CFP: OMICS Group International Conference on Forensic Research and Technology

Open call for abstracts (will receive DOI) for the International Conference on Forensic Research and Technology. Looks like an interesting mix of all forensic science topics, including Cyber.

October 15 - 17, 2012
Chicago-Northshore, U.S.A.

“Forensic Research-2012, a remarkable event that is bound to set new standards in research. This conference would witness new breakthroughs and new strategies in investigation followed by different investigational agencies both government and crime investigation bodies. Forensic Research-2012 is an apt platform for investigators to collaborate and share new ideas, innovations & strategies in fight against crime and terrorism. The scientific program paves a way to gather visionaries through the research talks and presentations and put forward many thought provoking strategies in Forensic Research & Technology.

Modern era of network and cyber evolution has emerged with a great outcome of profits as well as destructive phases which influence the economical barriers of the nations. Hence the field of digital forensics and cyber crime investigation has evolved as an important subject of interest for national security and to develop the security systems. Forensics is a multidisciplinary area that monitors and encompasses law, investigation for network hacking, cyber crimes, finance, telecommunications, digital data recovery, and data reconstruction.

This conference on Forensic Research brings together forensic medicine professionals and forensic scientists from diverse fields providing opportunities for business and intellectual engagement among attendees.”

Conference Highlights the following topics:
• Role of Psychology in Forensic Science  • Nuclear Forensics   • Forensic Medicine
• Forensic & Investigative Sciences   • Forensic Toxicology   • Cyber Investigation
• Forensic Research & Medical Ethics  • Forensic Analysis and Tools
• Environmental Forensic Tools  • Evolving Fields in Forensic Science
• Modern Developments in Forensic science  • Forensic Evaluation

1 min read

Installing Log2Timeline on Ubuntu 12.04

The maintainers of log2timeline have yet to set up a repository for Ubuntu Precise (12.04). Here are the required packages needed to get most of the functionality of log2timeline going:
liblwp-useragent-determined-perl, libdatetime-perl, libdate-manip-perl, libdatetime-format-builder-perl, libclass-dbi-perl, libparse-win32registry-perl, libnet-pcap-perl, libnetpacket-perl, libxml-perl, libxml-libxml-perl, libcarp-assert-perl, libdigest-crc-perl, libdata-hexify-perl, libimage-exiftool-perl, libarchive-zip-perl, libfile-mork-perl, libmac-propertylist-perl, libxml-entities-perl, libhtml-scrubber-perl

After that, log2timeline 0.64 was built from source with only DBD::SQLite still needed.
<blockquote class="tr_bq">perl Makefile.PL
make
sudo make install</blockquote>

~1 min read

LawTech Europe Congress 2012

LawTech Europe Congress 2012

12 November, 2012
Prague, Czech Republic

Over the past few years there have been huge advances in Electronic Evidence support and guidelines for civil litigations in America and Western Europe. These advances have not been adequately mirrored in Central and Eastern Europe. As a result, multi-jurisdictional disputes have become more drawn out and complex in nature. In criminal proceedings, the lack of clear guidelines for the collection and processing of electronic evidence has lead to low crime detection rates and ineffective criminal prosecutions. What this annual congress aims to achieve is address the imbalance by bringing together, the brightest minds in technology, law, governance, and compliance.”

~1 min read

CFP: Heterogeneous Networking for Quality, Reliability, Security and Robustness - Qshine 2013

9th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness - Qshine 2013
11th-12th January 2013
 Gautam Buddha University, Greater Noida NCR, Delhi, India
http://qshine.org/2013/show/home 

[Important dates]
Paper Submission Deadline: 30th September 2012
Notification of Acceptance: 15th November 2012
Camera Ready Deadline: 30th November 2012
Conference Date: 11th - 12th Jan, 2013

[Scope]
The objective of this conference is to emphasize the recent technological developments in the area of Network Communication, VLSI Systems and will cover wide range of issues related to QoS, Reliability and Security in the Information and Communication Technology. The aim of the conference is to bridge the gap between the technological advancements in the industry and the academic research. Thus this conference will provide a common platform for the Professionals, Experts and Researchers to interact with each others.

Topics:
4. Security

<ul><li>Cryptography System</li><li>Cryptography Algorithm</li><li>Information Security</li><li>Cyber Security, Forensic Security</li><li>Multicast Security</li><li>Network Security</li><li>Situation Analysis and Predication Technology</li><li>Security for Critical Infrastructure </li><li>Wireless and Pervasive Computing</li><li>Trusted Computing</li><li>Malicious Code Analysis, Antivirus, Anti Spyware</li><li>Security Protocols and Algorithms in Wired and Wireless Networks</li><li>Resilience of Overlay and Wireless Protocols</li><li>Cross-layer Protocol Design in Wireless Networks</li><li>Cross-layer Performance Optimization for Security, Energy, Network Lifetime, and Capacity</li></ul>

~1 min read

International Workshop on Digital Forensics in the Cloud 2012 (IWDFC 2012)

Unfortunately too late to submit a paper this year, but the conference may be interesting nonetheless!

From International Workshop on Digital Forensics in the Cloud (IWDFC 2012):

The 2012 workshop will comprise of presentations from a cloud forensic expert from industry, and a representative from one of the popular cloud platform developers (e.g. Nimbula director).  A lab session will also be carried out on setting up and management of a cloud infrastructure.”


<div class="MsoNormal" style="background-color: white; color: #434343; font-family: arial, helvetica; font-size: 12.222222328186035px;">The work will run in conjunction with the 2012 ISSA conference ( http://www.infosecsa.co.za/) and will take place on the third day (17th August 2012).</div><div class="MsoNormal" style="background-color: white; color: #434343; font-family: arial, helvetica; font-size: 12.222222328186035px;">
</div><div class="MsoNormal" style="background-color: white; color: #434343; font-family: arial, helvetica; font-size: 12.222222328186035px;">Submissions are welcome for people who wish to present at the workshop.</div><div class="MsoNormal" style="background-color: white; color: #434343; font-family: arial, helvetica; font-size: 12.222222328186035px;">
</div><div class="MsoNormal" style="background-color: white; color: #434343; font-family: arial, helvetica; font-size: 12.222222328186035px;">Topics of interest must be based on the cloud and are but not limited to:</div><div class="MsoNormal" style="background-color: white; color: #434343; font-family: arial, helvetica; font-size: 12.222222328186035px;">
</div><div class="MsoListParagraphCxSpFirst" style="background-color: white; color: #434343; font-family: arial, helvetica; font-size: 12.222222328186035px; text-indent: -0.25in;">·         Cloud security</div><div class="MsoListParagraphCxSpMiddle" style="background-color: white; color: #434343; font-family: arial, helvetica; font-size: 12.222222328186035px; text-indent: -0.25in;">·         Digital forensic tools</div><div class="MsoListParagraphCxSpMiddle" style="background-color: white; color: #434343; font-family: arial, helvetica; font-size: 12.222222328186035px; text-indent: -0.25in;">·         Incident response</div><div class="MsoListParagraphCxSpMiddle" style="background-color: white; color: #434343; font-family: arial, helvetica; font-size: 12.222222328186035px; text-indent: -0.25in;">·         Data visualization</div><div class="MsoListParagraphCxSpMiddle" style="background-color: white; color: #434343; font-family: arial, helvetica; font-size: 12.222222328186035px; text-indent: -0.25in;">·         Digital evidence identification</div><div class="MsoListParagraphCxSpMiddle" style="background-color: white; color: #434343; font-family: arial, helvetica; font-size: 12.222222328186035px; text-indent: -0.25in;">·         Digital forensic process</div><div class="MsoListParagraphCxSpLast" style="background-color: white; color: #434343; font-family: arial, helvetica; font-size: 12.222222328186035px; text-indent: -0.25in;">·         Privacy</div><div class="MsoNormal" style="background-color: white; color: #434343; font-family: arial, helvetica; font-size: 12.222222328186035px;">
</div><div class="MsoNormal" style="background-color: white; color: #434343; font-family: arial, helvetica; font-size: 12.222222328186035px;">Important Dates:</div><div class="MsoNormal" style="background-color: white; color: #434343; font-family: arial, helvetica; font-size: 12.222222328186035px;">Paper Submission: 20 April 2012</div><div class="MsoNormal" style="background-color: white; color: #434343; font-family: arial, helvetica; font-size: 12.222222328186035px;">Author notification: 29 June 2012</div>

~1 min read