ICDF2C 2015 - 7th International Conference on Digital Forensics & Cyber Crime
View: 1313
Website http://d-forensics.org/2015/show/home |
Edit Freely
Category Anti Forensics and Anti-Anti Forensics; Big Data and Digital Forensics; Cyber Crime; Hacking; Online Fraud; Software & Media Piracy;
Deadline: April 13, 2015 | Date: October 06, 2015-October 08, 2015
Venue/Country: South Korea
Updated: 2015-03-30 23:50:35 (GMT+9)
Call For Papers - CFP
CALL FOR PAPERS ICDF2C and KDFS 2015The International Conference on Digital Forensics and Cyber Crime (ICDF2C) brings together leading researchers, practitioners, and educators from around the world to advance the state of the art in digital forensic and cyber crime investigation. Keeping up with our international and collaborative nature at ICDF2C, we are proud to announce that ICDF2C 2015 will run jointly with the Korean Digital Forensic Society's Annual Conference (KDFS 2015).ICDF2C 2015 will be held October 6 - 8, 2015 in Seoul, South Korea. We invite contributions for completed research papers, research-in-progress papers, industrial talks, panel and tutorial proposals, and round table discussions. Research papers are evaluated through a double-blind, peer-reviewing process and accepted research papers will be published in printed proceedings by Springer-Verlang.Special ThemesThis year, we have two themes that we intend to embrace. Authors are encouraged to submit papers relating to these themes:Usage, implications and investigation of the “Dark Web”Case studies and investigation techniques relating to cryptocurrenciesSCOPEThe Internet has made it easier to perpetrate crimes by providing criminals an avenue for launching attacks with relative anonymity. The increased complexity of global communication and networking infrastructure and devices makes investigation of cybercrimes difficult. Clues of illegal activities are often buried in large volumes of data that need to be sifted through in order to detect crimes and collect evidence. The field of digital forensics and cybercrime investigation has become very important for law enforcement, national security, and information assurance. Digital forensics and cybercrime investigations are multidisciplinary areas that encompasses law, computer science, finance, telecommunications, data analytics, policing and more. ICDF2C brings together practitioners and researchers from diverse fields providing opportunities for business and intellectual engagement among attendees.The following topics highlight the conference's theme:Anti Forensics and Anti-Anti ForensicsBig Data and Digital ForensicsBusiness Applications of Digital ForensicsCivil Litigation SupportCloud ForensicsCyber Crime InvestigationsCyber Criminal Psychology and ProfilingCyber Culture & Cyber TerrorismData hiding and steganographyDatabase ForensicsDigital Forensic ScienceDigital Forensic Tool Testing and validationDigital Forensic TrendsDigital Forensics & LawDigital Forensics and Error ratesDigital Forensics novel algorithmsDigital Forensics Process & ProceduresDigital Forensics Standardization & AccreditationDigital Forensics Techniques and ToolsDigital Forensics Triagee-DiscoveryHackingIncident ResponseInformation Warfare & Critical Infrastructure ProtectionLaw Enforcement and Digital ForensicsMachine learning and Digital ForensicsMalware & BotnetsMobile / Handheld Device & Multimedia ForensicsMoney LaunderingNetwork forensicsNew chip-off techniquesNovel Digital Forensics Training programsOnline FraudProgramming Languages and Digital ForensicsSCADA ForensicsSexual Abuse of Children on InternetSoftware & Media PiracyTheoretical Foundations of Digital ForensicsTraditional Criminology applied to Digital ForensicsPhilosophical accounts for Cyber Crime and Digital ForensicsRESEARCH PAPERSPapers describing original unpublished research are solicited. Submissions must not be concurrently under review by a conference, journal or any other venue that has proceedings. Papers in the topic areas discussed are preferred, although contributions outside those topics may also be of interest. Please feel free at any time to contact the conference general chair if you have questions regarding your submission.BEST PAPER AWARDThe program committee may designate up to three papers accepted to the conference as ICDF2C Best Papers. Every submission is automatically eligible for this award.OTHER SUBMISSION CATEGORIESSubmissions can be made in a number of categories: Completed research papers, research-in-progress papers, industrial talks, panel and tutorial proposals, and round table discussions. Please follow the following guidelines in preparing your submission.Completed Research Papers: No longer than 10 pages (including abstract, figures, tables and references).Research in Progress Papers: No longer than 6 pages (including abstract, figures, tables and references).Industrial Talk: Typically a 1,000 word description of the proposed talk. All talks must be vendor neutral.Round Table Discussion: Typically a 1,000 word synopsis of the topic area.Panel Proposals: Typically a 1,000 word description, identifying the panelists to be involved.Tutorial Proposals: Typically a 1,000 word description of topic(s), potential speakers, program length, and potential audience. Also, include proposer resume(s).SUBMISSION INSTRUCTIONSPaper submission will be handled electronically. Papers must be formatted using Springer LNICST Authors' Kit (http://d-forensics.org/2015/show/authors-kit) and submitted only through Easychair.org by going here: https://www.easychair.org/conferences/?conf=icdf2c2015.All submitted papers will be judged based on their quality through double-blind reviewing. Authors' names must not appear in the paper. All other submissions should be sent via email to the conference general chairs (Dr. Joshua I. James joshua at cybercrimetech dot com).PUBLICATIONSAccepted papers will be published in the ICDF2C 2015 Conference Proceedings and by Springer-Verlag in the Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Tele-communications Engineering (LNICST) series.The proceedings will be available both as paper-based copies and via Springerlink, Springer's digital library. In addition, the content of the proceedings will be submitted for inclusion in leading indexing services, including DBLP, Google Scholar, ISI Proceedings, EI, CrossRef and Zentralblatt Math, as well as ICST's own EU Digital Library (EUDL).Further, we are partnering with Elsevier's "Digital Investigation: The International Journal of Digital Forensics & Incident Response" to invite expanded versions of specially selected papers for inclusion in their SCI-indexed publication.IMPORTANT DATESPaper Submission: 30 March, 2015 (any time zone)Notification of Acceptance: 1 June, 2015Camera-ready Version: 1 July, 2015
Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.