Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field. Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.
Potential topics include, but are not limited to:
Digital Data and Evidence Collection
Identification, authentication and collection of digital evidence
Extraction and management of forensic artifacts
Identification and redaction of personally identifying/sensitive information
Evidence and digital memory preservation, curation and storage
Compliance of architectures and processes (including network processes) with forensic requirements
Data, digital knowledge, and web mining systems for identification and authentication of data
Honeynets and other deception technologies that collect data for forensic analysis
Innovative forensic techniques for new technologies
Digital Evidence Management, Integrity and Analytics:
Advanced search, analysis, and presentation of digital evidence
Cybercrime analysis, modeling and reconstruction technologies
Tools and techniques for combining digital and non-digital evidence
Supporting both qualitative and quantitative evidence
Handling of evidence and the preservation of data integrity and admissibility
Digital evidence in the face of encryption
Forensic-support technologies: forensic-enabled and proactive monitoring/response
Scientific Principle-Based Digital Forensic Processes
Examination environments for digital data
Legal/technical aspects of admissibility and evidence tests
Forensic tool validation: legal implications and issues
Handling increasing volumes of digital discovery
Computational Forensics and Validation Issues in Forensic Authentication and Validation.
Forensic Readiness by Design
Forensics tool validation
Computational systems and computational forensic analysis
Legal, Ethical and Technical Challenges
Forensics, policy and ethical implications new and evolving technologies
Legal and privacy implications for digital and computational forensic analysis
New Evidence Decisions
Legal case construction and digital evidence support
Transnational Investigations/Case Integration
Managing geographically, politically and/or jurisdictionally dispersed data artifacts
Case studies illustrating privacy, legal and legislative issues
Courtroom expert witness and case presentation
The Impacts of the following on any of the above
Technological challenges
Legal and ethical challenges
Economic challenges
Political challenges
Cultural and professional challenges
New Trends (Internet of Things, Cloud Computing, Smart City, Big Data, etc.)
05月22日
2017
05月26日
2017
注册截止日期
留言