Humble Bundle and No Starch Press are offering a charity deal on hacking and security books. For 15$ or more you can get 13 books! Check out the deal here: https://www.humblebundle.com/books/no-starch-hacking-books
Hello everyone! We have an opportunity for singledoctoral research positions. Positions with the Legal Informatics and Forensic Science Institute at Hallym University provide support for up to 5 years. Applicants must have obtained a PhD no more than 5 years ago. A background in criminal justice or computer science is preferred. If you are interested, please email your CV and a short introduction to [email protected] by 20th April, 2016.
Please forward to anyone that may be interested.
- Completed Research Papers: No longer than 14 pages (including abstract, figures, tables and references) must be formatted using JDFSL template (see Formatting / Templates on http://www.jdfsl.org/for-authors).
- Presentation Proposals (e.g., to present work in progress): No longer than 1 page (12pt, any format). Accepted proposals will get a 15min presentation slot as well as the chance to present work during the singleer session.
- Papers / proposals must be submitted only through Easychair.org by going to: https://www.easychair.org/conferences/?conf=icdf2c2016.
- Industrial Talk: Typically a 1,000 word description of the proposed talk. All talks must be vendor neutral.
- Round Table Discussion: Typically a 1,000 word synopsis of the topic area.
- Panel Proposals: Typically a 1,000 word description, identifying the panelists to be involved.
- Workshop Proposal: Typically a 1,000 word synopsis about the content of the workshop.
- Tutorial Proposals: Typically a 1,000 word description of topic(s), potential speakers, program length, and potential audience. Also, include proposer resume(s).
- Business Applications of Digital Forensics
- Civil/Criminal Litigation Support
- Cloud Forensics
- Cyber Crime Investigations
- Cyber Criminal Psychology and Profiling
- Cyber Culture and Cyber Terrorism
- Data Hiding and Steganography
- Database Forensics
- Digital Forensic Trends
- Digital Forensics and Law
- Digital Forensics and Error Rates
- Digital Forensics Novel Algorithms
- Digital Forensics Process and Procedures
- Digital Forensics Standardization and Accreditation
- Digital Forensics Techniques and Tools
- BigData and Digital Forensics
- Incident Response
- Information/Cyber Warfare & Critical Infrastructure Protection
- Law Enforcement and Digital Forensics
- Machine learning and Digital Forensics
- Malware and Botnets
- Mobile/Handheld Device and Multimedia Forensics
- Money Laundering
- Digital Forensics Triage
- Digital Forensic Science
- Digital Forensic Tool Testing and validation
- Authors Names section
- Biography section
- Acknowledgments section (if it contains information identifying the authors).
- If an article is accepted, author(s) must provide a version in either Microsoft Word or LaTeX with graphics (figures) in GIF, TIF, or PowerPoint formats. Permissions for reprinted material are the sole responsibility of the author(s) and must be obtained in writing prior to publication.
- new and original,
- well organized and clearly written,
- of interest to the academic and research communities,
- not published previously, and
- not under consideration for publication in any other journal or book
- Significantly enhanced versions of manuscripts previously published may be considered. Authors need to seek permission from the publishers of such previous publications.
- Papers awaiting presentation or already presented at conferences must be significantly enhanced (ideally, taking advantage of feedback received at the conference) in order to receive consideration. If the paper has been presented previously at a conference or other professional meeting, this fact, the date, and the sponsoring organization should be listed in a footnote on the first page.
- Funding sources should be acknowledged in the Acknowledgements section.
The mission of JDFSL is to publish original research and comments about digital forensics and its relationship to security and law. Contributions are particularly welcome which analyze the results of interdisciplinary research. Publications will include the results of research and case studies that advance the curriculum, practice and understanding of digital forensics methods and techniques to support efficient and effective investigations.
The peer-reviewed, multidisciplinary Journal of Digital Forensics, Security and Law (JDFSL) focuses on the advancement of the field by publishing the state of the art in both basic and applied research conducted worldwide. We purposefully chose to use the word cyber in our tagline, instead of digital to emphasize the cyber culture surrounding computing, and the word cyber also extends itself beyond the technical domain of computing. The Journal???s main aims are to open up the landscape for innovation and discussion, and to continuously bridge the gap between the science and practice of cyber forensics, security and law. This journal encourages both scientists and practitioners to share their discoveries and experiences.
JDFSL is of interest to the following stakeholders: cyber forensic/security scientists, cyber security/forensic practitioners, law enforcement officers, lawyers, any governmental agencies with interest in national and local security, and private sector organizations. The Journal will publish the following types of articles:
<ul type="disc"><li class="MsoNormal">Research articles: These articles should have a strong contribution to the state of the art in cyber forensics/security science. Research could be either applied or basic. Although we anticipate that most of the research that will be published will primarily be computer science centric, the Journal strongly encourages topics that stem from other disciplines such as psychology, sociology, business, accounting, law, philosophy, linguistics, education, criminal justice, political science, social science, and ethics, to participate in the advancement of cyber forensic science. We have no preference on the type of methodology used in the research, as long as the work is both methodologically and scientifically grounded.</li></ul><ul type="disc"><li class="MsoNormal">Open Peer Commentaries: To ensure that there is constant discussion and deliberations in this field, JDFSL encourages experts in the domain to submit commentaries on the state of the art in the field through open peer commentaries. Commentaries seek to provide a critical and/or alternative perspective on the state of the art in cyber forensics/security. For a commentary to be accepted for publication, it should meet one or more of the following criteria: <ul type="circle"><li class="MsoNormal">The contribution should offer significant insight into work that has been published in JDFSL.</li><li class="MsoNormal">Novel findings substantially contradict well-established research, theory, and practice.</li><li class="MsoNormal">It provides insight into bridging the gap between the science and practice of cyber forensics security.</li><li class="MsoNormal">It critiques findings of seminal work, research, or practice in the domain.</li><li class="MsoNormal">It offers significant contribution by consolidating findings in research and practice.</li><li class="MsoNormal">It improves the multidisciplinary nature of the domain.</li><li class="MsoNormal">It reviews and provides insight into both tools and methods used in cyber forensics.</li></ul></li></ul>
<ul type="disc"><li class="MsoNormal">Book Reviews: The Journal provides a place for peers to share their opinions and reviews of published books in the field of cyber forensics and security science.</li></ul>
JDFSL Special issue on Cyberharassment Investigation: Advances and Trends.
<div style="font-family: -webkit-standard;">The Journal of Digital Forensics, Security and Law (JDFSL) is a peer-reviewed, multidisciplinary journal focussing on the advancement of the cyber forensics field through the publication of both basic and applied research. JDFSL is a no-fee open access publication, indexed in EBSCOhost, ProQuest, DOAJ, DBLP, arXiv, OAJI, ISI Web of Science, Google Scholar, and other databases. JDFSL is published by the Association of Digital Forensics, Security and Law.</div>
The DFRWS EU 2016 conference will be hosted by the University of Lausanne, Switzerland, at the end of March 2016. Ever since the first open workshop in 2001, DFRWS continues to bring leading researchers, developers, practitioners, and educators from around the world together in an informal collaborative environment. DFRWS conferences publicize and discuss high quality research outcomes selected in a thorough peer review process. DFRWS is dedicated to the advancement of digital forensics research through open sharing of knowledge and ideas.
The conference program is now online: http://www.dfrws.org/2016eu/program.shtml
Registration is still open with early bird rates running until the end of February: http://www.dfrws.org/2016eu/register.shtml
Lodging information with special discounts can be found at http://www.dfrws.org/2016eu/location.shtml
In order to take advantage of the special rates that we have negotiated with the hotels, you should reserve your room as soon as possible (special rates expiration dates are in February and depend on the hotel). For your information, the gala dinner will take place at the Starling Hotel Lausanne, right on the campus. The conference venue is the Amphimax on the campus of the University of Lausanne.
OVERVIEW OF THE PROGRAM: (full program at http://www.dfrws.org/2016eu/program.shtml)
March 29 is reserved for pre-conference practical workshops. On Tuesday evening, we will visit the Olympic Museum (included in the registration fee).
The official 2-day conference goes from March 30 to March 31. The gala dinner will take place at the Starling Hotel Lausanne, on the campus, on Wednesday evening (March 30) and is included in the registration fee.