| 查看: 262 | 回复: 1 | |||
| 当前主题已经存档。 | |||
努力着荣誉版主 (职业作家)
低调隐士
|
[交流]
【2010-04-30】e-Forensics 2010 已有1人参与
|
||
|
WEB http://www.e-forensics.eu/2010/index.shtml SCOPE Our society has entered an era where commerce activities, business transactions and government services have been, and more and more of them will be, conducted and offered over open networks such as Internet, which has led to new opportunities for criminals and new challenges for law enforcement. For instance, Voice over IP raises significant challenges for call intercept and route tracing;information systems are becoming overwhelmingly large and the challenge of information source identification requires new sophisticated tools; consumer multimedia devices, are increasingly becoming the tools to create potentially illegal content. At the same time, the scientific gathering and investigation of evidence at a crime scene push towards a variety of fascinating digital techniques. As a matter of fact, electronic telecommunications, information technology, consumer devices and sophisticated software are creating new opportunities for both criminals and forensic investigators, thus this conference aims to bring together the research contributions in the development of tools and techniques which assist in the investigation of potentially illegal activity associated with electronic communication and electronic devices, and investigative practice and requirements for presentation of evidence in court are to be considered as the underlying themes. This might include discovery, analysis, handling and storage of digital evidence; meeting the legal burden of proof; and the establishment of the forensic chain of evidence. Technical papers describing original, previously unpublished research, not currently under review by another conference or journal, are solicited. Topics of interest include, but are not limited to, the following: Digital evidence gathering, storage and handling protocols Records tracing and data mining Fraud management in commercial transactions Device forensics Techniques for addressing identity theft Data carving Content filtering Geo-location techniques for cellular, ad-hoc, wireless and IP network communications Distributed data association across massive, disparate database systems Multimedia source identification Image tamper identification Image association and recognition Motion analysis Voice analysis VoIP call tracing and intercept Watermarking and applications Cryptographic techniques in digital forensics General papers on IT security will be considered where there is a clear application to the underlying topic of forensic investigation PANELS / WORKSHOPS / TUTORIALS Proposals for panels/workshops/tutorials are solicited. Potential organizers are welcome to submit a proposal to the Technical Program Committee Chair or General Chair. Deadline for workshop proposal is 1st February, 2010 and the Notification of Acceptance of Workshop Proposals is 6th February, 2010.(This process has already been finished.) PUBLICATION All accepted papers will be included in the printed and electronic E-Forensics 2010 Conference Proceedings to be published by Springer in the Lecture Notes of ICST (LNICST) Series and reviewed for indexing by various indexing services such as EI, ISI, DBLP, SCI Google Scholar, INSPEC/COMPENDEX, SCOPUS, EBSCO and ScitopiaEI. Selected papers will be recommended for publication on SCI-Indexed journals including Journal of Computer Science and Technology (JCST), China Communications, and Science in China. SUBMISSION INSTRUCTIONS Paper submission will be handled electronically. Authors should prepare an Adobe Acrobat PDF version of their full paper. All submitted papers will be subject to a rigorous peer-review. Papers must be formatted using Springer LNICST Authors' Kit and submitted only through the ASSYST conference management system. Please visit the Submission page for detailed submission requirements and procedures. Papers must not exceed the limit of 15 pages including text, figures and references. The font size must be at least 10 points. IMPORTANT DATES Deadline for Submission: 30th April, 2010 Notification of Acceptance: 15th June, 2010 Camera version deadline: 1st August, 2010 ===== 会议是上海交大办的,会后会有论文推荐到SCI期刊;另外,会议论文肯定可以被EI检索,欢迎大家投稿。 [ Last edited by 努力着 on 2010-4-16 at 13:59 ] |
» 猜你喜欢
博士延得我,科研能力直往上蹿
已经有6人回复
退学或坚持读
已经有27人回复
面上基金申报没有其他的参与者成吗
已经有5人回复
有70后还继续奋斗在职场上的吗?
已经有5人回复
遇见不省心的家人很难过
已经有22人回复
多组分精馏求助
已经有6人回复
visitor958
至尊木虫 (文坛精英)
IEEE杂志与会议专家
- 应助: 2283 (讲师)
- 贵宾: 0.05
- 金币: 17310
- 散金: 2544
- 红花: 76
- 帖子: 15735
- 在线: 2926.6小时
- 虫号: 489254
- 注册: 2008-01-01
- 专业: IEEE
2楼2010-04-16 14:51:26













回复此楼