CSDFC - Special Session on Cyber Security, Digital Forensics & Cryptography

The fields of cyber security, digital forensics and cryptography have grown rapidly over the last decade due to the rise of the Internet, smart devices, artificial intelligence and associated crimes. As the prevalence and usage of network systems and digital devices increases, it poses significant security concerns and increases the likelihood of these systems being used for criminal and malicious activities. The existing security controls and mitigation techniques could be no longer valid and adaptive to the evolving cybersecurity landscape, raising challenges for security and digital forensic practitioners. This special session seeks novel research and high-quality submissions that are solicited in the areas of cyber security digital forensics and cryptography. Topics of interest comprise but are not limited to:

CYBER SECURITY

·         Applied machine learning in security and privacy

·         Adversarial AI in cybersecurity

·         Attackers and cybercrime operators

·         Big data security and privacy

·         Blockchains and distributed ledger security

·         Cloud and Edge computing security

·         Cyber threat modelling and analysis

·         Cyber security in finance

·         Formal Methods Application in Security

·         Healthcare security and privacy

·         Intrusion Detection Systems and Anomaly detection

·         Internet of Things security

·         Malware and Ransomware analysis

·         Novel attack vectors in cyber security

·         Network, system, protocol, and web security

·         Physical Layer Security

·         Privacy and Trust

·         Security in E-Commerce and M-Commerce

·         Software safety, security and reliability

·         Techniques, framework for trustworthy AI systems

·         Wired and Wireless Network Security and Privacy

 

DIGITAL FORENSICS

·         Anti-forensics and anti-anti-forensics

·         Big Data Forensics

·         Cloud and virtualized environment investigations

·         Computer Forensics and e-Discovery

·         Data and Data Center Forensics

·         Digital Evidence Recovery

·         Digital investigation case management

·         Digital forensic preparedness / readiness

·         Digital forensic tool validation

·         Financial cybercrime investigations

·         Forensic Geographical Information Systems (GIS)

·         Intrusion and Attack Readiness

·         Machine learning and data mining for digital evidence extraction/query

·         Mobile and embedded device forensics

·         Network and distributed system forensics

·         SCADA system forensics

·         Vehicle forensics (e.g., drones, cars)

 

CRYPTOGRAPHY

·         Applied cryptography

·         Cryptanalysis

·         Cryptography

·         Cryptographic primitives and protocols

·         Data Encryption Applications

·         Foundational theory and mathematics

·         Post-quantum cryptography

·         Steganography and steganalysis

 

SESSION CHAIRS

·         Chairs:

Prof. Dr. Kim-Kwang Raymond Choo, University of Texas at San Antonio, TX, USA

·         Co-Chairs:

Assoc. Prof. Tram Truong-Huu, Singapore Institute of Technology (SIT), Singapore

Assoc. Prof. Dr Nhien-An Le-Khac, University College Dublin, Ireland

Dr. Le Kim Hung, University of Information Technology, Vietnam National University Ho Chi Minh City, Vietnam