征稿已开启

查看我的稿件

注册已开启

查看我的门票

已截止
活动简介

International Conference on Digital Forensics, Readiness and Investigation (Digital Forensics 2016) is an international referred conference dedicated to the advancement of Computer Forensics, Digital Forensics, Mobile Forensics Electronic Discovery, Network Forensics, Forensic Readiness, Digital Investigation and Chain of Custody. We welcome new and innovative contributions that provide insight to theoretical underpinnings, foundational research, methods and practical implementation of mobile forensic systems, advances in the implementation, design and practices of digital investigation, and the implications of use of such systems in the ecosystem.

The aim of the Digital Forensics 2016 is to encourage participation and promotion of collaborative scientific, industrial and academic inter-workings among individual researchers, practitioners, members of existing associations, academia, standardisation bodies, and including government departments and agencies. The purpose is to build bridges between academia and industry, and to encourage interplay of different cultures.

Digital Forensics 2016 invites researchers and industry practitioners to submit papers that encompass principles, analysis, design, methods and applications. All submitted papers will be independently peer-reviewed.

征稿信息

重要日期

2015-03-06
摘要截稿日期

征稿范围

The topics in Digital Forensics 2016 include but not limited to:

  • Computer Network Forensics

  • Seizure, Preservation and Analysis

  • Handling Evidence, Tampering and Contamination

  • Evidence Practices

  • Network Forensics

  • Database Forensics

  • Application Forensics

  • Mobile Devices Forensics

  • Smartphone, Tablet and PDA

  • Flash and RAM Memory Analysis

  • Emerging Techniques in Mobile Forensics

  • Live Forensics

  • Digital Profiling

  • Cyber Crime

  • Live Network Analysis

  • Live Computer Crime Analysis

  • RAM, Flash and Volatile Memory Analysis

  • Forensic Readiness

  • Processes and Procedures

  • Forensic Readiness Policy

  • Standards

  • Technical Controls

  • Design Requirements for Cyber Forensics

  • Theoretical Underpinnings to Cyber Forensics

  • Managing Cyber Forensics Investigations

  • Testing Frameworks for Forensics Tools

  • Teaching Digital Forensics

  • Investigation

  • Cyber Crime Investigation

  • Computer Breach Investigation

  • Compromise, Vulnerability Exploits Investigation

  • Investigative Process

  • Investigative Procedures

  • Chain of Custody

  • Preparedness

  • Admissibility

  • Audit Trails

  • Open Source Tools & Application

  • Live Analysis

  • Video and Voice Recognition Systems

  • Electronic Discovery

  • Network Analysis Tools

  • Discs Analysis Tools

  • Encryption Analysis Tools

  • Steganography

  • Forensic Law

  • Legal Admissibility

  • Evidential Standards

  • Forensic Policy

  • Traffic Analysis

  • Digital Evidence

  • Jurisdiction

  • Country and Borders Powers/Authority

  • Presentation of Digital Evidence in a Court of Law

  • Copyright Infringement Crimes

留言
验证码 看不清楚,更换一张
全部留言
重要日期
  • 会议日期

    10月12日

    2016

    10月13日

    2016

  • 03月06日 2015

    摘要截稿日期

  • 10月13日 2016

    注册截止日期

联系方式
移动端
在手机上打开
小程序
打开微信小程序
客服
扫码或点此咨询