[AISWorld] CFP - DFIS-13 (Digital Forensics and Information Security)

Glenn S. Dardick gdardick at dardick.net
Sat Mar 16 16:56:08 EDT 2013


CFP - DFIS-13 (Digital Forensics and Information Security)
===============================================================================
                    Published by Springer-LNEE (EI and SCOPUS Index)
 ===============================================================================
  
 ==Overview ==
 
Digital Forensics and Information Security (DFIS) are key elements for the next generation communication and networking environments where all applications and services are focused on users. In addition, the DFIS has emerged rapidly an exciting new paradigm to provide reliable and comfortable life services. Furthermore, the benefits of DFIS will only be realized if security issues can be appropriately addressed. Specially, forensics for DFIS is very important in the security fields. This workshop is intended to foster state-of-the-art research Digital Forensics and Information Security in the area of DFIS including information and communication technologies, law, social sciences and business administration.
The DFIS-13 is the next event in a series of highly successful the 6th International Symposium on Digital Forensics and Information Security (DFIS-12, Canada, 2012), which was the next extended event of the International Workshop on Forensics for Future Generation Communication environments : F2GC-11 (Loutraki, Greece), F2GC-10 (Cebu, Philippines), F2GC-09 (Jeju , Korea), F2GC-08 (Sanya, China), F2GC-09 (Jeju , Korea). Papers presented in the DFIS-13 will be published by Springer Lecture Notes in Electrical Engineering (Indexed by EI & SCOPUS).
  

 ==Topics==

Track1. Digital Forensics
--------------------------
Digital forensics tools 
Digital Evidence Management 
Digital Evidence Analytics
Digital Forensics Surveillance Technology and Procedures 
Digital evidence visualisation and communication 
Digital evidence storage and preservation 
Incident response and investigation 
Cybercrime and responses
Forensic procedures 
Portable electronic device forensics 
Anti-forensic techniques and methods
Network forensics 
Social networking forensics
Data hiding and recovery 
Network traffic analysis, traceback and attribution 
Legal, ethical and policy issues related to digital forensics 
Integrity of digital evidence and live investigations 
Multimedia analysis 
Trends and Challenges 
Evidence Protection 
Forensics case studies 
 

Track 2. Information Security
------------------------------
Authentication and access control 
Anonymity, identity management 
Cryptographic protocols 
Digital right management and intellectual property protection 
Applied cryptography 
Denial of service attacks 
Intrusion tolerance
IDS and Firewall
Information warfare 
Steganography and watermarking 
System and network security 
Multimedia security 
Smartphone security issues 
Security for open convergence system 
Security for M2M platform 
Privacy-enhancing technology 
Security requirements engineering 
Trust models and trusted computing
Mobile trusted computing 
Cloud computing security 
Virtualization for trusted platforms 



 ==SUBMISSION and Publications==
There will be a combination of presentations including scientific papers. Prospective authors are invited, in the first instance, to submit papers for oral presentations in any of the areas of interest for this conference. Authors should submit a paper with 6-8 pages in length, including all figures, tables, and references. If you want to submit more than page limitation, you can add up to 2 extra pages with the appropriate fee payment. 

Papers must strictly adhere to page limits as follows. 
- Regular Paper: 6 pages (Max 2 extra pages allowed at additional cost : by 8 pages) 
Papers exceeding the page limits will be rejected without review.

 Please use the Springer Proceedings format for submission. 
Template is available on: http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0


Online Submission System : http://www.editorialsystem.net/dfis2013 

  
Distinguished accepted and presented papers in DFIS-13, after further revisions, 
will be published in the special issues of the international journals.

- The Journal of Supercomputing - Springer (SCI) 
- Wireless Personal Communications - Springer (SCIE) 
- International Journal of Communication Systems - Wiley (SCIE)  
- Human-centric Computing and Information Sciences (HCIS), Springer (Open Access)
- Journal of Convergence (JoC), FTRA Publising 
- International Journal of Information Technology, Communications and Convergence (IJITCC), InderScience

  
==Important Dates==
-Submission Deadline:  March 20, 2013 (Extended)
-Authors Notification: May 1, 2013
-Author Registration:  May 15, 2013
-Final Manuscript:     May 15, 2013
-Symposium Dates:      September 4-6, 2013

  

==ORGANIZATION  ==
Steering Chair
--------------
James J. Park, SeoulTech, Korea


General Chairs
--------------
Ryoichi Sasaki, Tokyo Denki University, Japan
Krzysztof Szczypiorski, Warsaw University of Technology, Poland 


Program Chairs
---------------
Glenn S. Dardick, Longwood University, USA  
Xuelong Li, University of London, UK 
Shiuh-Jeng Wang, Central Police University, Taiwan 
Soon M. Chung, Wright State University, USA


Publicity  Chairs
-----------------
Kisik Jang, Korea National Police Agency, Korea 
Yan Wang, Macquarie University, Australia
Hung-Min Sun, National Tsing Hua University, Taiwan
Javier Garcia Villalba, Complutense University of Madrid, Spain   
Xiaofei He, Zhejiang University, China
K.P. Chow, University of Hongkong, Hongkong 
Jeong Hyun Yi, Soongsil University, Korea 


Programme Committee:
Please visit the website http://web.ftrai.org/dfis2013/


  
==CONTACTS==
If you have any questions about the CFPs and papers submission, 
please email to Prof. James J. Park (parkjonghyuk1 at hotmail.com).


Regards,
Glenn S. Dardick

Director, Longwood Center for Cyber Security, Longwood University, USA
Director, Association for Digital Forensics, Security and Law  
Publisher, Journal of Digital Forensics, Security and Law  
Adjunct Associate Professor, ECU Security Research Institute, Edith Cowan University, Australia 




More information about the AISWorld mailing list