-------- Forwarded Message --------
Subject: [AISWorld] INTERNATIONAL CONFERENCE ON DIGITAL FORENSICS AND CYBER CRIME (ICDF2C)
Date: Sun, 9 Feb 2020 06:05:06 +0000
From: Goel, Sanjay <goel@albany.edu>
To: aisworld@lists.aisnet.org <aisworld@lists.aisnet.org>, goel@listserv.albany.edu <goel@listserv.albany.edu>, forensics@listserv.albany.edu <forensics@listserv.albany.edu>
CC: daryl.johnson@rit.edu <daryl.johnson@rit.edu>, pavel.gladyshev@ucd.ie <pavel.gladyshev@ucd.ie>, Lukas Skolek <lukas.skolek@eai.eu>, makan.pourzandi@ericsson.com <makan.pourzandi@ericsson.com>


INTERNATIONAL CONFERENCE ON DIGITAL FORENSICS AND CYBER CRIME (ICDF2C)
Conference Dates: October 14-16th 2020
Conference Location: Boston, MA (USA)

Conference Website: http://icdf2c.org/
Submission Deadline: APRIL 31th 2020
Submission Link: https://confyplus.eai.eu/app#conftrack-overview/cid/52776

OVERVIEW
The International Conference on Digital Forensics and Cyber Crime will be held October 14-16, 2020 in Boston. This three-day event is expected to attract well over 200 participants including academics, practitioners, and vendors providing opportunities for business and intellectual engagement among attendees. The Symposium is organized by the School of Business at the University at Albany, State University of New York. The focus of this year's conference is on various applications of digital evidence and forensics beyond "traditional" cybercrime investigations and litigation such as information security analytics, incident response, risk management, business and military intelligence, etc. Given below is an indicative list of possible topics.

Digital and Multimedia Evidence and Forensics
Novel Digital Forensic Techniques and Tools; Multimedia Forensics (including but not limited to Image-, Audio-, and Video Analysis, Biometrics, Linguistic Analysis of Texts); Chip-off Forensics; Mobile & Network Forensics; ICS/SCADA Forensics; Live Data Forensics; Forensic Lab Management and Accreditation.

Applications
E-Discovery; Investigations of Cybercrime, Terrorism, Computer-Related Fraud, Computer-Related Forgery, Content-Related offences (Child abuse materials, Promotion of extremism), Copyright Infringement; Other Legal Aspects of Digital Evidence Procedure and Applications

Applications in Technological Security
Cloud Computing Security; Web Application Security; Database Security; Intrusion Detection/Prevention; Network Security; Mobile Device Security; Smart Grid Security; Self-Organized Resilient Systems; Critical Infrastructure Security; ICS/SCADA Security; Security of "Internet of Things"; Quantum Computing Security; Digital Currency Security; and Security of Wearable Devices; Digital Rights Management.

Applications / Issues in National and International Security Issues, Human Rights
Trans-National Cybercrime Investigations and Mutual Legal Assistance; Internet-based Espionage & Advanced Persistent Threats; State-Sponsored Cyber Warfare & Terrorism; International Cyber Conflicts; Government Surveillance; Censorship and Control of the Internet; and International Cyber Laws and Confidence Building Measures.

Applications in Organizational Security and Incident Response
Incident Response; Disaster Recovery; Insider Threat Management; Risk Management; Business Continuity; Security Policies; Security Auditing; Regulatory Compliance; Economics of Security;
Behavioral Information Security.

Security and Forensics Education
Accreditation of Security and Forensics Training; Innovative Pedagogic Techniques; Certifications; Hands-on Security Laboratories and Tabletop Exercises; Education Infrastructure; Diversity in Security/Forensics Education; and Online Security/Forensics Education.

SUBMISSION GUIDELINES
1. Papers should be submitted to https://confyplus.eai.eu/app#conftrack-overview/cid/52776
2. Submissions can be made in a number of categories:
Completed Research Papers: Typically, 5,000 words long (excluding abstract and references)
Research in Progress Papers: Typically, 2,500 words (excluding abstract and references).
Panel Proposals: Typically, 1,000-word description, identifying the panelists to be involved
3. Please follow the formatting guidelines on the conference website

IMPORTANT DATES
Submission Deadline: April 31th, 2020
Reviewer Feedback: May 31st, 2020
Final Submission: June 30th, 2020
Symposium Dates: October 14th-16th, 2020

Organizing Committee
GENERAL CHAIR
Sanjay Goel
Chair & Professor, Information Security and Digital forensics
School of Business, University at Albany, SUNY
goel@albany.edu

TPC CO-CHAIRS
Pavel Gladyshev
Director of MSc in Digital Investigation and Forensic Computing
University College, Dublin
pavel.gladyshev@ucd.ie

Daryl Johnson
Associate Professor, Department of Computing Security
Golisano College of Computing and Information Sciences
Rochester Institute of Technology
daryl.johnson@rit.edu

Makan Pourzandi
Researcher Leader
GTFL ER Security Canada
makan.pourzandi@ericsson.com

WEB CHAIR
Christian Balan
Professor, State University of New York, Plattsburg
Anthony Capece (Web Assistant)
Student, School of Business
University at Albany, SUNY

TUTORIALS CO-CHAIRS
Babak Habibnia
University College, Dublin
pavel.gladyshev@ucd.ie

Fabio Auffant
Lecturer, Information Security and Digital Forensics
University at Albany, SUNY
fauffant@albany.edu

WORKSHOPS CHAIR
Devipsita Bhattacharya
University at Albany, SUNY
dbhattacharya@albany.edu

PUBLICITY CHAIRS
Lee Spitzley
Assistant Professor, Information Security and Digital Forensics
University at Albany, SUNY
lspitzley@albany.edu

Suryadipta Majumdar
Assistant Professor, Information Security and Digital Forensics
University at Albany, SUNY
smajumdar@albany.edu

SPONSORSHIPS CHAIR
Deborah Snyder
Lecturer, Information Security and Digital Forensics
University at Albany, SUNY
dasnyder@albany.edu


_______________________________________________
AISWorld mailing list
AISWorld@lists.aisnet.org