| 查看: 270 | 回复: 1 | |||
| 当前主题已经存档。 | |||
努力着荣誉版主 (职业作家)
低调隐士
|
[交流]
【2010-04-30】e-Forensics 2010 已有1人参与
|
||
|
WEB http://www.e-forensics.eu/2010/index.shtml SCOPE Our society has entered an era where commerce activities, business transactions and government services have been, and more and more of them will be, conducted and offered over open networks such as Internet, which has led to new opportunities for criminals and new challenges for law enforcement. For instance, Voice over IP raises significant challenges for call intercept and route tracing;information systems are becoming overwhelmingly large and the challenge of information source identification requires new sophisticated tools; consumer multimedia devices, are increasingly becoming the tools to create potentially illegal content. At the same time, the scientific gathering and investigation of evidence at a crime scene push towards a variety of fascinating digital techniques. As a matter of fact, electronic telecommunications, information technology, consumer devices and sophisticated software are creating new opportunities for both criminals and forensic investigators, thus this conference aims to bring together the research contributions in the development of tools and techniques which assist in the investigation of potentially illegal activity associated with electronic communication and electronic devices, and investigative practice and requirements for presentation of evidence in court are to be considered as the underlying themes. This might include discovery, analysis, handling and storage of digital evidence; meeting the legal burden of proof; and the establishment of the forensic chain of evidence. Technical papers describing original, previously unpublished research, not currently under review by another conference or journal, are solicited. Topics of interest include, but are not limited to, the following: Digital evidence gathering, storage and handling protocols Records tracing and data mining Fraud management in commercial transactions Device forensics Techniques for addressing identity theft Data carving Content filtering Geo-location techniques for cellular, ad-hoc, wireless and IP network communications Distributed data association across massive, disparate database systems Multimedia source identification Image tamper identification Image association and recognition Motion analysis Voice analysis VoIP call tracing and intercept Watermarking and applications Cryptographic techniques in digital forensics General papers on IT security will be considered where there is a clear application to the underlying topic of forensic investigation PANELS / WORKSHOPS / TUTORIALS Proposals for panels/workshops/tutorials are solicited. Potential organizers are welcome to submit a proposal to the Technical Program Committee Chair or General Chair. Deadline for workshop proposal is 1st February, 2010 and the Notification of Acceptance of Workshop Proposals is 6th February, 2010.(This process has already been finished.) PUBLICATION All accepted papers will be included in the printed and electronic E-Forensics 2010 Conference Proceedings to be published by Springer in the Lecture Notes of ICST (LNICST) Series and reviewed for indexing by various indexing services such as EI, ISI, DBLP, SCI Google Scholar, INSPEC/COMPENDEX, SCOPUS, EBSCO and ScitopiaEI. Selected papers will be recommended for publication on SCI-Indexed journals including Journal of Computer Science and Technology (JCST), China Communications, and Science in China. SUBMISSION INSTRUCTIONS Paper submission will be handled electronically. Authors should prepare an Adobe Acrobat PDF version of their full paper. All submitted papers will be subject to a rigorous peer-review. Papers must be formatted using Springer LNICST Authors' Kit and submitted only through the ASSYST conference management system. Please visit the Submission page for detailed submission requirements and procedures. Papers must not exceed the limit of 15 pages including text, figures and references. The font size must be at least 10 points. IMPORTANT DATES Deadline for Submission: 30th April, 2010 Notification of Acceptance: 15th June, 2010 Camera version deadline: 1st August, 2010 ===== 会议是上海交大办的,会后会有论文推荐到SCI期刊;另外,会议论文肯定可以被EI检索,欢迎大家投稿。 [ Last edited by 努力着 on 2010-4-16 at 13:59 ] |
» 猜你喜欢
面上可以超过30页吧?
已经有8人回复
体制内长辈说体制内绝大部分一辈子在底层,如同你们一样大部分普通教师忙且收入低
已经有18人回复
网上报道青年教师午睡中猝死、熬夜猝死的越来越多,主要哪些原因引起的?
已经有5人回复
版面费该交吗
已经有13人回复
为什么中国大学工科教授们水了那么多所谓的顶会顶刊,但还是做不出宇树机器人?
已经有10人回复
什么是人一生最重要的?
已经有4人回复
visitor958
至尊木虫 (文坛精英)
IEEE杂志与会议专家
- 应助: 2283 (讲师)
- 贵宾: 0.05
- 金币: 17310
- 散金: 2544
- 红花: 76
- 帖子: 15735
- 在线: 2926.6小时
- 虫号: 489254
- 注册: 2008-01-01
- 专业: IEEE
2楼2010-04-16 14:51:26













回复此楼