[AISWorld] Third Call for Papers - ICDF2C 2013 - Submission Deadline 17 MAY 2013

Glenn S. Dardick gdardick at dardick.net
Sat May 4 05:42:38 EDT 2013


Subject: Third Call for Papers - ICDF2C 2013 - Submission Deadline 17 MAY 2013



=====================================================================

Fifth International Conference on Digital Forensics and Cyber Crime - ICDF2C 2013

25 - 27 September, 2013

Moscow, Russia

http://www.d-forensics.org/

=====================================================================



HIGHLIGHTS



- The best research papers presented at ICDF2C 2013 will be expanded and peer reviewed for a special issue of the Journal of Digital Investigation

- All accepted papers will be published by Springer and made available through SpringerLink Digital Library, one of the world's largest scientific libraries

- Proceedings will be submitted for indexing by Google Scholar, ISI, EI Compendex, Scopus and many more

- The event is held in conjunction with InfoSecurity Russia

- The event is endorsed by the European Alliance for Innovation (www.eai.eu<http://www.eai.eu>), a leading community-based organisation devoted to the advancement of innovation in the field of ICT.



Keeping up with our international theme at ICDF2C, we are proud to announce this year that ICDF2C 2013 will run in parallel to InfoSecurity Russia 2013, the premiere information security industry event in Russia.

We are also proud to announce that starting with this year's conference, ICDF2C is collaborating with the Journal of Digital Investigation, the leading international journal in the area of digital forensics and incident response. In addition to the publication of the proceedings in the Lecture Notes of the ICST, the best research papers presented at ICDF2C 2013 will be expanded and peer reviewed for a special issue of the Journal of Digital Investigation.

Participants in the 2013 conference will be able to attend both the InfoSecurity Russia event and ICDF2C and hear the latest developments in both research and industry. The conference provides a venue which offers chances for networking and high-quality training through expert speakers, state-of-the-art work from researchers all around the world, and tutorials on digital forensic techniques and methods of cyber crime investigation. This ICST conference is endorsed by EAI.



[Scope]



The Internet has made it easier to perpetrate crimes by providing criminals an avenue for launching attacks with relative anonymity. The increased complexity of the communication and networking infrastructure is making investigation of the cybercrimes difficult. Clues of illegal activities are often buried in large volumes of data that needs to be sifted through in order to detect crimes and collect evidence.



The field of digital forensics and cybercrime investigation has become very important for law enforcement, national security, and information assurance. This is a multidisciplinary area that encompasses law, computer science, finance, telecommunications, data analytics, and policing. This conference brings together practitioners and researchers from diverse fields providing opportunities for business and intellectual engagement among attendees.



The following topics highlight the conference's theme:



*        Business Applications of Digital Forensics

·         e-Discovery,

·         Civil Litigation Support,

·         Incident Response

*        Cyber Crime Investigations

·         Online Fraud,

·         Money Laundering,

·         Hacking,

·         Malware & Botnets,

·         Sexual Abuse of Children on Internet

·         Software & Media Piracy

*        Digital Forensics Techniques and Tools

*        Digital Forensics Process & Procedures

*        Theoretical Foundations of Digital Forensics

*        Digital Forensics & Law

*        Mobile / Handheld Device & Multimedia Forensics

*        Digital Forensics Standardization & Accreditation

*        Cyber Criminal Psychology and Profiling

*        Cyber Culture & Cyber Terrorism

*        Information Warfare & Critical Infrastructure Protection



[Reasearch Papers]



Papers describing original unpublished research are solicited. Submissions must not be concurrently under review by a conference, journal or any other venue that has proceedings.

Papers in the topic areas discussed are preferred, although contributions outside those topics may also be of interest. Please feel free at any time to contact the conference general chair if you have questions regarding your submission.



[Best Paper Award]



The program committee may designate up to three papers accepted to the conference as ICDF2C Best Papers. Every submission is automatically eligible for this award.



[Other Submission Categories]



Submissions can be made in a number of categories: Completed research papers, research-in-progress papers, industrial talks, panel and tutorial proposals, and round table discussions. Please follow the following guidelines in preparing your submission.

*        Completed Research Papers: No longer than 16 pages (including abstract, figures, tables and references).

*        Research in Progress Papers: No longer than 8 pages (including abstract, figures, tables and references).

*        Industrial Talk: Typically a 1,000 word description of the proposed talk. All talks must be vendor neutral.

*        Round Table Discussion: Typically a 1,000 word synopsis of the topic area.

*        Panel Proposals: Typically a 1,000 word description, identifying the panelists to be involved.

*        Tutorial Proposals: Typically a 1,000 word description of topic(s), potential speakers, program length, and potential audience. Also, include proposer resume(s).



[Submission Instructions]



Paper submission will be handled electronically. Papers must be formatted using Springer LNICST Authors' Kit (http://icst.org/lnicst-guidelines-for-authors/) and submitted only through the Confy conference management system following the instructions that can be found in the conference web site.

All submitted papers will be judged based on their quality through *double-blind* reviewing. Authors' names must not appear in the paper.

All other submissions should be sent via email to the conference general chairs (Dr Pavel Gladyshev at pavel.gladyshev at ucd.ie<mailto:pavel.gladyshev at ucd.ie> and Dr Ibrahim Baggili at ibrahim.baggili at zu.ac.ae<mailto:ibrahim.baggili at zu.ac.ae>).



[Publications]



Accepted papers will be published in the ICDF2C 2013 Conference Proceedings and by Springer-Verlag in the Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Tele-communications Engineering (LNICST) series.

The proceedings will be available both as paper-based copies and via Springerlink, Springer's digital library.  In addition, the content of the proceedings will be submitted for inclusion in leading indexing services, including DBLP, Google Scholar, ISI Proceedings, EI, CrossRef and Zentralblatt Math, as well as ICST's own EU Digital Library (EUDL).

In addition, the best conference papers will be published by Elsevier in an expanded form after additional peer review in a special issue of the Journal of Digital Investigation.



[Important Dates]



Paper Submission: 17 May, 2013

Notification of Acceptance: 17 June, 2013 Camera-ready Version: 1 September, 2013



STEERING COMMITTEE



Pavel Gladyshev, University College, Dublin

Marcus Rogers, Purdue University

Ibrahim Baggili, Zayed University

Sanjay Goel, University at Albany, State University of New York



CONFERENCE ORGANIZING COMMITTEE



General Co-Chairs

Pavel Gladyshev, University College Dublin (Ireland)

Ibrahim Baggili, Zayed University (UAE)



Technical Program Chair

Andrew Marrington, Zayed University (UAE)



Technical Program Committee Members (more to be confirmed)



*        Frank Adelstein, GrammaTech

*        Eugene Spafford, Purdue University

*        Fred Cohen, CEO - Management Analytics

*        Gary Kessler, Embry-Riddle Aeronautical University

*        Ibrahim Baggili, Zayed University

*        Mark Branagan, Queensland University of Technology

*        Kim-Kwang Raymond Choo, University of South Australia

*        Glenn Dardick, Longwood University / Edith Cowan University

*        Ernest Foo, Queensland University of Technology

*        Katrin Franke, Gjøvik University College

*        Felix Freiling, Friedrich-Alexander-Universität Erlangen-Nürnberg

*        Zeno Geradts, Nederlands Forensisch Instituut

*        Pavel Gladyshev, University College Dublin

*        Yuri Gubanov, Belkasoft

*        Farkhund Iqbal, Zayed University

*        Thomas Kemmerich, University of Bremen

*        Samuel Liles, Purdue University

*        James Lyle, National Institute of Standards and Technology

*        Andrew Marrington, Zayed University (Chair)

*        Stig Mjølsnes, Norwegian University of Science and Technology

*        Bruce Nikkel, UBS AG Owen O'Connor, Cernam Pty Ltd

*        Marcus Rogers, Purdue University

*        Vassil Roussev, University of New Orleans

*        Kathryn Seigfried-Spellar, University of Alabama

*        Nicolas Sklavos, Technological Educational Institute of Patras

*        Irfan Ahmed, University of New Orleans

*        Ali Ismail Awad, Al Azhar University
















-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20130504/725b5fe0/attachment.html>


More information about the AISWorld mailing list