posted by user: cvarol || 4582 views || tracked by 7 users: [display]

ISDFS 2020 : 8th International Symposium on Digital Forensics and Security

FacebookTwitterLinkedInGoogle

Link: http://isdfs.org/
 
When Jun 1, 2020 - Jun 2, 2020
Where Remote/Online
Submission Deadline Apr 30, 2020
Notification Due May 8, 2020
Final Version Due May 15, 2020
Categories    digital forensics   cyber security   cryptogragphy   computer science
 

Call For Papers

PRESENTATIONS WILL BE CONDUCTED ONLINE

Dear Colleagues,

We understand that flying to Lebanon is almost impossible for most of us due to the coronavirus. As a result, we received approval from IEEE to conduct our Symposium sessions remotely. Therefore, you are no longer required to take travel for ISDFS. Because of this change, we are also able to substantially lower the registration price for the symposium. The final due date for paper submission is April 30, 2020. We look forward to receiving your participation in the event.


ISDFS provides a platform for researchers and experts in academia, industry and government to exchange ideas and recent developments in digital forensics and security. After the several successful events, the seventh ISDFS conference will continue to promote and disseminate knowledge concerning several topics and technologies related to Digital Forensics and Security.

Besides the main session, special sessions, workshops, tutorials, keynotes, panel discussions, poster and oral presentations will be included in the symposium program.

All papers will be reviewed by at least three independent reviewers (single-blinded review). Accepted full papers will be submitted for publication in IEEE Xplore Digital Library.

Topics within the scope of the symposium include, but are not limited to, the following areas:

Digital Forensics

Digital Forensics Process Model, Information Systems and Crime Analysis, Business Application of Digital Forensics, Digital Forensics Techniques and Tools, Legal and Policy Issues Related to Digital Forensics, Digital Forensics Case Studies, Database Forensics, Cloud Forensics, Mobile & Multimedia Forensics, Network Forensics, Digital Forensics Training and Education, Big Data and Digital Forensics, Cyber Forensics, Digital Forensics Tool Testing and Validation Process, Digital Forensics Trends, Digital Forensics & Law, Anti and Counter Forensics, Data Hiding and Recovery, Cyber Crime Investigations, Cyber Culture & Cyber Terrorism, Incident Response, Information Warfare & Critical Infrastructure Protection.

Data Privacy

Digital Signature, Certified Electronic Mail, Certificates and Certificate Management, Standards, Protocols, Trust Models, Key and Identity Management, Digital Signature Policies and Law, Validity of Digital Signature in Government, Finance, and Commerce, Effects of Digital Signature on Digital Signature Law, Responsibilities for Opponents to ESSP in Law in Digital Signature, Discrepancy between Digital Signatures, Judgments related to Digital Signatures, Digital Signature Law in Other Countries.

Cryptography

Block Ciphers, Stream Ciphers, Public Key Cryptography, Quantum Cryptography, Elliptic Curve Cryptography, Algebraic Curves in Cryptography, Homomorphic Encryption, Cryptographic Protocols, Zero Knowledge, Secret Sharing, Cryptanalysis, Hash Functions, Applications of Coding Theory in Cryptography
Smart Card Applications and Security, Cryptographic Hardware and Embedded Systems, Special Purpose Hardware for Attacking Cryptographic Systems, Side Channel Analysis and Countermeasures, Pairing Based Cryptography, Key and Identity Management.

Information Security

Steganography and Steganalysis, Secure Multiparty Computation, Biometric Approaches, Computer Security, Mobile Communications Security, Operating System Security, Trusted Computing, Network Security, Wireless Security, Database Security, IPTV Security, E-commerce Protocols, Content filtering and tracing, Distributed System Security, Security Weaknesses on Information Technologies, Secure Code Development, Penetration Tests, Intrusion Detection Systems, Malicious Codes and spyware, Viruses, Spyware, Spamware, Scam, Energy/Cost/Efficiency of Security in Clouds, Security Risk Models and Clouds, Security Standards and Practices.

Computer Science

Artificial Intelligence , Artificial/Deep Learning, Cloud Computing , Data Mining/Big Data , High Performance Computing, Internet of Things, Virtual and Augmented Reality , Secure Systems, Signal/Image/Video Processing, Human–Machine Interaction, Bioinformatics, Robotics, Social Networks, Algorithms and Data Structures, Game Theory, Soft Computing, Natural Language Processing, Operating System, Computer Graphics, Programming Languages, Software Engineering, Theory of Computation.

At the end of the symposium, a Best Paper Award and a Best Student Presentation Award will be granted by the ISDFS 2020 Program Committee. In order to qualify for the award(s), at least one of the authors must register and the paper(s) must be presented.

Related Resources

IEEE-CVIV 2020   2020 2nd International Conference on Advances in Computer Vision, Image and Virtualization (CVIV 2020)
FDAE_AI_BDA 2020   Special Issue on Forensics Data Analytics Enhancement via Artificial Intelligences and Big Data Analytics
GreeNet Symposium - SGNC 2020   11th Symposium on Green Networking and Computing (SGNC 2020)
JoWUA SI 2021   JoWUA Special Issue on Multidisciplinary Solutions to Modern Cybersecurity Challenges
IEEE-CTISC 2020   2020 2nd International Conference on Advances in Computer Technology, Information Science and Communications (CTISC 2020)
BDACCIP 2020   The 4th International Workshop on Big Data Analytic for Cyber Crime Investigation and Prevention 2020
AIFU 2020   6th International Conference on Artificial Intelligence and Applications
SI BIOFOR 2020   Special Issue on Advances in Digital Security: Biometrics and Forensics (BIOFOR)
IWDW 2020   The 19th International Workshop on Digital-forensics and Watermarking
ACM--NLPIR--Ei Compendex and Scopus 2020   ACM--2020 4th International Conference on Natural Language Processing and Information Retrieval (NLPIR 2020)--Scopus, Ei Compendex