Following the positive feedback and great interest last year, we are delighted to announce the 5th International Workshop on Big Data Analytic for Cybercrime Investigation and Prevention, co-located with IEEE Big Data 2021 conference in Orlando, Florida, USA that takes place VIRTUALLY on December 15-18, 2021.
The safety and well-being of all conference participants is our priority. After evaluating the current COVID-19 situation, the decision has been made to transform face-to-face IEEE Big Data 2021 conference into a digital format – IEEE Big Data 2021 will now be an online event.
The big data paradigm has become an inevitable aspect of today's digital forensics investigations. Acquiring a forensic copy of seized data mediums already takes several hours due to the increasing storage size. In addition are several other time-consuming laboratory analysis steps required, such as evidence identification, corresponding data preprocessing, analysis, linkage, and final reporting. These steps have to be repeated for every physical device examined in the criminal case. Conventional digital forensics data preprocessing and analysis methods struggle when handling the contemporary variety, variability, volume and velocity of case data. Thus, proactive approaches have to be developed and integrated in daily law enforcement operations; for timely detection and prevention of the illegal activities in a data-intensive environments. Thus, there is a need for advanced big data analytics to aid in cyber crime investigations, which requires novel approaches for automated analysis. This workshop is organized to bring together recent development in big data analysis to aid in current challenges in cybercrime investigations.
Oct 20, 2021 (Oct 1): Due date for full workshop paper submissions
Nov 10, 2021 (Nov 1): Notification of paper acceptance to authors
Nov 20, 2021 (Nov 15): Latest due date for camera-ready of accepted papers
Dec 15-18 , 2021: Workshops and conference
Kristiania University Collegeandrii.firstname.lastname@example.org
KTH Royal Institute of Technologyasif.email@example.com
Pukhov Institute for Modelling in Energy Engineeringigor.firstname.lastname@example.org
Charles Darwin Universitymamoun.email@example.com
Ajit Kumar (Soongsil University)
Aleksandar Jevremovic (Singidunum University)
Andrei Costin (University of Jyväskylä)
Bing Zhou (Sam Houston State University)
Cristian Bucur (Ecole Polytechnique de Montréal)
Gebremariam Assres (Kristiania University College)
Inna Skarga-Bandurova (Pukhov Institute for Modelling in Energy Engineering)
Junaid Arshad (Birmingham City University)
Lester Allan Lasrado (Kristiania University College)
Marko Krstic (Regulatory Agency for Electronic Communications and Postal Service)
Mohamed Abomhara (Norwegian University of Science and Technology)
Naw Safrin Sattar (University of New Orleans)
Ogerta Eleza (University of Tirana)
Olaf M. Maennel (Tallinn University of Technology)
Panagiotis Bellonias (Bournemouth University)
Piotr A. Kowalski (AGH University of Science and Technology)
Raffaele Olivieri (Cyber Security Manager)
Sanjay Kumar (University of Jyväskylä)
Shih-Chieh Su (Amazon)
Sule Yildirim Yayilgan (Norwegian University of Science and Technology)
Thippa Reddy G (Vellore Institute Of Technology)
Vasileios Mavroeidis (University of Oslo)
Vasilis Katos (Bournemouth University)
Vinayakumar Ravi (Prince Mohammad Bin Fahd University)
Vinti Agarwal (Birla Institute of Technology & Science)
Check Point Software Technologies, Australia
Abstract: In this talk, Ashwin Ram, from the Office CTO at Check Point Software Technologies will share insights and lessons from the Check Point Incident Response Team. Ashwin will share the latest techniques and tactics used by threat actors as they target organisations ill equipped to prevent the latest cloud based cyber-attacks. He will also be sharing recommendations that must receive the most urgent attention for any cloud users.
Bio: As a Cyber Security Evangelist with the office of the CTO at Check Point Software Technologies, Ashwin Ram has been helping business leaders make smarter, more insightful cyber-security decisions for over 10 years. He does this by ensuring cyber-security strategies are designed to achieve cyber-resilience and in line with your business strategies. He focuses on both, pre and post infection security controls across corporate networks, cloud, endpoints, mobile and IoT to ensure your cyber-strategy delivers a competitive advantage to your organisation. Ashwin has delivered technical trainings, cyber-security boot camps, assisted with designing and remediating cyber-security solutions across many organisations within APAC. He is passionate about cyber-security and regularly shares his knowledge on the current threat landscape at various cyber-security conferences across the globe.
Department of Technology academic profile relates to information systems (IS) and computer science. This is covered by the fields of information science, information technology and computer science. The department is a part of School of Economics, Innovation, and Technology (SEIT).
DigForAsp (Digital forensics: evidence analysis via intelligent systems and practices). COST Action CA17124 is funded by the European Cooperation in Science and Technology (COST). DigForAsp activities were launched on 10th September 2018 for 4 years.
Digital forensics is a part of the Criminalistics Sciences which deals with digital evidence recovery and exploitation in the solution of criminal cases through the application of scientific principles. There are several and increasingly sophisticated methods for collecting digital evidence. As a matter of fact, the evolution of technology continuously pushes such kind of methods. Rough evidence must however be used to elicit hypotheses concerning events, actions and facts (or sequences of them) with the goal to obtain evidence to present in court. Evidence analysis involves examining fragmented incomplete knowledge, and reconstructing and aggregating complex scenarios involving time, uncertainty, causality, and alternative possibilities. No established methodology exists today for digital evidence analysis. The Scientific Investigation experts usually proceed by means of their experience and intuition.
The authors are invited to submit: full-length papers (up to 10 pages IEEE 2-column format), short papers (4-6 pages IEEE 2-column format) or abstract papers (up to 4 page IEEE 2-column format) through the online submission system. Page count includes references, figures and tables.
Papers should be formatted to IEEE Computer Society Proceedings Manuscript Formatting Guidelines:
The authors of accepted papers must guarantee their presence at the conference for the papers to be published in the conference proceedings. At least one author of each accepted paper must register for the conference in order to include the paper in the proceedings.
Selected papers will be nominated for submission to the book: Trust, Security and Privacy for Big Data . Extended papers should have at least 60% of new material and will be sent through a review process to ensure the quality of contributions.