posted by organizer: mohamedeltaweel || 3619 views || tracked by 6 users: [display]

FoSec 2016 : Call for Book Chapters in Innovation in Multimedia Forensics and Security: Theory and Practice

FacebookTwitterLinkedInGoogle

 
When Jan 15, 2016 - Mar 1, 2016
Where Egypt
Submission Deadline TBD
Categories    crime investigation   digital forensics   cloud security   cryptology
 

Call For Papers

Digital forensics is the process of uncovering and interpreting electronic data. The goal of the process is to preserve any evidence in its most original form while performing a structured investigation by collecting, identifying and validating the digital information for the purpose of reconstructing past events. However, digital forensics compared with traditional forensic science poses major challenges. Information on a computer system can be altered or hidden without a trace. Moreover the variety formats and the exponential growth data added another challenge that related to the need to analyse and take decisions in vast times. The objective of
this edited book is to provide the researchers of computer science and information technology the recent advances in the fields of digital forensics, which are required to achieve necessary knowledge about that field of computer science. In order to achieve these objectives, the book chapters will emphasize on theoretical advances and its applications to real life problems.

Description and Scope of the Book

Digital forensics (sometimes known as digital forensic science) is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime. The term digital forensics was originally used as a synonym for computer forensics but has expanded to cover investigation of all devices capable of storing digital data. With roots in the personal computing revolution of the late 1970s and early '80s, the discipline evolved in a haphazard manner during the 1990s, and it was not until the early 21st century that national policies emerged. Digital forensics investigations have a variety of applications. The most common is to support or refute a hypothesis before criminal or civil (as part of the electronic discovery process) courts.

Forensics may also feature in the private sector; such as during internal corporate
investigations or intrusion investigation (a specialist probes into the nature and extent of an unauthorized network intrusion). The ultimate objectives of this volume are to provide challenges and opportunities to the research communities with an updated, in-depth material on the Multimedia Forensics and Security: Foundations, Innovations, and Applications in order to finding solutions to the challenges and problems facing forensics and information security applications. We invite all
researchers and practitioners who are developing algorithms, systems, and applications, to share their results, ideas, and experiences. Besides the main topic covering all related multimedia Forensics and security problems in the area of information security are also welcomed. Topics include, but are not limited to:

 Technology Crime Investigation: Mobile forensics
 Forensics Multimedia analysis
 An examination of digital forensic models
 Basic Digital Forensic Investigation Concepts
 Computer and intrusion forensics
 Forensic analysis in the digital world
 Legal Aspects of Digital Forensics
 Watermarking technology
 Cloud security
 Cryptology
 Multimedia authentication
 Digital Fingerprinting for Multimedia Security and Forensics
 Detection of forgeries
 Digital evidences

Submission Deadlines

Submitted manuscripts should conform to the standard guidelines of the Springer's book chapter format. Manuscripts must be prepared using Latex, or Words , and according to the Springer's svmlt template that can be downloaded from the (link) Manuscripts that do not follow the formatting rules will be ignored. Prospective authors should submit their manuscripts electronically through the email to Dr. Mohamed Mostafa via email mmostafa_fouad@yahoo.com. Submitted manuscripts will be refereed by at least two independent and expert reviewers for quality, correctness, originality, and relevance.

FULL CHAPTER SUBMISSION: Chapters have to be no more than 25 pages length and will be reviewed by two expert reviewers to ensure the quality of the volume. The deadline of submission is January 15, 2016.

NOTIFICATION: Authors of submitted chapters will be notified by 15th February 2016,
about their acceptance. Camera-ready version of accepted chapters is expected to be
submitted by March 1st , 2016.

Volume Editors

Mohamed Mostafa Fouad
Arab Academy for Science, Technology, and Maritime Transport.
Scientific Research Group in Egypt (SRGE)
mmostafa_fouad@yahoo.com

Azizah Abdul Manaf,
Advanced Informatics School, Universiti Teknologi Malaysia,
Jalan Semarak, 54100 Kuala Lumpur, Malaysia
azizaham.kl@utm.my

Abou Ella Hassanien
Scientific Research Group in Egypt (SRGE)
Faculty of Computers & Information
Cairo University, Egypt
aboitcairo@gmail.com
Mazdak Zamani

Advanced Informatics School, Universiti Teknologi Malaysia,
Jalan Semarak, 54100 Kuala Lumpur, Malaysia
mazdak@utm.my
Rabiah Ahmad
Universiti Teknikal Melaka (UTem), Malaysia
rabiah@utem.edu.my
Janusz Kacprzyk
Systems Research Institute
Polish Academy of Sciences, Poland
E-mail: Janusz.Kacprzyk@ibspan.waw.pl

Related Resources

Book 2025   Call for book Chapters Mitigating the Risks of AI Deepfakes
IOTBS 2025   5th International Conference on IOT, Big Data and Security
SpS&DA 2025   Call for book chapters - Speech strategies and discourse analysis: the powerful and the oppressed (edited volume)
ECCWS 2024   23rd European Conference on Cyber Warfare and Security
Call for Book Chapters 2024   Call for Book Chapters on Creative Disruption: Impact of AI on English Language and Literature Studies
JITST 2024   Journal of Internet Technology and Secured Transactions
DLGM 2024   Call For Book Chapters 2024: Deep Learning in Genome Mapping, CRC Press (Taylor & Francis Group)
ECCWS 2025   24th European Conference on Cyber Warfare and Security
The Mississippi River: A Cultural Artery 2025   Call for Papers: The Mississippi: Soundings on America’s Arterial River
IOTBS 2025   5th International Conference on IOT, Big Data and Security