![]() | CCC2017: The Second International Cybersecurity and Cyberforensics Conference Al-Balqa Applied University Al-Salt, Jordan, November 21-23, 2017 |
Abstract registration deadline | October 9, 2017 |
Submission deadline | October 9, 2017 |
Author acceptance notification | October 16, 2017 |
Final paper camera ready copy | October 20, 2017 |
Author Registration deadline | October 21, 2017 |
Cybersecurity has become an important research and development area for academia, government, and industry in recent years. The advent of big data, social media and mobile technology growth and the coming of the internet of things (IoT) have led to new opportunities in cyber security and cyber forensic work. To counter this, a multidisciplinary effort involving stakeholders from cyber security, the legal profession, academia, public citizens, and law enforcement agencies is required. The 2nd Cybersecurity and Cyberforensics Conference (CCC 2017) brings together thought-leaders from these separate fields to discuss current and future approaches, technologies and legislation pertinent to the detection, prevention, investigation and prosecution of cybercrime and cyber attacks. The conference offers an interdisciplinary venue to discuss challenges, technologies, and emerging trends.
CCC 2017 invites researchers and practitioners from academia, industry and government, and accepts original, previously unpublished work. The scope of the conference is narrow to ensure a complementary match between capability and need. Papers should either be empirically or rationally based explorations of problems in cyber security and cyber forensic, or propose solutions and/or countermeasures to the most pressing cybercrime.
All papers will be peer reviewed by three reviewers at least. Proceedings, all accepted papers will be published by Conference Publishing Services (CPS). Authors of selected papers will also be invited to prepare extended papers of their work for publication in the International Journal of Electronic Security and Digital Forensics
Submission Guidelines
All papers must be original and not simultaneously submitted to another journal or conference. High-quality papers in all CCC 2017 related areas that, at the time of submission, are not under review and have not already been published or accepted for publications elsewhere are solicited. Accepted papers will be accepted as ‘regular’ papers up to 8 pages, we solicit research and application papers in English (8 x A4 pages, ~ 5000 words) representing original, previously unpublished work. Submitted papers will be evaluated based on originality, significance, technical soundness, and clarity of exposition. Papers should clearly indicate the contribution they make towards solving the problems of cybercrime or cyberforensics and the domains or environments to which the contribution is applicable.
Simultaneous submission of the same work to multiple venues, submission of previously published work, or plagiarism constitutes dishonesty or fraud. CCC 2017, like other scientific and technical conferences and journals, prohibits these practices and may take action against authors who have committed them.
Submission of a paper via https://easychair.org/conferences/?conf=ccc20171 implies that should the paper be accepted, at least one of the authors will register for the CCC 2017 and present the paper in the Conference.
Submitted papers will be evaluated based on originality, significance, technical soundness, and clarity of exposition. Papers should clearly indicate contribution to field. Simultaneous submission of the same work to multiple venues, submission of previously published work, or plagiarism constitutes dishonesty or fraud. CCC 2017, like other scientific and technical conferences and journals, prohibits these practices and may take action against authors who have committed them. If you experience any problems during the upload process of your paper on Easy Chair, please contact us.
When you submit your proposal, you will be asked to enter the paper title, keywords, abstract text, subject category, and authors' contact information. You will also be asked to upload the file containing your proposal. Depending on the size of your file and your internet connection speed, the file upload may take a few minutes. If all necessary information has been entered, the system will display a short message giving you the ID number of your paper. You will also receive an e-mail notification with the details of your submission. If you do not see the confirmation page after uploading your file, you may not have successfully completed your file upload. If you encounter trouble, please contact us.
To make the review process easy for reviewers, and to assure that paper proposals and final papers are readable through the online review system. Authors are asked to submit proposals that are formatted according to the instructions given in the Author kit. Paper proposal document formatting is identical to final paper formatting. Paper proposals not conforming to the required format will be rejected without review. Similarly, final papers not conforming to the required format will not appear in the proceedings.
The following paper categories are welcome:
- Full papers
- Short papers
- Posters
List of Topics
- Attack strategy analysis & modelling
- Cybercrime scenario analysis and reconstruction
- Techniques for evidence collection, search, and analysis
- Security & Social Networks
- Anomaly detection of web-based attacks
- Malicious Spam detection
- Botnet Detection and prevention
- Wireless Network Security and Forensics
- Cloud Computing Security and the Forensics of Big Data
- Privacy, ethical and legal issues
- Forensic Investigation of the Internet of Things
- Anti-Forensics and Data Hiding Techniques and Discoveries
- Malware Analysis and Memory Forensic Techniques
- Advanced Persistent Threats (APTs)
- System Forensic Techniques for Windows, Linux, Mac, etc
- File System Forensic Analysis
- Hacking Techniques: Client-Side Attacks
- Malicious Content Detection and Analysis Techniques
- Societal Impact of Cybercrime
- Defense against cyberterrorism
- Monitoring and incident response
- Tools and techniques for network forensics
- Methodologies for digital forensics
- Applications of Data Mining for Cybersecurity
- Cybercrime detection and prevention
- Mobile and embedded devices Forensics
- Forensic software tools and applications
- Cybercrime Profiling
- Cybercrime: evolution, new trends and detection
- Anti-malware techniques: detection, analysis, and prevention
- Combating cybercrime: anti-phishing, anti-spam, anti-fraud
- Privacy and anonymity technologies
- Intrusion prevention, detection, and response
- Cyberterrorism, Information Warfare & Critical Infrastructure Protection
- ISO 27000
Committees
General Chair
- Dr Ameer Al-Nemrat, University of East London, UK
- Dr Omar Suleiman Arabeyyat, Al-Balqa Applied University (BAU), Jordan
Organizing committee
- Dr Chafika Benzaid, UST, Algeria
- Dr Ja'far Alqatawna, UoJ, Jordan
- Dr Mamoun Alazab, Macquarie University, Australia
Publication
CCC2017 proceedings will be published in CPS, all accepted papers will be published by Conference Publishing Services (CPS). Authors of selected papers will also be invited to prepare extended papers of their work for publication in the International Journal of Electronic Security and Digital Forensics
Venue
The conference will be held in Al-Balqa Applied University 21- 23 November 2017
Contact
All questions about submissions should be emailed to Dr. Omar Arabiat, Al-Balqa' Applied University (BAU) Email: arabiat@bau.edu.jo