posted by user: ICST || 7750 views || tracked by 14 users: [display]

ICDF2C 2010 : 2nd International ICST Conference on Digital Forensics & Cyber Crime

FacebookTwitterLinkedInGoogle

Link: http://d-forensics.org/
 
When Oct 4, 2010 - Oct 6, 2010
Where Abu Dhabi, UAE
Submission Deadline May 1, 2010
Notification Due Jun 15, 2010
Final Version Due Aug 1, 2010
Categories    digital forensics   cyber crime   security
 

Call For Papers

CALL FOR PAPERS


KEYNOTE SPEAKERS (tentative)

Dr. Eugene Spafford, Purdue University and CERIAS, USA
Dr. Marcus Rogers, Purdue University and CERIAS, USA

***

SPONSORS
Sponsored by ICST
Technically co-sponsored by CREATE-NET and Zayed University

***

SCOPE

The Internet has made it easier to perpetrate traditional crimes by providing criminals an alternate avenue for launching attacks with relative anonymity. The increased complexity of the communication and networking infrastructure is making investigation of the crimes difficult. Clues of illegal activities are often buried in large volumes of data that need to be sifted through in order to detect crimes and collect evidence. The field of digital forensics is becoming very important for law enforcement, network security, and information assurance. This is a multidisciplinary area that encompasses multiple fields, including: law, computer science, finance, networking, data mining, and criminal justice. The applications of this technology are far-reaching which include law enforcement, disaster recovery, accounting frauds, homeland security, and information warfare. This conference brings together practitioners and researchers from diverse fields providing opportunities for business and intellectual engagement among attendees. The conference is organized by the College of Information Technology at Zayed University with the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (ICST).

***

TOPICS

Technical papers describing original, previously unpublished research, not currently under review by another conference or journal, are solicited. The following topics highlight the conference theme:

* Financial Crimes (Money Laundering, Fraud, Identity Theft)
* Forensic Accounting (Accounting Fraud, Continuous Assurance, etc.)
* Digital Forensics Training & Education
* Digital Forensics Process and Procedures
* Digital Forensics & Law (e-Discovery & Litigation Support, Incident Response, Evidence Handling)
* Cyber Crime Investigations
* Cyber Security & Information Warfare
* Computer/Handheld Device & Multimedia Forensics (Tools and Techniques)
* Forensics Standardization, Accreditation
* Cyber Criminal Psychology and Profiling


***

PUBLICATION

The conference proceedings will be published in the series of the Lecture Notes of ICST (LNICST) by Springer.

***

SUBMISSION

For submission guidelines, please visit http://d-forensics.org/submissiondetails.shtml

***

CALL FOR PRESENTATIONS

SCOPE

The 2nd International ICST Conference on Digital Forensics and Cyber Crime (ICDF2C) is a unique conference encompassing not only technical, but also the social, legal, and business aspects of forensics. The forensics field is set to explode and the United Arab Emirates is in a prime position to take advantage of it. The United Arab Emirates has taken large governmental efforts in establishing UAE Cyber Laws, Digital Forensic Laboratories in Abu Dhabi and Dubai, governmental bodies specializing in security and has now introduced digital forensic research, development and education in the higher educational system. By bringing together both practitioners and researchers, we hope to benefit from understandings of current practice and the innovations that research has to offer.

This call for presenters is in addition to the call for papers. As opposed to research papers, the presentations will be focused on more applied topics. Presentation length should be from 1/2 to 1-hour. Presentations must be vendor neutral.

For submission guidelines, please visit http://d-forensics.org/callforpresentations.shtml.

***

TUTORIAL (tentative)

Advances in Digital Image Forensics
by Dr. Nasir Memon, Polytechnic Institute of New York University, USA

Given the ease by which digital images can be created, altered, and manipulated with no obvious traces, digital image forensics has emerged as a research field with important implications for ensuring digital image credibility. This tutorial will provide an overview of recent developments in the field, focusing on three problems. First, collecting image evidence and reconstructing them from fragments with or without missing pieces. This involves sophisticated file carving technology. Second, attributing the image to a source, be it a camera, a scanner, or a graphically generated picture. The process entails associating the image with a class of sources with common characteristics (device model) or matching the image to an individual source device, for example a specific camera. Third, attesting to the integrity of image data. This involves image forgery detection to determine whether an image has undergone modification or processing after being initially captured.

For further information please visit http://d-forensics.org/tutorial.shtml

***

IMPORTANT DATES

Paper Submission Deadline: 1 May 2010
Notification of Paper Acceptance: 15 June 2010
Camera-Ready Paper Submission: 1 August 2010
Presentation Proposal Submission Deadline: 1 June 2010
Notification of Presentation Proposal Acceptance: 15 June 2010
Presentation Submission Deadline: 1 August 2010

***

ORGANIZING COMMITTEE

General Chair
Ibrahim Baggili, College of Information Technology, Zayed University, UAE

For a complete list of committee and board members, please visit http://d-forensics.org/orgcommittee.shtml

Related Resources

CYBER 2025   The Tenth International Conference on Cyber-Technologies and Cyber-Systems
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
BDACCIP 2025   The 7th International Workshop on Big Data Analytic for Cyber Crime Investigation and Prevention
SAI 2025   14th International Conference on Soft Computing, Artificial Intelligence and Applications
ECCWS 2024   23rd European Conference on Cyber Warfare and Security
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
ISDFS 2025   13th International Symposium on Digital Forensics and Security
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)
ECCWS 2025   24th European Conference on Cyber Warfare and Security
IEEE CSR 2025   2025 IEEE International Conference on Cyber Security and Resilience