ICDF2C 2010 : 2nd International ICST Conference on Digital Forensics & Cyber Crime
Call For Papers
CALL FOR PAPERS
KEYNOTE SPEAKERS (tentative)
Dr. Eugene Spafford, Purdue University and CERIAS, USA
Dr. Marcus Rogers, Purdue University and CERIAS, USA
Sponsored by ICST
Technically co-sponsored by CREATE-NET and Zayed University
The Internet has made it easier to perpetrate traditional crimes by providing criminals an alternate avenue for launching attacks with relative anonymity. The increased complexity of the communication and networking infrastructure is making investigation of the crimes difficult. Clues of illegal activities are often buried in large volumes of data that need to be sifted through in order to detect crimes and collect evidence. The field of digital forensics is becoming very important for law enforcement, network security, and information assurance. This is a multidisciplinary area that encompasses multiple fields, including: law, computer science, finance, networking, data mining, and criminal justice. The applications of this technology are far-reaching which include law enforcement, disaster recovery, accounting frauds, homeland security, and information warfare. This conference brings together practitioners and researchers from diverse fields providing opportunities for business and intellectual engagement among attendees. The conference is organized by the College of Information Technology at Zayed University with the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (ICST).
Technical papers describing original, previously unpublished research, not currently under review by another conference or journal, are solicited. The following topics highlight the conference theme:
* Financial Crimes (Money Laundering, Fraud, Identity Theft)
* Forensic Accounting (Accounting Fraud, Continuous Assurance, etc.)
* Digital Forensics Training & Education
* Digital Forensics Process and Procedures
* Digital Forensics & Law (e-Discovery & Litigation Support, Incident Response, Evidence Handling)
* Cyber Crime Investigations
* Cyber Security & Information Warfare
* Computer/Handheld Device & Multimedia Forensics (Tools and Techniques)
* Forensics Standardization, Accreditation
* Cyber Criminal Psychology and Profiling
The conference proceedings will be published in the series of the Lecture Notes of ICST (LNICST) by Springer.
For submission guidelines, please visit http://d-forensics.org/submissiondetails.shtml
CALL FOR PRESENTATIONS
The 2nd International ICST Conference on Digital Forensics and Cyber Crime (ICDF2C) is a unique conference encompassing not only technical, but also the social, legal, and business aspects of forensics. The forensics field is set to explode and the United Arab Emirates is in a prime position to take advantage of it. The United Arab Emirates has taken large governmental efforts in establishing UAE Cyber Laws, Digital Forensic Laboratories in Abu Dhabi and Dubai, governmental bodies specializing in security and has now introduced digital forensic research, development and education in the higher educational system. By bringing together both practitioners and researchers, we hope to benefit from understandings of current practice and the innovations that research has to offer.
This call for presenters is in addition to the call for papers. As opposed to research papers, the presentations will be focused on more applied topics. Presentation length should be from 1/2 to 1-hour. Presentations must be vendor neutral.
For submission guidelines, please visit http://d-forensics.org/callforpresentations.shtml.
Advances in Digital Image Forensics
by Dr. Nasir Memon, Polytechnic Institute of New York University, USA
Given the ease by which digital images can be created, altered, and manipulated with no obvious traces, digital image forensics has emerged as a research field with important implications for ensuring digital image credibility. This tutorial will provide an overview of recent developments in the field, focusing on three problems. First, collecting image evidence and reconstructing them from fragments with or without missing pieces. This involves sophisticated file carving technology. Second, attributing the image to a source, be it a camera, a scanner, or a graphically generated picture. The process entails associating the image with a class of sources with common characteristics (device model) or matching the image to an individual source device, for example a specific camera. Third, attesting to the integrity of image data. This involves image forgery detection to determine whether an image has undergone modification or processing after being initially captured.
For further information please visit http://d-forensics.org/tutorial.shtml
Paper Submission Deadline: 1 May 2010
Notification of Paper Acceptance: 15 June 2010
Camera-Ready Paper Submission: 1 August 2010
Presentation Proposal Submission Deadline: 1 June 2010
Notification of Presentation Proposal Acceptance: 15 June 2010
Presentation Submission Deadline: 1 August 2010
Ibrahim Baggili, College of Information Technology, Zayed University, UAE
For a complete list of committee and board members, please visit http://d-forensics.org/orgcommittee.shtml