CYBERCRIME INVESTIGATION AND DIGITAL FORENSICS WORKSHOP (CID2018)

Second IFIP NTMS International Workshop on Cybercrime Investigation

and Digital forensics (CID2018)

in conjunction with the

9th IFIP International Conference on New Technologies, Mobility &  Security

26 to 28 February 2018. Paris, France

 

After the success of its previous editions, the 2017 IFIP International Conference on New Technologies, Mobility and Security (NTMS) is organizing the Second IFIP NTMS International Workshop on Cybercrime Investigation and Digital forensics (CID2018).


The purpose of the workshop is to explore the challenges faced by researchers, practitioners, and non-technical professionals in the area of digital and cybercrime investigation. This workshop will provide a forum for law enforcement, judiciary and industry to share their problems and challenges with people from academia and industry for possible solution to meet their needs. This will promote collaboration between industry, academia and R&D and will help the collaborating partners to benefit from each other’s resources and expertise in the domain. 

The workshop will include talks and tutorials on innovative tools and techniques such as state-of- the-art software and hardware solutions, theories and algorithms, experimental results, and formal and mathematical models.

Scope

The unprecedented increase in online crimes including identify theft, phishing and social engineering attacks has increased the need for digital forensics. Digital forensics aimed to collect, analyze, and present digital evidence to prosecute cybercriminals in the court of law. Digital forensics is becoming more challenging due to tremendous increase in ubiquities computing, emergence of new technologies such as cloud computing and with influx of plethora of smart devices. Finding potential evidence related to a crime is no more an issue due to availability of network logs, chat logs, web forums, emails and social networking posts. The challenge is to precisely analyze large volumes of data in timely manner and collect forensic evidence related to crimes being investigated. 

Digital forensics is employed for fraud detection, homeland security, financial scams investigation and for revealing discrepancies in business transactions. The increased computing power, storage capability and the development of innovative machine learning and data analytics techniques are playing a vital role in digital forensics. New legislation and revising exiting laws to adequately cover the new online crimes is imperative. The workshop is covering, but not limited to, the  following topics.

  • Forensic processes and procedures
  • Digital Forensic: challenges and common practices
  • Big Data in digital forensics
  • Network and log forensics
  • Memory forensics
  • Flash and physical memory forensics
  • Software and hardware forensic tools
  • Anonymity and authorship forensics
  • Small-scale digital devices forensics
  • Smart toy and gaming console forensics
  • Messaging forensics
  • Anti-Forensic and steganography 
  • Cloud forensics: technical, jurisdiction and legal challenges
  • Digital forensics and cybercrime laws
  • Role of Big Data in forensic analysis
  • IoT forensics
  • Drone forensics
  • Cybercrime laws and procedures
  • Digital forensics and social crimes
  • Digital forensics and financial crimes including money laundering 
  • Digital forensics and cyber stalking and cyberbullying
  • Digital forensics and homeland security
  • Digital forensics and operating systems platforms and file system
  • Digital crimes and international laws
  • Socio-linguistics and criminology
  • Email forensics
  • Digital crime scene investigation
  • Digital forensics tools testing and evaluation

IMPORTANT DATES

  • Extended Submission DeadlineOctober 30th, 2017 November 12th, 2017
  • Acceptance notification: December 20th, 2017
  • Camera ready: January 5th, 2018
  • Workshop date: February 26-28th, 2018

COMMITTEES

Workshop Chair

  • Farkhund Iqbal, College of Technological Innovation, Zayed University, United Arab Emirates
    Email: This email address is being protected from spambots. You need JavaScript enabled to view it.

Technical Program Chairs

  • Patrick C. K. Hung,
    Faculty of Business and Information Technology
    University of Ontario Institute of Technology, Canada
    E-mail: This email address is being protected from spambots. You need JavaScript enabled to view it. 
  • Benjamin C. M. Fung,
    School of Information Studies, McGill University, Canada
    E-mail: This email address is being protected from spambots. You need JavaScript enabled to view it. 
  • Omar AlFandi,
    College of Technological Innovation, Zayed University,
    United Arab Emirates.
    Email: This email address is being protected from spambots. You need JavaScript enabled to view it.

 TPC member

  • Jigang Liu, Metropolitan State University, Minnesota, USA
  • Diane Barrett, Bloomsburg University of Pennsylvania, USA
  • Yan Bai, University of Washington Tacoma, USA
  • Babar Shah, Zayed University, United Arab Emirates
  • Noman Mohammed, University of Manitoba, Canada
  • Huwida Said, Zayed University, United Arab Emirates
  • Thar B. Shamsa, Liverpool John Moores University, UK
  • Elias Bou-Harb, Florida Atlantic University, USA
  • Felix Freiling, Friedrich-Alexander- Universität Erlangen-Nürnberg, Germany.

PAPER SUBMISSION

 

Papers are to be submitted electronically on the EDAS web site of the conference in PDF format: https://edas.info/newPaper.php?c=23855.

Submissions should be original and limited to 5 double-column pages, and should follow IEEE paper templates. Paper with more pages can be accepted however they need to be reduced to 5 pages for publication.

Accepted and presented papers will be published in the conference proceedings and submitted to IEEE Xplore as well as other Abstracting and Indexing (A&I) databases.

Submission process

Your paper must be printable in order to be accepted. The paper's cover page must include

the following information:

  • Title of paper.
  • Authors' names and affiliations.
  • Contact author's name and address (both postal and electronic).
  •  A short abstract.
  • Keywords.

In order to submit, you must first create an EDAS account. The EDAS system will e-mail you your password. Then you can login to EDAS using the password you have received by email.

EDAS will provide you with a submissions homepage where you can register your paper submission and make appropriate changes.

How to use EDAS to submit your paper:

  • Create an account in the EDAS system at https://edas.info/
  • Login to EDAS using your username and password (sent via email).
  • Click on the "submit paper" image to submit a new paper, or select an existing submission to edit.
  • Fill in the detail of the paper. You will be required to provide information for co-authors not already registered with the system. Choose as many topics as apply to your paper. Choose the submit button to register your paper.
  • Upload your paper using the provided form. You may choose not to upload a file immediately. You may upload a new version of your file at any time (prior to submission deadline) by returning to the EDAS system. Once you login, a list of submitted papers will be made available. Click on the upload image to upload a new version of your paper.

After submission, reviews of your paper can be accessed from your submission list. If you have problems with the system, please e-mail This email address is being protected from spambots. You need JavaScript enabled to view it.

Extended versions of ALL accepted papers will be invited for submission by a special issues "Cybercrime Investigation and Digital Forensics" (https://www.igi-global.com/journal/international-journal-digital-crime-forensics/1112) in the International Journal of Digital Crime and Forensics (IJDCF) and a book called "Cybercrime Investigation and Digital Forensics" in the Springer International Series on Computer Entertainment and Media Technology (http://www.springer.com/series/13820).