posted by user: jamespark || 1623 views || tracked by 6 users: [display]

DFIS 2013 : The 7th International Symposium on Digital Forensics and Information Security


When Sep 4, 2013 - Sep 6, 2013
Where Gwangju, Korea
Submission Deadline May 5, 2013
Notification Due May 20, 2013
Final Version Due May 30, 2013
Categories    digital forensics   information security

Call For Papers

**DFIS 2013 CFPs: Published by Springer-LNEE (EI and SCOPUS Index)**
The 7th International Symposium on
Digital Forensics and Information Security (DFIS-13)

September 4-6, 2013, Gwangju, Korea

In Conjunction with FutureTech 2013

Published by Springer-LNEE (EI and SCOPUS Index)
****** Submission due FINAL extension: May 5, 2013 ***************

==Overview ==

Digital Forensics and Information Security (DFIS) are key elements for the next generation communication and networking environments where all applications and services are focused on users. In addition, the DFIS has emerged rapidly an exciting new paradigm to provide reliable and comfortable life services. Furthermore, the benefits of DFIS will only be realized if security issues can be appropriately addressed. Specially, forensics for DFIS is very important in the security fields. This workshop is intended to foster state-of-the-art research Digital Forensics and Information Security in the area of DFIS including information and communication technologies, law, social sciences and business administration.
The DFIS-13 is the next event in a series of highly successful the 6th International Symposium on Digital Forensics and Information Security (DFIS-12, Canada, 2012), which was the next extended event of the International Workshop on Forensics for Future Generation Communication environments : F2GC-11 (Loutraki, Greece), F2GC-10 (Cebu, Philippines), F2GC-09 (Jeju , Korea), F2GC-08 (Sanya, China), F2GC-09 (Jeju , Korea). Papers presented in the DFIS-13 will be published by Springer Lecture Notes in Electrical Engineering (Indexed by EI & SCOPUS).


Track1. Digital Forensics
Digital forensics tools
Digital Evidence Management
Digital Evidence Analytics
Digital Forensics Surveillance Technology and Procedures
Digital evidence visualisation and communication
Digital evidence storage and preservation
Incident response and investigation
Cybercrime and responses
Forensic procedures
Portable electronic device forensics
Anti-forensic techniques and methods
Network forensics
Social networking forensics
Data hiding and recovery
Network traffic analysis, traceback and attribution
Legal, ethical and policy issues related to digital forensics
Integrity of digital evidence and live investigations
Multimedia analysis
Trends and Challenges
Evidence Protection
Forensics case studies

Track 2. Information Security
Authentication and access control
Anonymity, identity management
Cryptographic protocols
Digital right management and intellectual property protection
Applied cryptography
Denial of service attacks
Intrusion tolerance
IDS and Firewall
Information warfare
Steganography and watermarking
System and network security
Multimedia security
Smartphone security issues
Security for open convergence system
Security for M2M platform
Privacy-enhancing technology
Security requirements engineering
Trust models and trusted computing
Mobile trusted computing
Cloud computing security
Virtualization for trusted platforms

==SUBMISSION and Publications==
There will be a combination of presentations including scientific papers. Prospective authors are invited, in the first instance, to submit papers for oral presentations in any of the areas of interest for this conference. Authors should submit a paper with 6-8 pages in length, including all figures, tables, and references. If you want to submit more than page limitation, you can add up to 2 extra pages with the appropriate fee payment.

Papers must strictly adhere to page limits as follows.
- Regular Paper: 6 pages (Max 2 extra pages allowed at additional cost : by 8 pages)
Papers exceeding the page limits will be rejected without review.

Please use the Springer Proceedings format for submission.
Template is available on:

Online Submission System : (TBA)

Distinguished accepted and presented papers in DFIS-13, after further revisions,
will be published in the special issues of the international journals.

- The Journal of Supercomputing - Springer (SCI)
- Wireless Personal Communications - Springer (SCIE)
- International Journal of Communication Systems - Wiley (SCIE)
- Human-centric Computing and Information Sciences (HCIS), Springer (Open Access)
- Journal of Convergence (JoC), FTRA Publising
- International Journal of Information Technology, Communications and Convergence (IJITCC), InderScience

==Important Dates==
-Submission Deadline: April 25, 2013 (FINAL EXTENSION!!)
-Authors Notification: May 1, 2013
-Author Registration: May 15, 2013
-Final Manuscript: May 15, 2013
-Symposium Dates: September 4-6, 2013

General Chairs
Ryoichi Sasaki, Tokyo Denki University, Japan
Krzysztof Szczypiorski, Warsaw University of Technology, Poland

Program Chairs
Glenn S. Dardick, Longwood University, USA
Xuelong Li, University of London, UK
Shiuh-Jeng Wang, Central Police University, Taiwan
Soon M. Chung, Wright State University, USA

Publicity Chairs
Yan Wang, Macquarie University, Australia
K.P. Chow, University of Hongkong, Hongkong
Hung-Min Sun, National Tsing Hua University, Taiwan
Javier Garcia Villalba, Complutense University of Madrid, Spain
Xiaofei He, Zhejiang University, China

Programme Committee: TBA
Please visit the website

If you have any questions about the CFPs and papers submission,
please email to Prof. James J. Park (

-- The End --

Related Resources

ISDF 2015   The Second International Conference on Information Security and Digital Forensics (ISDF2015)
ISMH 2016   Information Security Management Handbook, Seventh Edition
DigitalSec 2015   The Second International Conference on Digital Security and Forensics
SIMWS 2015   Special Issue on Multimedia Watermarking and Security
IEICE ICSS 2015   IEICE Transactions Special Section on Information and Communication System Security (April 2016)
SADFE 2015   10th International Conference on Systematic Approaches to Digital Forensic Engineering
WCSF 2015   The International Workshop on Cloud Security and Forensics
ICINS 2015   2015 2nd International Conference on Information and Network Security
e-Democracy 2015   6th International Conference on e-Democracy - Citizen rights in the world of the new computing paradigms
CHINACOM 2015   10th International Conference on Communications and Networking in China