Special Issue "Contemporary and Future Digital Forensics"
A special issue of Future Internet (ISSN 1999-5903).
Deadline for manuscript submissions: closed (31 March 2014)
Dr. Richard E. Overill
Department of Informatics King's College London Strand, London WC2R 2LS, UK
Website | E-Mail
Interests: digital forensics; computer forensics; cyber forensics; mobile forensics; in silico forensics; live forensics; in situ forensics; triage strategies; cost-effectiveness criteria in forensics; bayesian reasoning in forensics; bayesian networks in forensic investigations; quantifying likelihood ratios and odds ratios in digital forensics; complexity and information theory in digital forensic investigations
This special issue of Future Internet journal contains selected, extended papers presented at the 6th annual Workshop on Digital Forensics (WSDF), a satellite workshop of the 8th annual international conference on Availability, Reliability & Security (ARES), held at the University of Regensburg, Germany on 2–6 September 2013.
Digital forensics is a rapidly evolving field primarily focused on the extraction, preservation and analysis of digital evidence obtained from electronic devices in a manner that is legally acceptable. Research into new methodologies tools and techniques within this domain is necessitated by an ever-increasing dependency on tightly interconnected, complex and pervasive computer systems and networks. The ubiquitous nature of our digital lifestyle presents many avenues for the potential misuse of electronic devices in crimes that directly involve, or are facilitated by, these technologies. The aim of digital forensics is to produce outputs that can help investigators ascertain the overall state of a system. This includes any events that have occurred within the system and entities that have interacted with that system. Due care has to be taken in the identification, collection, archiving, maintenance, handling and analysis of digital evidence in order to prevent damage to data integrity. Such issues combined with the constant evolution of technology provide a large scope of digital forensic research. This special issue aims to bring together experts from academia, industry, government and law enforcement who are interested in advancing the state of the art in digital forensics by exchanging their knowledge, results, ideas and experiences.
Dr. Richard E. Overill
Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. Papers will be published continuously (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.
Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are refereed through a peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Future Internet is an international peer-reviewed Open Access quarterly journal published by MDPI.
Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 500 CHF (Swiss Francs). English correction and/or formatting fees of 250 CHF (Swiss Francs) will be charged in certain cases for those articles accepted for publication that require extensive additional formatting and/or English corrections.
- digital evidence
- network forensics
- anti forensics
- physical memory acquisition and analysis
- digital forensic information visualisation
- fraud investigations involving technology
- portable devices
- cyber terrorism
- log analysis
- risk and incident management
- investigative case studies
- data hiding techniques and steganography
- novel data recovery techniques