posted by organizer: eliska_eai || 5196 views || tracked by 3 users: [display]

EAI ICDF2C 2020 : (Virtual) ICDF2C 2020 - 11th EAI International Conference on Digital Forensics & Cyber Crime

FacebookTwitterLinkedInGoogle

Link: http://icdf2c.org/
 
When Oct 14, 2020 - Oct 16, 2020
Where Boston, United States
Submission Deadline May 15, 2020
Notification Due Jun 19, 2020
Final Version Due Aug 7, 2020
Categories    cyber crime   security   forensics   digital forensics
 

Call For Papers

Due to the safety concerns and travel restrictions caused by COVID-19, EAI ICDF2C 2020 will take place online in a live stream.

Non-authors and Co-Authors of already registered papers can register for access to the live stream completely free of charge.

Scope

The International Conference on Digital Forensics and Cyber Crime will be held October 14-16, 2020 in Boston. This three-day event is expected to attract well over 200 participants including academics, practitioners, and vendors providing opportunities for business and intellectual engagement among attendees. The conference is organized by the School of Business and the Forensic Analytics for Complex, Energy and Transportation Systems (FACETS) Center at the University at Albany, State University of New York.

The focus of this year’s conference is on various applications of digital evidence and forensics beyond “traditional” cybercrime investigations and litigation such as information security analytics, incident response, risk management, business and military intelligence, etc. Given below is an indicative list of possible topics.

***

Topics

Authors are invited to submit papers in information assurance and security for (but not limited to) these topics:

- Digital and Multimedia Evidence and Forensics:
Novel Digital Forensic Techniques and Tools; Multimedia Forensics (including but not limited to Image-, Audio-, and Video Analysis, Biometrics, Linguistic Analysis of Texts); Chip-off Forensics; Mobile & Network Forensics; ICS/SCADA Forensics; Live Data Forensics; Forensic Lab Management and Accreditation

- Legal Applications:
E-Discovery; Investigations of Cybercrime, Terrorism, Computer-Related Fraud, Computer-Related Forgery, Content-Related offences (Child abuse materials, Promotion of extremism), Copyright Infringement; Other Legal Aspects of Digital Evidence Procedure and Applications

- Applications in Technological Security:
Cloud Computing Security; Web Application Security; Database Security; Intrusion Detection/Prevention; Network Security; Mobile Device Security; Smart Grid Security; Self-Organized Resilient Systems; Critical Infrastructure Security; ICS/SCADA Security; Security of “Internet of Things”; Quantum Computing Security; Digital Currency Security; and Security of Wearable Devices; Digital Rights Management

- Applications / Issues in National and International Security Issues, Human Rights:
Trans-National Cybercrime Investigations and Mutual Legal Assistance; Internet-based Espionage & Advanced Persistent Threats; State-Sponsored Cyber Warfare & Terrorism; International Cyber Conflicts; Government Surveillance; Censorship and Control of the Internet; and International Cyber Laws and Confidence Building Measures

- Applications in Organizational Security and Incident Response:
Incident Response; Disaster Recovery; Insider Threat Management; Risk Management; Business Continuity; Security Policies; Security Auditing; Regulatory Compliance; Economics of Security; Behavioral Information Security

- Security and Forensics Education:
Accreditation of Security and Forensics Training; Innovative Pedagogic Techniques; Certifications; Hands-on Security Laboratories and Tabletop Exercises; Education Infrastructure; Diversity in Security/Forensics Education; and Online Security/Forensics Education

***

Publication

All registered papers will be submitted for publishing by Springer and made available through SpringerLink Digital Library.

Past volumes of ICDF2C proceedings are indexed in leading indexing services, including Ei Compendex, ISI Web of Science, Scopus, CrossRef, Google Scholar, DBLP, as well as EAI’s own EU Digital Library (EUDL).

Selected papers will be considered to be included in one of EAI Transactions.

Additional publication opportunities:
- EAI/Springer Innovations in Communications and Computing Book Series

***

Submission

Paper submission
Papers should be submitted through EAI ‘Confy+‘ system and have to comply with the Springer format.

Completed Research Papers
Typically, 5,000 words long (excluding abstract and references)

Research in Progress Papers
Typically, 2,500 words (excluding abstract and references)

Panel Proposals
Typically, 1,000-word description, identifying the panelists to be involved

Related Resources

MobiCASE 2025   16th EAI International Conference on Mobile Computing, Applications and Services
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
EAI HealthWear 2024   Scopus Indexed - EAI HealthWear 2024 (Isparta, Turkey / Online on December 2-3 2024
ECCWS 2024   23rd European Conference on Cyber Warfare and Security
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
ECCWS 2025   24th European Conference on Cyber Warfare and Security
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
IJITMC 2024   The International Journal of Information Technology, Modeling and Computing
ISDFS 2025   13th International Symposium on Digital Forensics and Security
EAI SAFER-TEA 2024   International Conference on Safe, Secure, Ethical, Responsible Technologies and Emerging Applications