posted by user: ICST || 4449 views || tracked by 12 users: [display]

ICDF2C 2010 : 2nd International ICST Conference on Digital Forensics & Cyber Crime

FacebookTwitterLinkedInGoogle

Link: http://d-forensics.org/
 
When Oct 4, 2010 - Oct 6, 2010
Where Abu Dhabi, UAE
Submission Deadline May 1, 2010
Notification Due Jun 15, 2010
Final Version Due Aug 1, 2010
Categories    digital forensics   cyber crime   security
 

Call For Papers

CALL FOR PAPERS


KEYNOTE SPEAKERS (tentative)

Dr. Eugene Spafford, Purdue University and CERIAS, USA
Dr. Marcus Rogers, Purdue University and CERIAS, USA

***

SPONSORS
Sponsored by ICST
Technically co-sponsored by CREATE-NET and Zayed University

***

SCOPE

The Internet has made it easier to perpetrate traditional crimes by providing criminals an alternate avenue for launching attacks with relative anonymity. The increased complexity of the communication and networking infrastructure is making investigation of the crimes difficult. Clues of illegal activities are often buried in large volumes of data that need to be sifted through in order to detect crimes and collect evidence. The field of digital forensics is becoming very important for law enforcement, network security, and information assurance. This is a multidisciplinary area that encompasses multiple fields, including: law, computer science, finance, networking, data mining, and criminal justice. The applications of this technology are far-reaching which include law enforcement, disaster recovery, accounting frauds, homeland security, and information warfare. This conference brings together practitioners and researchers from diverse fields providing opportunities for business and intellectual engagement among attendees. The conference is organized by the College of Information Technology at Zayed University with the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (ICST).

***

TOPICS

Technical papers describing original, previously unpublished research, not currently under review by another conference or journal, are solicited. The following topics highlight the conference theme:

* Financial Crimes (Money Laundering, Fraud, Identity Theft)
* Forensic Accounting (Accounting Fraud, Continuous Assurance, etc.)
* Digital Forensics Training & Education
* Digital Forensics Process and Procedures
* Digital Forensics & Law (e-Discovery & Litigation Support, Incident Response, Evidence Handling)
* Cyber Crime Investigations
* Cyber Security & Information Warfare
* Computer/Handheld Device & Multimedia Forensics (Tools and Techniques)
* Forensics Standardization, Accreditation
* Cyber Criminal Psychology and Profiling


***

PUBLICATION

The conference proceedings will be published in the series of the Lecture Notes of ICST (LNICST) by Springer.

***

SUBMISSION

For submission guidelines, please visit http://d-forensics.org/submissiondetails.shtml

***

CALL FOR PRESENTATIONS

SCOPE

The 2nd International ICST Conference on Digital Forensics and Cyber Crime (ICDF2C) is a unique conference encompassing not only technical, but also the social, legal, and business aspects of forensics. The forensics field is set to explode and the United Arab Emirates is in a prime position to take advantage of it. The United Arab Emirates has taken large governmental efforts in establishing UAE Cyber Laws, Digital Forensic Laboratories in Abu Dhabi and Dubai, governmental bodies specializing in security and has now introduced digital forensic research, development and education in the higher educational system. By bringing together both practitioners and researchers, we hope to benefit from understandings of current practice and the innovations that research has to offer.

This call for presenters is in addition to the call for papers. As opposed to research papers, the presentations will be focused on more applied topics. Presentation length should be from 1/2 to 1-hour. Presentations must be vendor neutral.

For submission guidelines, please visit http://d-forensics.org/callforpresentations.shtml.

***

TUTORIAL (tentative)

Advances in Digital Image Forensics
by Dr. Nasir Memon, Polytechnic Institute of New York University, USA

Given the ease by which digital images can be created, altered, and manipulated with no obvious traces, digital image forensics has emerged as a research field with important implications for ensuring digital image credibility. This tutorial will provide an overview of recent developments in the field, focusing on three problems. First, collecting image evidence and reconstructing them from fragments with or without missing pieces. This involves sophisticated file carving technology. Second, attributing the image to a source, be it a camera, a scanner, or a graphically generated picture. The process entails associating the image with a class of sources with common characteristics (device model) or matching the image to an individual source device, for example a specific camera. Third, attesting to the integrity of image data. This involves image forgery detection to determine whether an image has undergone modification or processing after being initially captured.

For further information please visit http://d-forensics.org/tutorial.shtml

***

IMPORTANT DATES

Paper Submission Deadline: 1 May 2010
Notification of Paper Acceptance: 15 June 2010
Camera-Ready Paper Submission: 1 August 2010
Presentation Proposal Submission Deadline: 1 June 2010
Notification of Presentation Proposal Acceptance: 15 June 2010
Presentation Submission Deadline: 1 August 2010

***

ORGANIZING COMMITTEE

General Chair
Ibrahim Baggili, College of Information Technology, Zayed University, UAE

For a complete list of committee and board members, please visit http://d-forensics.org/orgcommittee.shtml

Related Resources

ICST 2017   IEEE International Conference on Software Testing, Verification and Validation (ICST) 2017
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
BDACCIP 2017   The First International Workshop on Big Data Analytic for Cyber Crime Investigation and Prevention
DSN 2018   The 48th IEEE/IFIP International Conference on Dependable Systems and Networks
ICST 2018   The 11th IEEE International Conference on Software Testing, Verification, and Validation (ICST 2018)
Future_Internet-SI 2017   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
Cyber Security 2018   IEEE International Conference on Cyber Security and Protection of Digital Services
eCrime 2018   13th Symposium on Electronic Crime Research
AI 2017   3rd International Conference on Artificial Intelligence and Applications
Smart-City-IoT-Security 2017   Special Issue on Security of IoT-enabled Infrastructures in Smart Cities