About |
We are pleased to announce that The 8th International Symposium on Digital Forensics and Security (ISDFS 2020) will be held in Beirut, Lebanon, on June 1&2, 2020. The conference is technically sponsored by IEEE Section. The conference proceedings will be submitted for publication in the IEEE Xplore Digital Library. ISDFS provides a platform for researchers and experts in academia, industry and government to exchange ideas and recent developments in digital forensics and security. After the several successful events, the seventh ISDFS conference will continue to promote and disseminate knowledge concerning several topics and technologies related to Digital Forensics and Security. The symposium will be held by the “Arab Open University” in Beirut, Lebanon. Special sessions, workshops, tutorials, keynotes, panel discussions, poster and oral presentations will be included in the symposium program. All papers will be reviewed by at least three independent reviewers (single-blinded review). Accepted full papers will be submitted for publication in IEEE Xplore Digital Library. |
Call for Papers |
The symposium will be held by the “Arab Open University” in Beirut, Lebanon. Special sessions, workshops, tutorials, keynotes, panel discussions, poster and oral presentations will be included in the symposium program. All papers will be reviewed by at least three independent reviewers (single-blinded review). Accepted full papers will be submitted for publication in IEEE Xplore Digital Library. Topics within the scope of the symposium include, but are not limited to, the following areas: Digital ForensicsDigital Forensics Process Model, Information Systems and Crime Analysis, Business Application of Digital Forensics, Digital Forensics Techniques and Tools, Legal and Policy Issues Related to Digital Forensics, Digital Forensics Case Studies, Database Forensics, Cloud Forensics, Mobile & Multimedia Forensics, Network Forensics, Digital Forensics Training and Education, Big Data and Digital Forensics, Cyber Forensics, Digital Forensics Tool Testing and Validation Process, Digital Forensics Trends, Digital Forensics & Law, Anti and Counter Forensics, Data Hiding and Recovery, Cyber Crime Investigations, Cyber Culture & Cyber Terrorism, Incident Response, Information Warfare & Critical Infrastructure Protection. Data PrivacyDigital Signature, Certified Electronic Mail, Certificates and Certificate Management, Standards, Protocols, Trust Models, Key and Identity Management, Digital Signature Policies and Law, Validity of Digital Signature in Government, Finance, and Commerce, Effects of Digital Signature on Digital Signature Law, Responsibilities for Opponents to ESSP in Law in Digital Signature, Discrepancy between Digital Signatures, Judgments related to Digital Signatures, Digital Signature Law in Other Countries. CryptographyBlock Ciphers, Stream Ciphers, Public Key Cryptography, Quantum Cryptography, Elliptic Curve Cryptography, Algebraic Curves in Cryptography, Homomorphic Encryption, Cryptographic Protocols, Zero Knowledge, Secret Sharing, Cryptanalysis, Hash Functions, Applications of Coding Theory in Cryptography Information SecuritySteganography and Steganalysis, Secure Multiparty Computation, Biometric Approaches, Computer Security, Mobile Communications Security, Operating System Security, Trusted Computing, Network Security, Wireless Security, Database Security, IPTV Security, E-commerce Protocols, Content filtering and tracing, Distributed System Security, Security Weaknesses on Information Technologies, Secure Code Development, Penetration Tests, Intrusion Detection Systems, Malicious Codes and spyware, Viruses, Spyware, Spamware, Scam, Energy/Cost/Efficiency of Security in Clouds, Security Risk Models and Clouds, Security Standards and Practices. Computer ScienceArtificial Intelligence , Artificial/Deep Learning, Cloud Computing , Data Mining/Big Data , High Performance Computing, Internet of Things, Virtual and Augmented Reality , Secure Systems, Signal/Image/Video Processing, Human–Machine Interaction, Bioinformatics, Robotics, Social Networks, Algorithms and Data Structures, Game Theory, Soft Computing, Natural Language Processing, Operating System, Computer Graphics, Programming Languages, Software Engineering, Theory of Computation. At the end of the symposium, a Best Paper Award and a Best Student Presentation Award will be granted by the ISDFS 2020 Program Committee. In order to qualify for the award(s), at least one of the authors must register and the paper(s) must be presented. |
Summary |
ISDFS 2020 : 8th International Symposium on Digital Forensics and Security will take place in Beirut, Lebanon. It’s a 2 days event starting on Jun 01, 2020 (Monday) and will be winded up on Jun 02, 2020 (Tuesday). ISDFS 2020 falls under the following areas: DIGITAL FORENSICS, CYBER SECURITY, CRYPTOGRAGPHY, COMPUTER SCIENCE, etc. Submissions for this Symposium can be made by Mar 03, 2020. Authors can expect the result of submission by Mar 16, 2020. Upon acceptance, authors should submit the final version of the manuscript on or before Mar 30, 2020 to the official website of the Symposium. Please check the official event website for possible changes before you make any travelling arrangements. Generally, events are strict with their deadlines. It is advisable to check the official website for all the deadlines. Other Details of the ISDFS 2020
|
Credits and Sources |
[1] ISDFS 2020 : 8th International Symposium on Digital Forensics and Security |