Un message en français suivra Thank you for your email. A response to your inquiry will be provided as quickly as possible within the next 24 hours, during business hours (Eastern Time). If this is an urgent matter, please contact our office at 1-866-350-7710. Thank you for contacting BBM -Bell Business Markets Collections ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Merci de votre courriel. Nous répondrons à votre demande dans les plus brefs délais à l’intérieur des prochaines 24 heures , durant les heures normales de bureau (heure de l’Est). Pour toute question urgente, veuillez appeler notre bureau aux 1 866 350-7710. Merci d’avoir communiqué avec l’équipe Recouvrement de Bell Marchés Affaires.
From: tinyos-help-requ...@millennium.berkeley.edu Sent: Saturday, October 17, 2020 03:00 PM To: tinyos-help@millennium.berkeley.edu Subject: [EXT]Tinyos-help Digest, Vol 202, Issue 5 Send Tinyos-help mailing list submissions to tinyos-help@millennium.berkeley.edu To subscribe or unsubscribe via the World Wide Web, visit https://www.millennium.berkeley.edu/cgi-bin/mailman/listinfo/tinyos-help or, via email, send a message with subject or body 'help' to tinyos-help-requ...@millennium.berkeley.edu You can reach the person managing the list at tinyos-help-ow...@millennium.berkeley.edu When replying, please edit your Subject line so it is more specific than "Re: Contents of Tinyos-help digest..." Today's Topics: 1. [CFP- Deadline extended] IEEE CCNC 2021 WKSHPS: 2nd International Workshop on Cyber Forensics & Advanced Threat Investigations in Emerging Networks (Chilean Scholar) ---------------------------------------------------------------------- Message: 1 Date: Fri, 16 Oct 2020 23:42:07 +0100 From: Chilean Scholar <scholarshipch...@gmail.com> Subject: [Tinyos-help] [CFP- Deadline extended] IEEE CCNC 2021 WKSHPS: 2nd International Workshop on Cyber Forensics & Advanced Threat Investigations in Emerging Networks To: tinyos-help@millennium.berkeley.edu Message-ID: <CACsGmeTiYXA2hoGU-brYxYDKtTxO7jBWoe5xRrX=it759w-...@mail.gmail.com> Content-Type: text/plain; charset="UTF-8" Dear Colleagues, We cordially invite you to submit your paper to the 2nd International Workshop on Cyber Forensics and Advanced Threat Investigations in Emerging Networks (CFATI?21) Held in conjunction with the IEEE CCNC 2021 (https://ccnc2021.ieee-ccnc.org) 9 January 2021, Virtual Conference Website: https://ccnc2021.ieee-ccnc.org/workshop/2nd-international-workshop-cyber-forensics-and-advanced-threat-investigations-emerging - Submission deadline: 6 November 2020 (Extended!) - Notification: 23 November 2020 - Camera ready: 14 December 2020 - Workshop Day: January 9th, 2021 EDAS link for submissions: https://edas.info/newPaper.php?c=27781&track=103638 =========================== CALL FOR TECHNICAL PAPERS =========================== The increasing proliferation of Information and communication technologies (ICT) in our lives, has facilitated the connectivity growth between distinct parts of our world. Various types of data are continuously streaming across many boundaries in the world with different models, policies, and purposes. Additionally, this data is usually analyzed or stored on edge or gateways devices which have highly limited capabilities and are vulnerable to sophisticated attacks. With the growth of connectivity between various heterogeneous systems, numerous attack vectors are constantly evolving, that can potentially be exploited for malicious or criminal purposes (e.g. data breaches, identity theft, and stealing of intellectual property and trade secrets, etc.). Recent cyberattacks dangerously aim a broad array of computing systems varying from data centers and personal machines to mobile devices and industrial control systems. There is a growing need for new methodologies, tools, and techniques, capable of extracting, preserving, and analyzing different evidence trails in various networked services and devices such as routers, firewalls, web proxies, and network monitoring tools. Additionally, there is also a growing need for research in new systems that are capable of analyzing network traffic, netflows, and systems logs. Satisfying these demands will aid in reconstructing the timeline of the cyber-crime/attack under investigation and, possibly, the identification of the potential actor(s). The evolution of networked technologies, such as the internet of things and cyber-physical systems, possess challenges based on the highly limited capabilities of their infrastructure devices and the type of data that can be processed by these devices. Complicated efforts are required in suitable and timely manners against any detected threats. Moreover, new frameworks are required to collect and preserve potential evidential data in suitable and timely manners as well. To guarantee proper cyber-defenses and strategies against the expanding landscape of criminal activities as well as rapidly advancing network technologies such as SDN or 5G and 6G. Papers on practical as well as on theoretical topics and problems in various topics related to cyber forensics and threat investigations, are invited, with special emphasis on novel techniques and tools to collect data from networked devices and services in emerging networks (such as the ones can be found in cyber-physical systems and Internet of things). Topics include (but are not limited to): =========================== TOPICS =========================== - Advanced threat investigations, forensic and anti-forensic techniques - Cooperative and distributed forensics and threat investigations - Data exfiltration techniques from networked devices and services (e.g. cyber-physical systems, and Internet-of-Things) - Attack detection, traceback and attribution in SDN, 5G, and 6G - Methods for reconstruction of internet activities in SDN, 5G, and 6G - Forensics and threat investigations in IoT, Smart Grid, Smart Cars and Drones - Forensics and threat investigations in peer-to-peer, social, and cloud networks - Vulnerability & threat detection and mitigation techniques for networked services - Novel large-scale investigations techniques to analyze intelligence data sets and logs - Tools and services for cyber forensics and threat investigations - Machine learning applications in cybersecurity and threat intelligence - Adversarial machine learning - Advances in critical infrastructure security - VoIP forensics, VoIPoW forensics - Network investigations and Traffic Analysis - Hardware Vulnerabilities and Device investigations - Privacy-enhancing techniques for cyber forensics and threat investigations We also encourage contributions describing innovative work in the realm of cybersecurity, cyber defense, and digital crimes. =========================== IMPORTANT DATES =========================== - Submission deadline: 6 November 2020 (Extended!) - Notification: 23 November 2020 - Camera ready: 14 December 2020 - Workshop Day: January 9th, 2021 =========================== The Workshop Supported by =========================== Association of Cyber Forensics and Threat Investigators (ACFTI) https://www.acfti.org/ Industrial Cybersecurity Center (CCI) https://www.cci-es.org/ ------------------------------ _______________________________________________ Tinyos-help mailing list Tinyos-help@millennium.berkeley.edu https://www.millennium.berkeley.edu/cgi-bin/mailman/listinfo/tinyos-help End of Tinyos-help Digest, Vol 202, Issue 5 ******************************************* ------------------------------------------------------------------------------ External Email: Please use caution when opening links and attachments / Courriel externe: Soyez prudent avec les liens et documents joints
_______________________________________________ Tinyos-help mailing list Tinyos-help@millennium.berkeley.edu https://www.millennium.berkeley.edu/cgi-bin/mailman/listinfo/tinyos-help