e-Forensics: Forensics in Telecommunications, Information and Multimedia

FacebookTwitterLinkedInGoogle

 

Past:   Proceedings on DBLP

Future:  Post a CFP for 2011 or later   |   Invite the Organizers Email

 
 

All CFPs on WikiCFP

Event When Where Deadline
E-Forensics 2010 3rd International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia
Nov 10, 2010 - Nov 12, 2010 Shanghai, China Apr 1, 2010
e-Forensics 2009 International Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia
Jan 19, 2009 - Jan 21, 2009 Adelaide, Australia Aug 29, 2008
e-Forensics 2008 First International Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia
Jan 21, 2008 - Jan 23, 2008 Adelaide, Australia Sep 28, 2007
 
 

Present CFP : 2010

CALL FOR PAPERS


SPONSORS

Sponsored by ICST
Technically co-sponsored by CREATE-NET and Shanghai Jiao Tong University


***

SCOPE

Our society has entered an era where commercial activities, business transactions and government services have been, and more and more of them will be, conducted and offered over open networks such as the Internet. It has led to new opportunities for criminals and new challenges for law enforcement. For instance, Voice over IP raises significant challenges for call intercept and route tracing; information systems are becoming overwhelmingly large and the challenge of information source identification requires new sophisticated tools; consumer multimedia devices are increasingly becoming the tools to create potentially illegal content. At the same time, the scientific gathering and investigation of evidence at a crime scene push towards a variety of fascinating digital techniques.

Electronic telecommunications, information technology, consumer devices and sophisticated software are creating new opportunities for both criminals and forensic investigators. This conference aims to bring together the research contributions in the development of tools and techniques that assist in the investigation of potentially illegal activity associated with electronic communication and electronic devices. It will also investigative the practice and requirements for presentation of evidence in court. This might include the discovery, analysis, handling and storage of digital evidence, meeting the legal burden of proof, and the establishment of the forensic chain of evidence.


***

TOPICS

Technical papers describing original, previously unpublished research, not currently under review by another conference or journal, are solicited. Topics of interest include, but are not limited to, the following:

* Digital evidence gathering, storage and handling protocols
* Records tracing and data mining
* Fraud management in commercial transactions
* Device forensics
* Techniques for addressing identity theft
* Data carving
* Content filtering
* Geo-location techniques for cellular, ad-hoc, wireless and IP network communications
* Distributed data association across massive, disparate database systems
* Multimedia source identification
* Image tamper identification
* Image association and recognition
* Motion analysis
* Voice analysis
* VoIP call tracing and intercept
* Watermarking and applications
* Cryptographic techniques in digital forensics

General papers on IT security will be considered where there is a clear application to the underlying topic of forensic investigation.

***

PUBLICATION

All accepted papers will be included in the printed and electronic E-Forensics 2010 Conference Proceedings to be published by Springer in the Lecture Notes of ICST (LNICST) series and reviewed for indexing by Engineering Information (EI).

***

SUBMISSION

Paper submission will be handled electronically. Authors should prepare an Adobe Acrobat PDF version of their full paper. All submitted papers will be subject to a rigorous peer- review. Papers must be formatted using the Springer LNICST Authors Kit and submitted only through the ASSYST conference management system. Papers must not exceed the limit of 15 pages including text, figures and references. The font size must be at least 10 points. Please visit the Submission page for detailed submission requirements and procedures: http://www.e-forensics.eu/2010/submission.shtml

***

IMPORTANT DATES

Paper submission deadline: 1 April 2010
Notification of acceptance: 1 June 2010
Camera-ready deadline: 1 August 2010

***

PANELS / WORKSHOPS / TUTORIALS

Proposals for panels/workshops/tutorials are solicited. Potential organizers are welcome to submit a proposal to the Technical Program Committee Chair or the General Chair.

Workshop proposal submission deadline: 1 February 2010
Workshop proposal notification of acceptance: 6 February 2010

***

ORGANIZING COMMITTEE

General Chair
Dawu Gu, Shanghai Jiao Tong University, China

Technical Program Committee Chair
Xuejia Lai, Shanghai Jiao Tong University, China

For a complete list of committee and board members, please visit http://www.e-forensics.eu/2010/organizingcommittee.shtml
 

Related Resources

ICST 2017   IEEE International Conference on Software Testing, Verification and Validation (ICST) 2017
ICISIP 2017   The 5th IIAE International Conference on Intelligent Systems and Image Processing 2017
WSDF 2017   10th International Workshop on Digital Forensics
EuropeanSeC 2017   2017 European Security Conference
CyberSec 2017   The Fifth International Conference on Cyber Security, Cyber Welfare and Digital Forensic
ICCST 2017   The 51st International Carnahan Conference on Security Technology
SI-SoftMM 2017   Special Issue on Soft Computing Techniques and Applications on MM Data Analyzing Systems-- Springer Journal of Multimedia Tools and Applications
IJNGN 2017   International Journal of Next-Generation Networks
CSPA 2018   14th IEEE Colloquium on Signal Processing and its Applications (CSPA 2018)
SECURWARE 2017   The Eleventh International Conference on Emerging Security Information, Systems and Technologies