Archive for the ‘calls’ Category

Third ICST International Conference on Digital Forensics and Cyber Crime

Thursday, March 3rd, 2011

http://www.d-forensics.org/callforpapers.shtml

Dublin, Ireland, October 26-28,2011

IMPORTANT DATES
Paper Submission: June 1, 2011
Notification of Acceptance: August 1, 2011
Camera-ready Version: September 1, 2011

The Fourth International Workshop on Digital Forensics (WSDF’11)

Tuesday, March 1st, 2011

http://www.ares-conference.eu/conf/index.php/index.php?option=com_content&view=article&id=49&Itemid=25

To be held in conjunction with the Sixth International Conference on Availability, Reliability and Security (ARES 2011 – http://www.ares-conference.eu).

August 22nd – 26th, 2011
Vienna University of Technology
Vienna, Austria

Digital forensics is a rapidly evolving field primarily focused on the extraction, preservation and analysis of digital evidence obtained from electronic devices in a manner that is legally acceptable. Research into new methodologies tools and techniques within this domain is necessitated by an ever-increasing dependency on tightly interconnected, complex and pervasive computer systems and networks. The ubiquitous nature of our digital lifestyle presents many avenues for the potential misuse of electronic devices in crimes that directly involve, or are facilitated by, these technologies. The aim of digital forensics is to produce outputs that can help investigators ascertain the overall state of a system. This includes any events that have occurred within the system and entities that have interacted with that system. Due care has to be taken in the identification, collection, archiving, maintenance, handling and analysis of digital evidence in order to prevent damage to data integrity. Such issues combined with the constant evolution of technology provide a large scope of digital forensic research.
WSDF aims to bring together experts from academia, industry, government and law enforcement who are interested in advancing the state of the art in digital forensics by exchanging their knowledge, results, ideas and experiences. The aim of the workshop is to provide a relaxed atmosphere that promotes discussion and free exchange of ideas while providing a sound academic backing.
The focus of this workshop is not only restricted to digital forensics in the investigation of crime. It also addresses security applications such as automated log analysis, forensic aspects of fraud prevention and investigation, policy and governance.

Topics of interest comprise but are not limited to:

Digital Evidence
Network Forensics
Anti Forensics
Physical Memory Acquisition and Analysis
Digital Forensic Information Visualisation
Fraud Investigations Involving Technology
Portable Devices
Cyber Terrorism
Log Analysis
Risk and Incident Management
Investigative Case Studies
Data Hiding Techniques and Steganography
Novel Data Recovery Techniques
Digital Evidence Extraction Techniques
Digital Evidence Search Techniques
Standards, Guidelines, Certification and Training
Digital Forensics Tools
Digital Forensic Implications for Cloud Environments
Critical Infrastructure Incident Investigation

Important dates

Submission Deadline April 24th, 2011
Author Notification May 09th, 2011
Author Registration June 01st, 2011
Proceedings Version June 01st, 2011
Conference/Workshop August 22nd – 26th, 2011

7th International Conference on Global Security, Safety & Sustainability (ICGS3 2011)

Wednesday, January 26th, 2011

http://www.icgs3-2011.org/

Topics:

  • Cloud Computing Security
  • Security Requirements Engineering
  • Secure Architecture Design
  • Enterprise Architecture Security
  • eGovernment / mGovernment Security
  • Information Security Management
  • Computer forensics and anti-forensics
  • Data Security
  • Software Protection
  • Criminal data mining
  • Cybercrime detection and prevention
  • Network security
  • Attack pattern recognition
  • Strategic approaches to security
  • Security in Mobile Platforms
  • E-commerce/ eBusiness security issues
  • Cyber War
  • Systems Safety
  • Systems Sustainability

Deadline: 7 March 2011

mobisec 2011

Thursday, January 20th, 2011

http://mobisec.org/2011/cfp.shtml

Topics of interest include, but are not limited to, the following focus areas:

Focus: Machine-to-Machine Communication Security
  • Device Identities and Authentication
  • Remote Integrity Validation and Remediation
  • Remote Management and Provisioning
  • Machine-to-Machine Application Layer Security
  • Secure Elements and Trusted Environments
Focus: Policies for Mobile Environments
  • Privacy Policy Enforcement on Mobile Environments
  • User Consent as Policies
  • Policy Management for Volatile Distributed Systems
  • Tools for Policy Violation Detection
Focus: Mobile User Authentication and authorisation
  • Mobile Identity Management
  • Situation aware and multi-factor authentication
  • Mobility and Authorisation
  • Secure Mobile Transactions

ADFSL 2011 Conference on Digital Forensics, Security and Law

Monday, January 17th, 2011

http://www.digitalforensics-conference.org

The conference committee is calling for papers and proposals in, or related to,
the following areas:

CURRICULUM
1) Digital forensics curriculum
2) Cyber law curriculum
3) Information assurance curriculum
4) Accounting digital forensics curriculum

TEACHING METHODS
5) Digital forensics teaching methods
6) Cyber law teaching methods
7) Information assurance teaching methods
8 ) Accounting digital forensics teaching methods

CASES
9) Digital forensics case studies
10) Cyber law case studies
11) Information assurance case studies
12) Accounting digital forensics case studies

INFORMATION TECHNOLOGY
13) Digital forensics and information technology
14) Cyber law and information technology
15) Information assurance and information technology
16) Accounting digital forensics information technology

NETWORKS AND THE INTERNET
17) Digital forensics and the Internet
18) Cyber law and the Internet
19) Information assurance and Internet
20) Digital forensics accounting and the Internet

ANTI-FORENSICS AND COUNTER ANTI-FORENSICS
21) Steganography
22) Stylometrics and Author Attribution

23) Anonymity and Proxies
24) Encryption and Decryption

INTERNATIONAL ISSUES
25) International issues in digital forensics
26) International issues in cyber law
27) International issues in information assurance
28) International issues in accounting digital forensics

THEORY
29) Theory development in digital forensics
30) Theory development in information assurance
31) Methodologies for digital forensic research
32) Analysis techniques for digital forensic and information assurance research

DIGITAL RIGHTS MANAGEMENT (DRM)
33) DRM issues in digital forensics
34) DRM issues in information technology
35) DRM issues in information assurance
36) DRM issues in cyber law

PRIVACY ISSUES
37) Privacy issues in digital forensics
38) Privacy issues in information assurance
39) Privacy issues in cyber law
40) Privacy issues in digital rights management

SOFTWARE FORENSICS
41) Software piracy investigation
42) Software quality forensics

OTHER TOPICS
43)Cyber culture and cyber terrorism

Deadlines
The deadline for submissions is midnight EST, 19 February 2011.

6th International Annual Workshop on Digital Forensics & Incident Analysis

Saturday, January 15th, 2011

http://www.wdfia.org/

The workshop aims to provide a forum for researchers and practitioners to present original, unpublished research results and innovative ideas.

Themes

We welcome the submission of papers from the full spectrum of issues relating to the theory and practice of digital forensics and incident analysis. Areas of special interest include, but are not limited to:

  • Digital forensics tools and applications
  • Forensic standards and procedures
  • Network forensics
  • Network traffic analysis, traceback and
    attribution
  • Legal, ethical and policy issues related to
    digital forensics
  • Integrity of digital evidence and live
    investigations
  • Multimedia analysis
  • The Trojan defence
  • Forensics issues of malicious code
  • Incident response and investigation
  • Portable electronic device forensics
  • Data hiding and recovery
  • Data mining and e-discovery and their
    corporate use
  • Digital evidence visualisation and
    presentation
  • Digital evidence chain of custody, storage
    and preservation
  • Digital forensics case studies
  • Best practices and case studies
  • Anti-forensics

2011 Sleuth Kit and Open Source Digital Forensics Conference

Saturday, January 15th, 2011

http://www.osdfcon.org

The 2nd Annual Sleuth Kit and Open Source Digital Forensics Conference will be held on June 14, 2011 in McLean, VA and we invite you to submit a presentation. The conference will be attended by digital forensic investigators and developers. This event is a unique opportunity to make investigators aware of your tools, get feedback from users, meet fellow developers, and help direct the future of open source digital forensics software.

We are looking for talks on a variety of topics about using open source tools, including:

  • Open, plug-in analysis frameworks
  • Automated forensics
  • Hard drive analysis and triage
  • Analyzing application-level artifacts
  • Mobile device forensics
  • Cyber incident response
  • Getting involved with the community
  • User experiences
  • Case studies

We are also looking for people who are interested in providing half- and full-day workshops on the day before the conference. The workshops should provide hands-on guidance for using or developing open source digital forensic tools.


Copyright © 2017 Information Security and Incident Response Research Unit. All Rights Reserved.
No computers were harmed in the 0.366 seconds it took to produce this page.

Designed/Developed by Lloyd Armbrust & hot, fresh, coffee.