Download Call for Papers: PDF |
The following topics highlight the conference's theme:
The Internet has made it easier to perpetrate crimes by providing criminals an
avenue for launching attacks with relative anonymity. The increased complexity of
the communication and networking infrastructure is making investigation of the cyber
crimes difficult. Clues of illegal activities are often buried in large volumes of
data that needs to be sifted through in order to detect crimes and collect evidence.
The investigations are increasingly cross-border requiring coordinated police efforts
in different jurisdictions.
The field of digital forensics and cyber crime investigation has become very important
for law enforcement, national security, and information assurance. This is a
multidisciplinary area that encompasses law, computer science, finance, telecommunications,
data analytics, and policing. This conference brings together practitioners and researchers
from diverse fields providing opportunities for business and intellectual engagement
We are providing a venue that not only offers chances for networking, but also
high-quality training opportunities through expert speakers, state-of-the-art work
from researchers around the world, and tutorials on basic and advanced forensic
techniques and methods of cyber crime investigation. This ICST conference is
endorsed by EAI and organized in cooperation with the University College Dublin
Centre for Cybercrime Investigation and with the technical cooperation of
- Business Applications of Digital Forensics
- Civil Litigation Support
- Incident Response
- Cyber Crime Investigations
- Online Fraud
- Money Laundering
- Malware & Botnets
- Sexual Abuse of Children on Internet
- Software & Media Piracy
- Digital Forensics Techniques and Tools
- Digital Forensics Process & Procedures
- Cybercrime Investigation Management
- Theoretical Foundations of Digital Forensics
- Digital Forensics & Law
- Mobile / Handheld Device & Multimedia Forensics
- Digital Forensics Standardization & Accreditation
- Cyber Criminal Psychology and Profiling
- Cyber Culture & Cyber Terrorism
- Information Warfare & Critical Infrastructure Protection
Papers describing original unpublished research are solicited. Submissions must not be
concurrently under review by a conference, journal or any other venue that has proceedings.
Papers and presentations in the topic areas discussed are preferred, although contributions
outside those topics may also be of interest. Please feel free at any time to contact the
conference general chair if you have questions regarding your submission.
All submitted papers will be judged based on their quality through double-blind reviewing.
Authors' names must not appear in the paper.
Accepted papers will be published in the ICDF2C 2011 Conference Proceedings and by
Springer-Verlag in the Lecture Notes of the Institute for ComputerSciences,
Social-Informatics and Tele-communications Engineering (LNICST) series. The proceedings
will be available both as paper-based copies and via Springerlink, Springer's digital
library. In addition, the content of the proceedings will be submitted for inclusion in
leading indexing services, including DBLP, Google Scholar, ISI Proceedings, EI, CrossRef
and Zentralblatt Math, as well as ICST's own EU Digital Library (EUDL).
Extended versions of selected papers from the conference will be invited for publication in
a special issue of the Journal of Digital Forensics, Security and Law.
Best Paper Award
The program committee may designate up to three papers accepted to the conference as
ICDF2C Best Papers. Every submission is automatically eligible for this award.
For submission guidelines please see the paper submission