Second International Workshop on Cybercrimes and Emerging Web Environments (CEWE 2013)

Banner: General computing

Important dates

  • Submission Deadline: 20 May 2013 (Hard Deadline
  • Authors Notification: 30 May 2013
  • Authors Registration: 30 June 2013
  • Final Manuscript: 30 June 2013
  • Conference Dates: 9-11 September 2013

Aim and scope

The web has integrated innovative technologies in order to advance its services and accommodate future concepts and needs. It is considered an interactive and collaborative medium of the modern era. However, the constant and increased development of web services, transforms the web environments to playgrounds for fraudsters.

The scope of this workshop is to provide an international forum for researchers and field experts to present and discuss Cybercrimes under the constantly emerging web environment. It also aims to explore the prevention, detection and investigation of Cybercrimes.

Topics

The main topic areas of interest include, but are not limited to the following:

  • Electronic Fraud
  • Intrusion detection systems
  • Forensic techniques for the investigation of Cybercrimes
  • Forensic imaging and volatile data
  • Anti-Forensic emerging trends
  • Information Security, Information Assurance and Security Management
  • Cyber threats and future trends
  • Risk assessment on information systems
  • Incident response and investigation
  • Malware trends, developments and forensic analysis
  • Data mining and the malicious use of personal information
  • Best practices and case studies
  • Legal, policy and ethical issues related to Cybercrime prevention and investigation
  • Security and forensics in social networks 
  • Cybercriminal profiling

Academics, researchers and industry practitioners are encouraged to submit original work, research papers, work-in-progress papers, case studies and experience reports.

Organising committee

Workshop co-chairs

Programme committee

  • Prof. Leonard Barolli
    Fukuoka Institute of Technology, Japan
  • Prof. Nikolaos Bessis
    University of Derby, UK
  • Dr. Ciprian Dobre
    University Politehnica Bucharest, Romania
  • Dr. Grigorios Fragkos
    Consultant, UK
  • Dr. Anthony Keane
    Institute of Technology Blanchardstown, Ireland
  • Dr. Selma Tekir
    Izmir Institute of Technology, Turkey
  • Dr. Stilianos Vidalis
    University of Staffordshire, UK
  • Prof. Fatos Xhafa
    Universitat Politècnica de Catalunya, Spain
  • Mr. Konstantinos Xynos
    University of Glamorgan, UK

Important dates

  • Submission Deadline: 5 April 2013
  • Authors Notification: 30 May 2013
  • Authors Registration: 30 June 2013
  • Final Manuscript: 30 June 2013
  • Conference Dates: 9-11 September 2013

Instructions for authors

Submitted papers of between 4-6 pages long must be original and not submitted for publication elsewhere. Authors are invited to submit their manuscripts following the Conference Proceedings Manuscript style: two columns, single-spaced, including figures and references, using 10 font size, and number each page.

Instructions for authors how to format the CPS proceedings manuscripts can be found at the Conference Publishing Services (CPS) website.

All papers will be peer reviewed by at least two or more independent referees of the International Workshop Program Committee and accepted on the basis of their scientific merit, originality, significance, technical soundness, and clarity of exposition.

The papers should be submitted electronically via the EIDWT-2013 submission system. Details are available at the EIDWT-2013 website.

Accepted papers will be published by the Conference Publishing Services (CPS) and submitted to the Xplore Digital Library.

Selected papers from the workshop will be invited for an extended version publication at the 'Information Security Journal: A Global Perspective'. More information to be found in the special issue call for papers.

Use of personal data

Our policy is to only use the data you supply to us for use in regard to the work of the University of Derby. We do not pass on your data to any other third party under any circumstances.

© Copyright University of Derby 2013 | Accessibility | Privacy and cookies | Site map | Disclaimer | Freedom of Information | Company info | About us as a charity | Trademarks of the University of Derby | Staff admin