Calls for Papers (special): International Journal of Digital Crime and Forensics (IJDCF)


Special Issue On: Recent Advances on Cyber Security and Privacy for Cloud-of-Things

Submission Due Date
4/25/2018

Guest Editors
Yassine Maleh, Hassan 1st University, Morocco
Ghita Mezzour, International University of Rabat
Abdelkrim Haqiq, Hassan 1st University, Morocco
Marinella Petrocchi, Institute for Informatics and Telematics IIT, Italy

Introduction
In recent years, Cloud of Things CoT has emerged as a revolutionary paradigm that enables intelligent and self-configuring (smart) IoT devices and sensors to be connected with the cloud through the Internet. The Cloud of thing paradigm can stimulate the development of innovative and novel applications to various areas such as smart cities, smart homes, smart grids, smart agriculture, smart transportation, smart healthcare, etc. In cloud of Things system field, security and privacy threats have been extensively studied and received considerable attention in recent years, as witnessed by the number of related publications. In the context of these trends, the forthcoming special issue on recent advances on Cyber Security and privacy for Cloud-of-Things will address significant issues in the field. Topics covered include issues of personal information and identity crime for cloud of thing, intellectual property-related issues in cyberspace, computer forensic investigation in cloud of things.

Objective
The main goal of this special issue is to encourage both researchers and practitioners to share and exchange their experiences and recent studies with a particular emphasis on interdisciplinary approaches and novel techniques to increase the security posture of Cloud of Things devices (Smart sensors, 6lowpan, M2M, IoT,…). The overall objectives are:

• To improve the awareness of readers about cyber Security and Privacy for Cloud-of-Things.
• To analyze and present the state-of-the-art of the cyber Security and privacy for Cloud-of-Things and Edge Computing and related technologies and methodologies.
• To highlight and discuss the recent development and emerging trends related to cyber Security and privacy for Cloud-of-Things.
• To propose new models, practical solutions and technological advances related to cyber Security and privacy for Cloud-of-Things.
• Discusses new cyber Security and privacy models, prototypes and protocols for the Cloud of Things environment.

Recommended Topics
Topics to be discussed in this special issue include (but are not limited to) the following:

• Cybersecurity dynamics theory in Cloud of things devices;
• Cybersecurity dynamics simulation in Cloud of things
• Cybersecurity dynamics modelling technologies in Cloud of things
• Computer forensic investigation in cloud of things;
• Malware analysis in Cloud of things;
• Privacy-preserving solutions in Cloud of things;
• Countermeasures solutions in Cloud of things;
• Seamless security solutions of Cloud of things;
• Threats and vulnerabilities in in Cloud of things;
• Botnets analysis for Cloud of things;
• BYOD security in Cloud of things;
• Identity management in Cloud of things;
• Cybercrime and digital forensics in Cloud of things.

Submission Procedure
Researchers and practitioners are invited to submit papers for this special theme on Recent Advances on Cyber Security and Privacy for Cloud-of-Things on or before April, 25. Only papers describing previously unpublished, original, state-of-the-art research, and not currently under review by a conference or a journal will be considered. Extended works must have a significant (over 70%) of new/rewritten content. All submissions must be original and may not be under review by another publication. INTERESTED AUTHORS SHOULD CONSULT THE JOURNAL’S GUIDELINES FOR MANUSCRIPT SUBMISSIONS at http://www.igi-global.com/publish/contributor-resources/before-you-write/. All submitted papers will be reviewed on a double-blind, peer review basis. Papers must follow APA style for reference citations.

All submissions and inquiries should be directed to the attention of:
Yassine Maleh, Ghita Mezzour, Abdelkrim Haqiq, Marinella Petrocchi
Guest Editors
International Journal of Digital Crime and Forensics (IJDCF)
E-mail: y.maleh@uhp.ac.ma

Special Issue On: Multimedia Security and Forensics

Submission Due Date
5/15/2018

Guest Editors
Xianfeng Zhao
Institute of Information Engineering, Chinese Academy of Sciences

Introduction
The wide use of multimedia introduces new security issues, most of which are closely related to forensic techniques. Noticeably, copyright violation, which leads to the spread of pirated multimedia, has been concerned by content industry for many years. On the contrast, people may not know that the widespread of multimedia gives digital criminals a covert communication channel, which challenges security protection or investigation at present. In addition, with the development of multimedia editing tools, the contents can be unperceivably manipulated or tampered. It makes the judicial use of multimedia proofs more difficult.

To tackle the above problems, multimedia security and forensics have been investigated worldwide for almost 20 years. To let the readers of IJDCF be more aware of the development as well as the existing problems, it is worth dedicating a special issue to the recent results in the field.

Objective
Although the technologies of multimedia security and forensics, such as watermarking, steganalysis and content authentication, have been researched and developed for many years, a series of problems still exist. For examples, the robustness of most watermarking is still weak under geometric attacks. The accuracy of both steganalysis and content forensics should be further improved. Moreover, with the changing network environment, the security of more and more systems or protocols for protecting multimedia content need further been improved and verified. Consequently, the objective of this special issue is to publish the most recent results of these technologies and further advance of the research.

Recommended Topics
Topics to be discussed in this special issue include (but are not limited to) the following:

• Multimedia forensics
• Multimedia tampering techniques
• Anti-forensic technology
• Steganography
• Steganalysis
• Watermarking and fingerprinting
• Attacks on watermarking and fingerprinting
• Multimedia encryption
• Digital rights management
• Artificial Intelligence for multimedia forensics
• Application protocol for multimedia protection

Submission Procedure
Researchers and practitioners are invited to submit papers for this special theme issue on Multimedia Security and Forensics on or before May 15, 2018. All submissions must be original and may not be under review by another publication. INTERESTED AUTHORS SHOULD CONSULT THE JOURNAL’S GUIDELINES FOR MANUSCRIPT SUBMISSIONS at http://www.igi-global.com/journal/international-journal-digital-crime-forensics. All submitted papers will be reviewed on a double-blind, peer review basis. Papers must follow APA style for reference citations.

All submissions and inquiries should be directed to the attention of:
Xianfeng Zhao
Guest Editor
International Journal of Digital Crime and Forensics (IJDCF)
Email: zhaoxianfeng@iie.ac.cn

Special Issue On: Advances in Multimedia Information Hiding, Tampering Detection, and Data Forensics

Submission Due Date
5/30/2018

Guest Editors
Xuping HUANG, Meiji University, Japan

Introduction
Information hiding technologies, including digital watermarking and steganography, facilitates the protection of data’s integrity and guarantees the authentication and confidentiality of multimedia data besides encryption applications and protocols. However, it faces the challenge that detecting malicious modification of multimedia contents has been difficult because of sophisticated Artificial Intelligence technologies, such as lip synchronization, speech synthesis and voice conversion.

Objective
To limit abuse of these technologies and to provide efficient solutions to protect data from threat and vulnerability, researchers are encouraged to submit papers to share the bleeding-edge ideas and achievements on information security, particularly multimedia information hiding, tampering detection and data forensics. Technologies to generate contents by AI and machine learning technologies are also welcome for further discussion and feedbacks to improve their research to its full potential. This issue covers topics on both of attack and protection technologies as the spear and the shield.

Recommended Topics
Topics to be discussed in this special issue include (but are not limited to) the following:

• Audio Watermarking and Steganography
• Algorithm and Application for Audio Steganalysis
• Audio Tampering Detection
• Data Forensics for Speech and Audio Data
• Fake News and Data Trust
• Voice Conversion
• Identity Fraud
• Applications to Detect Speech Synthesis
• Acoustic CAPTCHA
• Data’s Authentication and Integrity
• Detection of Artificial Intelligence
• Lip Synchronization Detection
• Privacy Preserving
• IoT Data Reliability
• Encryption Protocol for IoT and Mobile Devices

Submission Procedure
Researchers and practitioners are invited to submit papers for this special theme issue on Advances in Multimedia Information Hiding, Tampering Detection, and Data Forensics on or before May 30, 2018. All submissions must be original and may not be under review by another publication. INTERESTED AUTHORS SHOULD CONSULT THE JOURNAL’S GUIDELINES FOR MANUSCRIPT SUBMISSIONS at http://www.igi-global.com/publish/contributor-resources/before-you-write//. All submitted papers will be reviewed on a double-blind, peer review basis. Papers must follow APA style for reference citations.

All submissions and inquiries should be directed to the attention of:
Xuping HUANG
Guest Editor
International Journal of Digital Crime and Forensics (IJDCF)
E-mail: huang_xp@meiji.ac.jp

Special Issue On: Recent Research in Security, Privacy and Forensic Analysis System for Smart Devices

Submission Due Date
6/20/2018

Guest Editors
Gulshan Shrivastava, National Institute of Technology Patna, India
Nhu Nguyen Gia, Duy Tan University, Vietnam
Loredana-Mihaela STANCIU, Politehnica University Timisoara, Romania
Dac-Nhuong Le, Haiphong University, Vietnam

Introduction
In recent years, privacy and forensic analysis concerns with smart devices have becoming a key research area. The smart devices provide enhanced features such as optimized display, in-house health monitoring, people tracking, driving directions, etc. Smart device forensics analysis is a classification under digital forensics that mainly deals with the analysis of digital evidence found in smart devices such as Smart phones, tablets and Smart watch. There is an enormous rate of increase in threats with constantly increasing releases of smart devices and hasty development in innovative technologies. Digital forensics analysis procedure to acquire and analyze digital evidences originated in a smart device based on file systems, logical memory storage and operating system architectures.

Objective
Main intend of this special issue to provide a premier international platform for wide range of professions including scholars, researchers, academicians and Industry people to present and discuss to bridge the gap by providing an in-depth look into smart devices and explaining technologies involved and their relationship to analytic procedures. This special issue covers smart devices with features beyond sensor and IoT capabilities. This special issue will also discusses procedures for the validation, preservation, acquisition, examination, analysis, and reporting of digital information and its best practices for the real world.

Recommended Topics
Topics to be discussed in this special issue include (but are not limited to) the following:

• Secure converged and integrated systems for forensic computing
• Investigation modeling for Smart device data analytics & platforms
• Privacy and forensic of Smart devices in banking systems
• Privacy and forensic of Smart devices in telecommunication systems
• Privacy and forensic of Smart devices in finance systems
• Risk and reliability analysis in the Internet and enterprise Smart devices
• Privacy and forensic of Smart devices in communication systems
• Privacy and forensic of Smart devices in e-Commerce
• Analysis of big data in emergency services, energy, food chain
• Privacy analysis of Smart devices in critical infrastructure
• Privacy and forensics management of Smart devices in cloud computing
• Security and privacy analysis of Industrial control systems
• Security, privacy and forensics of big data in stock trade
• Smart device data for security analysis
• Evidence collection through Smart device data analytics
• Privacy and forensic of Web engineering in telecommunication systems

Submission Procedure
Researchers and practitioners are invited to submit papers for this special theme issue on Recent Research in Security, Privacy and Forensic Analysis System for Smart Devices on or before May 01, 2018. All submissions must be original and may not be under review by another publication. INTERESTED AUTHORS SHOULD CONSULT THE JOURNAL’S GUIDELINES FOR MANUSCRIPT SUBMISSIONS at http://www.igi-global.com/publish/contributor-resources/before-you-write/. All submitted papers will be reviewed on a double-blind, peer review basis. Papers must follow APA style for reference citations.

All submissions and inquiries should be directed to the attention of:
Gulshan Shrivastava
Guest Editor
International Journal of Digital Crime and Forensics (IJDCF)
E-mail: gulshan.shrivastava@ieee.org