ICDF2C 2012

=
===============================================================

Third ICST International Conference on Digital Forensics and Cyber Crime -

ICDF2C 2012

24th and 26th October 2012

Purdue University, West Lafayette, Indiana, USA

http://www.d-forensics.org

=
===============================================================

HIGHLIGHTS

- The event is endorsed by the European Alliance for Innovation, a leading community-based organisation devoted to the advancement of innovation in the field of ICT

- All accepted papers will be published by Springer and made available through SpringerLink Digital Library, one of the world's largest scientific libraries

- Proceedings will be submitted for indexing by Google Scholar, ISI, EI Compendex, Scopus and many more

CALL FOR PAPERS

[Scope]

The Internet has made it easier to perpetrate crimes by providing criminals an avenue for launching attacks with relative anonymity. The increased complexity of the communication and networking infrastructure is making investigation of the cyber crimes difficult. Clues of illegal activities are often buried in large volumes of data that needs to be sifted through in order to detect crimes and collect evidence.

The field of digital forensics and cybercrime investigation has become very important for law enforcement, national security, and information assurance. This is a multidisciplinary area that encompasses law, computer science, finance, telecommunications, data analytics, and policing. This conference brings together practitioners and researchers from diverse fields providing opportunities for business and intellectual engagement among attendees.

We are providing a venue that not only offers chances for networking, but also high-quality training opportunities through expert speakers and tutorials on basic and advanced forensic techniques and methods of cybercrime investigation. This ICST conference is endorsed by EAI and organized in cooperation with Purdue University and the Center for Education and Research in Information Assurance and Security CERIAS).

[Topics]

The following topics highlight the conference's theme:

- Business Applications of Digital Forensics

e-Discovery,

Civil Litigation Support

Incident Response

- Cyber Crime Investigations

Online Fraud

Money Laundering

Hacking

Malware & Botnets

Sexual Abuse of Children on Internet

Software & Media Piracy

- Digital Forensics Techniques and Tools

- Digital Forensics Process & Procedures

- Theoretical Foundations of Digital Forensics

- Digital Forensics & Law

- Handheld Device & Multimedia Forensics

- Digital Forensics Standardization & Accreditation

- Cyber Criminal Psychology and Profiling

- Cyber Terrorism & Information Warfare

Papers describing original unpublished research are solicited. Submissions must not be concurrently under review by a conference, journal or any other venue that has proceedings.

Papers in the topic areas discussed are preferred, although contributions outside those topics may also be of interest. Please feel free at any time to contact the conference general chair if you have questions regarding your submission.

[Publications]

Accepted papers will be published in the ICDF2C 2011 Conference Proceedings and by Springer-Verlag in the Lecture Notes of the Institute for ComputerSciences, Social-Informatics and Tele-communications Engineering (LNICST) series.

Extended versions of selected papers from the conference will be invited for publication in a special issue of the Journal of Digital Forensics, Security and Law.

The proceedings will be available both as paper-based copies and via Springerlink, Springer's digital library. In addition, the content of the proceedings will be submitted for inclusion in leading indexing services, including DBLP, Google Scholar, ISI Proceedings, EI, CrossRef and Zentralblatt Math, as well as ICST's own EU Digital Library (EUDL).

[Best paper award]

The program committee may designate up to three papers accepted to the conference as ICDF2C Best Papers. Every submission is automatically eligible for this award.

[Paper submission]

Paper submission will be handled electronically. Papers must be formatted using Springer LNICST Authors' Kit (http://d-forensics.org/authorskit.shtml) and submitted only through the Assyst conference management system following the instructions that can be found in the conference web site (http://d-forensics.org/submissiondetails.shtml).

All submitted papers will be judged based on their quality through *double-blind* reviewing. Authors' names must not appear in the paper.

All other submissions should be sent via email to the conference general chair (rogersmk@purdue.edu)

[Important dates]

Submission dealine: 1st June 2012

Notification of Acceptance: 1st August 2012

Camera Ready: 1st September 2012

Conference Date: 24th and 26th October 2012

[Conference organising committees]

Steering Committee:

Imrich Chlamtac, President of CreateNet, Italy

Sanjay Goel, University at Albany, State University of New York, USA

Ibrahim Baggili, Zayed University, UAE

General Chair:

Marcus Rogers, Purdue University, USA

TPC Co-Chairs:

Pavel Gladyshev University College Dublin, Ireland

Eugene Spafford, Purdue University, USA

Publicity Co-Chairs:

Ibrahim Baggili, Zayed University, United Arab Emirates

Sanjay Goel, University at Albany, State University of New York, USA

Industry Track Co-Chairs:

Fred Kerr, USA

Local Chair:

Tejashree Datar, Purdue University, USA

Workshop Chair:

Frank Adelstein, ATC-NYC, USA

Publications Chair:

Nasir Memon, Polytechnic Institute of New York University,USA

Andrew Marrington, Zayed University, UAE

Demos & Tutorials Chair:

John Sammons, Marshall University, USA

Law Enforcement Chair: Lt. Chuck Cohen, Indiana State Police, USA

Legal Chair: Mike Losavio, University of Louisville, USA

Behavioral Sciences Chair: Kate Seigfried-Spellar, Seattle University, USA

Conference Coordinator:

Erica Polini, European Alliance for Innovation contact: erica.polini@eai.eu

Technical Program Committee:

Ibrahim Baggili, Zayed University, United Arab Emirates

Felix Balado, University College Dublin, Ireland

Florian Buchholz, James Madison University, USA

Glenn Dardick, Longwood University, USA

Katrin Franke, Gjovik University College, Norway

Felix Freiling, University of Mannheim, Germany

Sandra Frings, Fraunhofer IAO, Germany

Zeno Geradts, Netherlands Forensic Institute, Netherlands

Pavel Gladyshev, University College Dublin, Ireland

Sanjay Goel, University at Albany, State University of New York, USA

Andrew Harbison, Grant Thornton, Ireland

Michael Harris, Ernst & Young, Ireland

Andrew Jones, Khalifa University, United Arab Emirates

Anthony Keane, Blanchardstown Institute of Technology, Ireland

Tahar Kechadi, University College Dublin, Ireland

Chang-Tsun Li, University of Warwick, UK

Juha Lampinen, National Bureau of Investigation, Finland

Vivienne Mee, Deliotte & Touche, Ireland

Nasir Memon, Polytechnic Institute of New York University, USA

Stig Mjolsnes, Norwegian University of Science and Technology, Norway

George Mohay, Queensland University of Technology, Australia

Bruce Nikkel, UBS, Switzerland

Slim Rekhis, Institute of Technology in Communications, Tunisia

Marcus Rogers, Purdue University, USA

John Sheppard, Waterford Institute of Technology, Ireland

Eugene Spafford, CERIAS - Purdue University, USA

Bhadran V K, Resource Centre for Cyber Forensics, India

Vinod Bhattathiripad, Farouq Institute of Management Studies, India

Oscar Vermaas, Netherlands National Police Force, Netherlands

Svein Willassen, Norwegian University of Science and Technology, Norway

Gregg Gunsch, Defiance College, USA

Tim Wedge, Defiance College, USA

James Lyle, NIST, USA

Nicole Beebe, University of Texas San Antonio, USA