posted by user: jijames || 3763 views || tracked by 15 users: [display]

ICDF2C 2014 : 6th International Conference on Digital Forensics & Cyber Crime

FacebookTwitterLinkedInGoogle

Link: http://d-forensics.org/2014/show/cf-calls
 
When Sep 18, 2014 - Sep 20, 2014
Where New Haven, Connecticut, United States
Submission Deadline May 16, 2014
Notification Due Jul 30, 2014
Final Version Due Sep 1, 2014
Categories    digital forensics   cyber crime   forensics   cyber security
 

Call For Papers

ICDF2C and SADFE 2014

Keeping up with our international and collaborative nature at ICDF2C, we are proud to announce that ICDF2C 2014 will run jointly with Systematic Approaches to Digital Forensic Engineering (SADFE). We are also proud to announce that ICDF2C is continuing collaboration with the Journal of Digital Investigation, the leading international journal in the area of digital forensics and incident response. In addition to the publication of the proceedings in the Lecture Notes of the ICST, the best research papers presented at ICDF2C 2014 will be expanded and peer reviewed for a special issue of the Journal of Digital Investigation.
Special Themes

This year, we have two themes that we intend to embrace. Authors are encouraged to submit papers that embrace these themes:
Big Data in Digital Forensic Investigations
Digital forensics in the broader context of forensic science, criminalistics and criminology
SCOPE

The Internet has made it easier to perpetrate crimes by providing criminals an avenue for launching attacks with relative anonymity. The increased complexity of global communication and networking infrastructure and devices makes investigation of cybercrimes difficult. Clues of illegal activities are often buried in large volumes of data that need to be sifted through in order to detect crimes and collect evidence. The field of digital forensics and cybercrime investigation has become very important for law enforcement, national security, and information assurance. Digital forensics and cybercrime investigations are multidisciplinary areas that encompasses law, computer science, finance, telecommunications, data analytics, policing and more. ICDF2C brings together practitioners and researchers from diverse fields providing opportunities for business and intellectual engagement among attendees.
The following topics highlight the conference's theme:
• BigData and Digital Forensics
• Business Applications of Digital Forensics
• Civil Litigation Support
• Cloud Forensics
• Cyber Crime Investigations
• Cyber Criminal Psychology and Profiling
• Cyber Culture & Cyber Terrorism
• Data hiding and steganography
• Database Forensics
• Digital Forensic Science
• Digital Forensic Tool Testing and validation
• Digital Forensic Trends
• Digital Forensics & Law
• Digital Forensics and Error rates
• Digital Forensics novel algorithms
• Digital Forensics Process & Procedures
• Digital Forensics Standardization & Accreditation
• Digital Forensics Techniques and Tools
• Digital Forensics Triage
• e-Discovery
• Hacking
• Incident Response
• Information Warfare & Critical Infrastructure Protection
• Law Enforcement and Digital Forensics
• Machine learning and Digital Forensics
• Malware & Botnets
• Mobile / Handheld Device & Multimedia Forensics
• Money Laundering
• Network forensics
• New chip-off techniques
• Novel Digital Forensics Training programs
• Online Fraud
• Programming Languages and Digital Forensics
• SCADA Forensics
• Sexual Abuse of Children on Internet
• Software & Media Piracy
• Theoretical Foundations of Digital Forensics
• Traditional Criminology applied to Digital Forensics
• Philosophical accounts for Cyber Crime and Digital Forensics
RESEARCH PAPERS
Papers describing original unpublished research are solicited. Submissions must not be concurrently under review by a conference, journal or any other venue that has proceedings.
Papers in the topic areas discussed are preferred, although contributions outside those topics may also be of interest. Please feel free at any time to contact the conference general chair if you have questions regarding your submission.
BEST PAPER AWARD
The program committee may designate up to three papers accepted to the conference as ICDF2C/SADFE Best Papers. Every submission is automatically eligible for this award.
OTHER SUBMISSION CATEGORIES
Submissions can be made in a number of categories: Completed research papers, research-in-progress papers, industrial talks, panel and tutorial proposals, and round table discussions. Please follow the following guidelines in preparing your submission.
• Completed Research Papers: No longer than 16 pages (including abstract, figures, tables and references).
• Research in Progress Papers: No longer than 8 pages (including abstract, figures, tables and references).
• Industrial Talk: Typically a 1,000 word description of the proposed talk. All talks must be vendor neutral.
• Round Table Discussion: Typically a 1,000 word synopsis of the topic area. • Panel Proposals: Typically a 1,000 word description, identifying the panelists to be involved.
• Tutorial Proposals: Typically a 1,000 word description of topic(s), potential speakers, program length, and potential audience. Also, include proposer resume(s).
SUBMISSION INSTRUCTIONS

Paper submission will be handled electronically. Papers must be formatted using Springer LNICST Authors' Kit (http://icst.org/lnicst-guidelines-for-authors/) and submitted only through Easychair.org by going here: https://www.easychair.org/conferences/?conf=icdf2c2014.
All submitted papers will be judged based on their quality through double-blind reviewing. Authors' names must not appear in the paper. All other submissions should be sent via email to the conference general chairs (Dr. Ibrahim Baggili ibaggili at newhaven dot edu).
PUBLICATIONS

Accepted papers will be published in the ICDF2C 2014 Conference Proceedings and by Springer-Verlag in the Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Tele-communications Engineering (LNICST) series.
The proceedings will be available both as paper-based copies and via Springerlink, Springer's digital library. In addition, the content of the proceedings will be submitted for inclusion in leading indexing services, including DBLP, Google Scholar, ISI Proceedings, EI, CrossRef and Zentralblatt Math, as well as ICST's own EU Digital Library (EUDL).
In addition, the best conference papers will be published by Elsevier in an expanded form after additional peer review in a special issue of the Journal of Digital Investigation.
IMPORTANT DATES

Paper Submission: 16 May, 2014
Notification of Acceptance: 30 July, 2014
Camera-ready Version: 1 September, 2014

Related Resources

CTI 2017   Cyber Threat Intelligence - Springer Book Chapter
SI: Cyber Forensics&Threat Intelligence 2017   IEEE Transactions on Sustainable Computing SI on Sustainable Cyber Forensics and Threat Intelligence
CYBER 2017   The Second International Conference on Cyber-Technologies and Cyber-Systems
EST 2017   Seventh IEEE International Conference on Emerging Security Technologies
WIFS 2017   IEEE International Workshop on Information Forensics and Security
ISSA 2017   International workshop on Interplay of Security, Safety and System/Software Architecture
MobiSec 2017   Special Issue on Mobile Systems, Mobile Networks and Mobile Cloud: Security, Privacy and Digital Forensics
Watermarking for DRM 2017   Recent Advances in Multimedia Watermarking for Multimedia Digital Rights Management
IWBIS 2017   2017 International Workshop on Big Data and Information Security
IWCDF 2017   First International Workshop on Computational Document Forensics