This event is endorsed
and organized by

4th International Conference on Digital Forensics & Cyber Crime

October 25–26, 2012 | Lafayette, Indiana, United States

Call for Papers

Dowload the PDF version of Call for Papers here


The Internet has made it easier to perpetrate crimes by providing criminals an avenue for launching attacks with relative anonymity. The increased complexity of the communication and networking infrastructure is making investigation of the cyber crimes difficult. Clues of illegal activities are often buried in large volumes of data that needs to be sifted through in order to detect crimes and collect evidence.

The field of digital forensics and cybercrime investigation has become very important for law enforcement, national security, and information assurance. This is a multidisciplinary area that encompasses law, computer science, finance, telecommunications, data analytics, and policing. This conference brings together practitioners and researchers from diverse fields providing opportunities for business and intellectual engagement among attendees.

We are providing a venue that not only offers chances for networking, but also high-quality training opportunities through expert speakers and tutorials on basic and advanced forensic techniques and methods of cybercrime investigation. This ICST conference is endorsed by EAI and organized in cooperation with Purdue University and the Center for Education and Research in Information Assurance and Security CERIAS).


The following topics highlight the conference's theme:

Business Applications of Digital Forensics


Civil Litigation Support

Incident Response

Cyber Crime Investigations

Online Fraud

Money Laundering


Malware & Botnets

Sexual Abuse of Children on Internet

Software & Media Piracy

Digital Forensics Techniques and Tools

Digital Forensics Process & Procedures

Theoretical Foundations of Digital Forensics

Digital Forensics & Law

Handheld Device & Multimedia Forensics

Digital Forensics Standardization & Accreditation

Cyber Criminal Psychology and Profiling

Cyber Terrorism & Information Warfare

Papers describing original unpublished research are solicited. Submissions must not be concurrently under review by a conference, journal or any other venue that has proceedings.

Papers in the topic areas discussed are preferred, although contributions outside those topics may also be of interest. Please feel free at any time to contact the conference general chair if you have questions regarding your submission.


Accepted papers will be published in the ICDF2C 2011 Conference Proceedings and by Springer-Verlag in the Lecture Notes of the Institute for ComputerSciences, Social-Informatics and Tele-communications Engineering (LNICST) series.

Extended versions of selected papers from the conference will be invited for publication in a special issue of the Journal of Digital Forensics, Security and Law.

The proceedings will be available both as paper-based copies and via Springerlink, Springer's digital library. In addition, the content of the proceedings will be submitted for inclusion in leading indexing services, including DBLP, Google Scholar, ISI Proceedings, EI, CrossRef and Zentralblatt Math, as well as ICST's own EU Digital Library (EUDL).

Best paper award

The program committee may designate up to three papers accepted to the conference as ICDF2C Best Papers. Every submission is automatically eligible for this award.

Paper submission

Paper submission will be handled electronically. Papers must be formatted using Springer LNICST Authors' Kit and submitted only through the Confy conference management system following the instructions that can be found here.

All submitted papers will be judged based on their quality through double-blind reviewing. Authors' names must not appear in the paper.

All other submissions should be sent via email to the conference general chair ([email protected])