posted by user: ctli || 2540 views || tracked by 7 users: [display]

DFIS 2012 : The 6th International Symposium on Digital Forensics and Information Security


When Jun 26, 2012 - Jun 28, 2012
Where Vancouver
Submission Deadline Jan 31, 2012
Notification Due Feb 29, 2012
Final Version Due Mar 15, 2012
Categories    digital forensics   information security

Call For Papers

The 6th International Symposium on
Digital Forensics and Information Security (DFIS-12)! is2012 (TBA)

Vancouver, Canada, 26-28 June 2012

In Conjunction with FutureTech-12

Published by Springer-LNEE (EI and SCOPUS Index)

==Overview ==
Future Generation Communication environments (FGC) are advanced communication and networking environments where all applications and services are focused on users. In addition, the FGC has emerged rapidl! y an exciting new paradigm to provide reliable and comfortable life se rvices. Furthermore, the benefits of FGC will only be realized if security issues can be appropriately addressed. Specially, forensics for FGC is very important in the security fields. This workshop is intended to foster state-of-the-art research Digital Forensics and Information Security in the area of FGC including information and communication technologies, law, social sciences and business administration.
The DFIS-12 is the next event in a series of highly successful the 5th International Workshop on Forensics for Future Generation Communication environments: F2GC-11 (Loutraki, Greece), F2GC-10 (Cebu, Philippines), F2GC-09 (Jeju , Korea), F2GC-08 (Sanya, China), F2GC-09 (Jeju , Korea).
Papers presented in the DCIS-12 will be published by Springer Lecture Notes in Electrical Engineering (Indexed by EI & SCOPUS), ISSN: 1876-1100.


[Digital Forensics]
Digital forensics tools
Digital Evidence Manage! ment
Digital Evidence Analytics
Digital Forensics Surveillance Technology and Procedures
Digital evidence visualisation and communication
Digital evidence storage and preservation
Incident response and investigation
Forensic procedures
Portable electronic device forensics
Network forensics
Data hiding and recovery
Network traffic analysis, traceback and attribution
Legal, ethical and policy issues related to digital forensics
Integrity of digital evidence and live investigations
Multimedia analysis
Trends and Challenges
Evidence Protection
Forensics case studies

[Information Security]
Authentication and access control
Anonymity, identity management
Cryptographic protocols
Digital right management and intellectual property protection
Applied cryptography
Denial of service attacks
Intrusion tolerance
IDS and Firewall
Information warfare !
Steganography and watermarking
System and network security
Multimedia security
Smartphone security issues
Security for open convergence system
Security for M2M platform
Privacy-enhancing technology
Security requirements engineering
Trust models and trusted computing
Mobile trusted computing
Cloud computing security
Virtualization for trusted platforms

==SUBMISSION and Publications==
There will be a combination of presentations including scientific papers. Prospective authors are invited, in the first instance, to submit papers for oral presentations in any of the areas of interest for this conference. Authors should submit a paper with 6-8 pages in length, including all figures, tables, and references. If you want to submit more than page limitation, you can add up to 2 extra pages with the appropriate fee payment.

All accepted papers will be included in the conference proceedings published by Lecture Notes in Electrical Engineering (LNEE) - Springer (indexed by EI and SCO! PUS).

Papers must strictly adhere to page limits as follows.
- Full Paper: 8 pages (Max 2 extra pages allowed at additional cost)
- Regular Paper: 6 pages (Max 2 extra pages allowed at additional cost)
- Poster Paper: 2 pages (FTRA Publishing Proceeding with ISBN)
Papers exceeding the page limits will be rejected without review.
Please use the Springer Proceedings format for submission. Template is available on:

Submission system:

Distinguished accepted and presented papers in FutureTech 2012, after further revisions,
will be published in the special issues of the international journals.

==Important Dates==
Paper Submission deadline : Jan 31, 2011
Acceptacne Noti fication : February 29, 2012
Camera-ready Due : March 15, 2012
Registration Due : March 15, 2012
Conference Dates : June 26-28, 2012


If you have any questions about the CFPs and papers submission,
please email to Prof. James J. Park ( and Prof. TS Shon (

Related Resources

ECCWS 2019   18th European Conference on Cyber Warfare and Security
ACISP 2019   The 24th Australasian Conference on Information Security and Privacy
NECO 2018   7th International Conference of Networks and Communications
IFIPSEC 2019   IFIP Information Security Conference & Privacy Conference - IFIP Technical Commitee 11
CyberHunt - 2018   International Workshop on Big Data Analytics for Cyber Threat Hunting
PRL-IIDFB 2019   PRL SI on Intelligent Industrial Digital Forensics and Biocybernetics: Practices and Challenges
BDACCIP 2018   The 2nd International Workshop on Big Data Analytic for Cyber Crime Investigation and Prevention
ACM--ICNS--Ei and Scopus 2018   ACM--2018 The 3rd International Conference on Network Security (ICNS 2018)--Ei Compendex and Scopus
MLCS-MDPI 2019   Special issue on Machine Learning for Cyber-Security (MDPI Journal of INFORMATION)
DAH - Zagreb 2018   Digital art history - methods, practices. epistemologies