-------- Forwarded Message -------- Subject: [AISWorld] INTERNATIONAL CONFERENCE ON DIGITAL FORENSICS AND CYBER CRIME (ICDF2C) Date: Sun, 9 Feb 2020 06:05:06 +0000 From: Goel, Sanjay goel@albany.edu To: aisworld@lists.aisnet.org aisworld@lists.aisnet.org, goel@listserv.albany.edu goel@listserv.albany.edu, forensics@listserv.albany.edu forensics@listserv.albany.edu CC: daryl.johnson@rit.edu daryl.johnson@rit.edu, pavel.gladyshev@ucd.ie pavel.gladyshev@ucd.ie, Lukas Skolek lukas.skolek@eai.eu, makan.pourzandi@ericsson.com makan.pourzandi@ericsson.com
INTERNATIONAL CONFERENCE ON DIGITAL FORENSICS AND CYBER CRIME (ICDF2C) Conference Dates: October 14-16th 2020 Conference Location: Boston, MA (USA)
Conference Website: http://icdf2c.org/ Submission Deadline: APRIL 31th 2020 Submission Link: https://confyplus.eai.eu/app#conftrack-overview/cid/52776
OVERVIEW The International Conference on Digital Forensics and Cyber Crime will be held October 14-16, 2020 in Boston. This three-day event is expected to attract well over 200 participants including academics, practitioners, and vendors providing opportunities for business and intellectual engagement among attendees. The Symposium is organized by the School of Business at the University at Albany, State University of New York. The focus of this year's conference is on various applications of digital evidence and forensics beyond "traditional" cybercrime investigations and litigation such as information security analytics, incident response, risk management, business and military intelligence, etc. Given below is an indicative list of possible topics.
Digital and Multimedia Evidence and Forensics Novel Digital Forensic Techniques and Tools; Multimedia Forensics (including but not limited to Image-, Audio-, and Video Analysis, Biometrics, Linguistic Analysis of Texts); Chip-off Forensics; Mobile & Network Forensics; ICS/SCADA Forensics; Live Data Forensics; Forensic Lab Management and Accreditation.
Applications E-Discovery; Investigations of Cybercrime, Terrorism, Computer-Related Fraud, Computer-Related Forgery, Content-Related offences (Child abuse materials, Promotion of extremism), Copyright Infringement; Other Legal Aspects of Digital Evidence Procedure and Applications
Applications in Technological Security Cloud Computing Security; Web Application Security; Database Security; Intrusion Detection/Prevention; Network Security; Mobile Device Security; Smart Grid Security; Self-Organized Resilient Systems; Critical Infrastructure Security; ICS/SCADA Security; Security of "Internet of Things"; Quantum Computing Security; Digital Currency Security; and Security of Wearable Devices; Digital Rights Management.
Applications / Issues in National and International Security Issues, Human Rights Trans-National Cybercrime Investigations and Mutual Legal Assistance; Internet-based Espionage & Advanced Persistent Threats; State-Sponsored Cyber Warfare & Terrorism; International Cyber Conflicts; Government Surveillance; Censorship and Control of the Internet; and International Cyber Laws and Confidence Building Measures.
Applications in Organizational Security and Incident Response Incident Response; Disaster Recovery; Insider Threat Management; Risk Management; Business Continuity; Security Policies; Security Auditing; Regulatory Compliance; Economics of Security; Behavioral Information Security.
Security and Forensics Education Accreditation of Security and Forensics Training; Innovative Pedagogic Techniques; Certifications; Hands-on Security Laboratories and Tabletop Exercises; Education Infrastructure; Diversity in Security/Forensics Education; and Online Security/Forensics Education.
SUBMISSION GUIDELINES 1. Papers should be submitted to https://confyplus.eai.eu/app#conftrack-overview/cid/52776 2. Submissions can be made in a number of categories: Completed Research Papers: Typically, 5,000 words long (excluding abstract and references) Research in Progress Papers: Typically, 2,500 words (excluding abstract and references). Panel Proposals: Typically, 1,000-word description, identifying the panelists to be involved 3. Please follow the formatting guidelines on the conference website
IMPORTANT DATES Submission Deadline: April 31th, 2020 Reviewer Feedback: May 31st, 2020 Final Submission: June 30th, 2020 Symposium Dates: October 14th-16th, 2020
Organizing Committee GENERAL CHAIR Sanjay Goel Chair & Professor, Information Security and Digital forensics School of Business, University at Albany, SUNY goel@albany.edu
TPC CO-CHAIRS Pavel Gladyshev Director of MSc in Digital Investigation and Forensic Computing University College, Dublin pavel.gladyshev@ucd.ie
Daryl Johnson Associate Professor, Department of Computing Security Golisano College of Computing and Information Sciences Rochester Institute of Technology daryl.johnson@rit.edu
Makan Pourzandi Researcher Leader GTFL ER Security Canada makan.pourzandi@ericsson.com
WEB CHAIR Christian Balan Professor, State University of New York, Plattsburg Anthony Capece (Web Assistant) Student, School of Business University at Albany, SUNY
TUTORIALS CO-CHAIRS Babak Habibnia University College, Dublin pavel.gladyshev@ucd.ie
Fabio Auffant Lecturer, Information Security and Digital Forensics University at Albany, SUNY fauffant@albany.edu
WORKSHOPS CHAIR Devipsita Bhattacharya University at Albany, SUNY dbhattacharya@albany.edu
PUBLICITY CHAIRS Lee Spitzley Assistant Professor, Information Security and Digital Forensics University at Albany, SUNY lspitzley@albany.edu
Suryadipta Majumdar Assistant Professor, Information Security and Digital Forensics University at Albany, SUNY smajumdar@albany.edu
SPONSORSHIPS CHAIR Deborah Snyder Lecturer, Information Security and Digital Forensics University at Albany, SUNY dasnyder@albany.edu
_______________________________________________ AISWorld mailing list AISWorld@lists.aisnet.org