasingly expected to build and maintain privacy-preserving and data-protection compliant systems in different ICT domains such as health, energy, transportation, social computing, law enforcement, public services; based on different infrastructures such as cloud, grid, or mobile computing and architectures. While there is a consensus on the benefits of an engineering approach to privacy, concrete proposals for models, methods, techniques and tools that support engineers and organizations in this endeavor are few and in need of immediate attention. To cover this gap, the topics of the International Workshop on Privacy Engineering (IWPE'17) focus on all the aspects surrounding privacy engineering, ranging from its theoretical foundations, engineering approaches, and support infrastructures, to its practical application in projects of different scale. Specifically, we are seeking the following kinds of papers: (1) technical papers that illustrate the engineering or application of a novel formalism, method or other research finding (e.g., a privacy enhancing protocol) with preliminary evaluation; (2) experience and practice papers that describe a case study, challenge or lessons learned from in a specific domain; (3) early evaluations of tools and other infrastructure that support engineering tasks in privacy requirements, design, implementation, testing, etc.; (4) interdisciplinary studies or critical reviews of existing privacy engineering concepts, methods, tools and frameworks; or (5) vision papers that take a clear position informed by evidence based on a thorough literature review. IWPE'17 welcomes papers that focus on novel solutions on the recent developments in the general area of privacy engineering. Topics of interests include, but are not limited to:
SOUPS 2017 13th Symposium on Usable Privacy and Security, Santa Clara, CA, USA, July 12-14,2017. (Submissions Due 1 March 2017)
The 2017 Symposium on Usable Privacy and Security (SOUPS) will bring together an interdisciplinary group of researchers and practitioners in human computer interaction, security, and privacy. We invite authors to submit previously unpublished papers describing research or experience in all areas of usable privacy and security. We welcome a variety of research methods, including both qualitative and quantitative approaches. Topics include, but are not limited to:
Journal of Visual Communication and Image Representation, Special Issue on Data-driven Multimedia Forensics and Securit, (Submissions Due 28 February 2017)
Guest Editors: Anderson Rocha (University of Campinas, Brazil),
Shujun Li (Universityof Surrey, UK),
C.-C. Jay Kuo (University of Southern California, US),
Alessandro Piva (University of Florence, Italy),
and Jiwu Huang (Shenzhen University, China)
In the last decade a large number of multimedia forensic and security
techniques have been proposed to evaluate integrity of multimedia data.
However, most of these solutions adopt very limiting and simplifying
working conditions, being more appropriate for laboratorial tests than
for real-world deployment. Unfortunately, with big data requirements on
the table, the stakes are higher now. Forensics and security experts are
no longer required to provide the society with solutions for specific cases.
Instead, we need to cope with shear amounts of data and in different
operational and acquisition conditions. In addition to the traditional
multimedia forensics and security research around integrity and
authentication, digital images and videos have also been the core
components in other related application domains, e.g. biometrics,
image and video based information hiding, image and video collection
forensics, automatic child porn detection, digital triage of image and
video evidence, attacks on image and video-based CAPTCHAs, etc. A common
feature of the above listed multimedia forensics and security problems is
that they can all be solved by machine learning techniques driven by
training data. In recent years, some new and powerful modeling and machine
learning paradigms have been developed that allow us to glean over massive
amounts of data and directly extract useful information for proper decision
making, thus creating new techniques to solve those multimedia forensics and
security problems with improved performance. This Special Issue invites
researchers in all related fields (including but not limited to image and
video signal processing, machine learning, computer vision and pattern
recognition, cyber security, digital forensics) to join us in a quest for
pinpointing the next-generation image and video forensics and security
solutions of tomorrow, capable of processing image and video data using the
recently-developed deep learning paradigm and other new modelling and
learning techniques. ALL submissions must highlight their machine-learning
based approach and discuss how their solutions deal with large collections of
data. The core data used in your work should be visual data (images and videos).
Video data may also include RGB, IR, and depth data. The topics of interest
of this Special Issue are listed below. The list is not exhaustive and
prospective authors should contact the editors in case of any question.
Submissions can contemplate original research, serious dataset collection
and benchmarking, or critical surveys. Example Topics of Interest:
IEEE Security & Privacy Magazine, Special issue on Digital Forensics, (Submissions Due 1 March 2017)
Guest Editors: Wojciech Mazurczyk (Warsaw University of Technology &
FernUniversität in Hagen, Poland), Steffen Wendzel (Fraunhofer FKIE, Germany),
Luca Caviglione (National Research Council of Italy, Italy),
and Simson L. Garfinkel (National Institute of Standards and
Technology, USA)
Modern societies are becoming increasingly dependent on open networks where
commercial activities, business transactions, and government services are
delivered. Despite the benefits, these networks have led to new cyberthreats
and cybersecurity issues. Abuse of and mistrust for telecommunications and
computer network technologies have significant socioeconomic impacts on
global enterprises as well as individuals. Cybercriminal activities such as
fraud often require the investigations that span across international
borders. In addition, they're often subject to different jurisdictions and
legal systems. The increased intricacy of the communication and networking
infrastructure complicates investigation of such activities. Clues of
illegal digital activities are often buried in large volumes of data that
makes crime detection and evidence collection difficult. This poses new
challenges for law enforcement and compels computer societies to utilize
digital forensics to combat the growing number of cybercrimes. Forensic
professionals must be fully prepared to gather effective digital evidence.
Forensic techniques must keep pace with new technologies; therefore,
digital forensics is becoming more important for law enforcement and
information and network security. This multidisciplinary area includes
several fields, including law, computer science, finance, networking,
data mining, and criminal justice. It faces diverse challenges and issues
in terms of the efficiency of digital evidence processing and related
forensic procedures. This special issue aims to collect the most relevant
ongoing research efforts in digital forensics field. Topics include, but
aren't limited to:
Staying in touch....
Changing your email address? Please send updates to cipher@ieee-security.org
IEEE Computer Society's Technical Committee on Security and Privacy
TC home page | TC Officers | |
How to join the TCSP (or other TCs) | Open Access Proceedings | |
Cipher past issues archive | ||
IEEE Computer Society | Cipher Privacy Policy |