General Links
Sponsorship Opportunities at ICDF2C 2010
Sign up for ICDF2C Updates
Call for Papers
Call for Presentations
Organizing Committee
Technical Program Committee
Authors / Presenters
Author's Kit
Submit Papers
Presenter Information
Keynote Speakers
Technical Program
Social Event
Visa Information
Hotel Reservation
Media Partners
Past Editions
2009 - Albany, NY

Registration is Now Open, click here to register.

Preliminary Program is Now Available, click here to download.

October 4 - 6, 2010

Conference Focus

The Internet has made it easier to perpetrate traditional crimes by providing criminals an alternate avenue for launching attacks with relative anonymity. The increased complexity of the communication and networking infrastructure is making investigation of the crimes difficult. Clues of illegal activities are often buried in large volumes of data that needs to be sifted through in order to detect crimes and collect evidence. The field of digital forensics is becoming very important for law enforcement, network security, and information assurance. This is a multidisciplinary area that encompasses multiple fields, including: law, computer science, finance, networking, data mining, and criminal justice. The applications of this technology are far reaching including: law enforcement, disaster recovery, accounting frauds, homeland security, and information warfare. This conference brings together practitioners and researchers from diverse fields providing opportunities for business and intellectual engagement among attendees. The conference is organized by the College of Information Technology at Zayed University with the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (ICST). Authors are invited to submit original and unpublished papers to the International Conference on Digital Forensics. Accepted papers will appear in the conference proceedings and some papers will be selected for journal publication.

The following topics highlight the conference's theme:

  • Financial Crimes (Money Laundering, Fraud, Identity Theft)
  • Forensic Accounting (Accounting Fraud, Continuous Assurance, etc.)
  • Digital Forensics Training & Education
  • Digital Forensics Process and Procedures
  • Digital Forensics & Law (e-Discovery & Litigation Support, Incident Response, Evidence Handling)
  • Cyber Crime Investigations
  • Cyber Security & Information Warfare
  • Computer/Handheld Device & Multimedia Forensics (Tools / Techniques)
  • Forensics Standardization, Accreditation
  • Cyber Criminal Psychology and Profiling
  • Software piracy investigation
  • Cyber culture and cyber terrorism
Who Should Attend?
Academic Researchers / Instructors
Anti-Money Laundering Compliance Officers
Auditors / Internal Auditors
Banking Agents
Compliance and Risk Management Officers
Financial Intelligence Officers
Fraud Examiners
Information Technology Specialists
Information Security Officers
Insurance Company Personnel and Agents
Investment Advisors
Law Enforcement
Lawyers / Prosecutors / District Attorneys
Money Laundering Reporting Officers
Financial Regulators
Computer Security Practitioners

Abu Dhabi, UAE

Chairperson Image
Dr. Ibrahim Baggili

Chairperson Image
Paul B. Kurtz
Chairperson Image
Dr. Marcus Rogers

Chairperson Image
Dr. Nasir Memon
Chairperson Image
Bhadran V K
© Copyright 2010 ICST - All rights reserved.