| |||||||||||||
ICDF2C 2018 : ICDF2C 2018 - 10th EAI International Conference on Digital Forensics & Cyber Crime | |||||||||||||
Link: http://d-forensics.org/ | |||||||||||||
| |||||||||||||
Call For Papers | |||||||||||||
Scope
------------ Cyberspace is becoming increasingly central to the basic function of modern society. Cybercrime and cyber warfare have emerged as major threats to the integrity of digital information and to the functioning of cyber-controlled physical systems. Such threats have direct consequences for almost all individuals, businesses and organizations, government institutions, and civic processes. Digital forensics and cybercrime investigations are multidisciplinary areas that encompass law and law enforcement, computer science and engineering, IT operations, economics and finance, data analytics and criminal justice. ICDF2C brings together researchers and practitioners from all these areas in order to scientifically address the numerous challenges due to the rapid increase in the amount and variety of data under investigation, as well as the growing complexity of both the threats and the targeted systems. Topics ------------------ Major topics of interest include, but are not limited to: Advances in Traditional System Forensic Methods: data recovery and reconstruction, filesystem/RAM/network/cache analysis, log analysis, mobile devices, database forensics, evidence obfuscation/sanitization and counter measures Multimedia and Artifact Analysis: audio/video reconstruction, data hiding and steganography, source authentication and forgery detection, theft and piracy detection Emerging Approaches to Cyber Forensics: evidence acquisition and analysis from cloud services, IoT devices, and social media; automated evidence processing, big data analytics, machine learning, blockchain analysis; digital-forensics-as-a-service Incident Response and Malware Analysis: threat detection, reverse engineering, triage, malware analysis and remediation, botnets, operational recovery SCADA Forensics and Critical Infrastructure Protection: reverse engineering and analysis of SCADA protocols, attack vectors, defenses; information warfare and attacks on cyber-physical systems Digital Forensic Science: theoretical models, applied models, reference data sets, tool testing, calibration, and validation; new approaches to training and education Cyber Crime Law, Psychology and Economics: legal developments, cyber crime investigations – methodology and case studies, criminal psychology and profiling, cyber culture, cyber terrorism, online fraud, cyber crime economics and markets, cryptocurrencies and money laundering Publication -------------------- All registered papers will be published by Springer and made available through LNICST SpringerLink Digital Library. ICDF2C proceedings are indexed in Ei Compendex, ISI Web of Science, Scopus, CrossRef, Google Scholar, DBLP, as well as EAI’s own EU Digital Library (EUDL). Authors of selected best accepted and presented papers will be invited to submit an extended version to: EAI Endorsed Transactions on Security and Safety Instructions for paper submission ------------------------ Research paper submission will be handled electronically. Research papers must be formatted using Springer LNICST Authors’ Kit and submitted only through Easychair.org. All submitted research papers (completed and in-progress) will be judged based on their quality through double-blind reviewing. Authors’ names must not appear in the paper. How do I submit a paper in EasyChair? Go to the EasyChair ICDF2C 2018 website Login or sign up as new user. In the top-left corner, select “New Submission”. Fill out the author and paper information, and upload your formatted paper. General Chairs -------------------- Vassil Roussev University of New Orleans Irfan Ahmed University of New Orleans Program Chairs: Mark Scanlon University College Dublin Frank Breitinger University of New Haven |
|