Difference between pages "Main Page" and "Upcoming events"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
m
 
(Conferences)
 
Line 1: Line 1:
<div style="margin-top:0.5em; padding:0.5em 0.5em 0.5em 0.5em; background-color:#faf0ff; align:right; border:1px solid #ddccff;">
+
<b>PLEASE READ BEFORE YOU EDIT THE LISTS BELOW</b><br>
This is the '''Forensics Wiki''', a [http://creativecommons.org/licenses/by-sa/2.5/ Creative Commons]-licensed [http://en.wikipedia.org/wiki/Wiki wiki] devoted to information about [[digital forensics]] (also known as computer forensics). We currently list a total of [[Special:Allpages|{{NUMBEROFARTICLES}}]] pages.
+
When events begin the same day, events of a longer length should be listed first. New postings of events with the same date(s) as other events should be added after events already in the list. Please use three-letter month abbreviations (i.e. Sep, NOT Sept. or September), use two digit dates (i.e. Jan 01 NOT Jan 1), and use date ranges rather than listing every date during an event(i.e. Jan 02-05, NOT Jan 02, 03, 04, 05).<br>
 
+
<i>Some events may be <u>limited</u> to <b>Law Enforcement Only</b> or to a specific audience. Such restrictions should be noted when known.</i>
Much of [[computer forensics]] is focused on the [[tools]] and [[techniques]] used by [[investigator]]s, but there are also a number of important [[papers]], [[people]], and [[organizations]] involved. Many of those organizations sponsor [[Upcoming_events|conferences]] throughout the year and around the world. You may also wish to examine the popular [[journals]] and some special [[reports]].
+
</div>   
+
  
 +
This is a BY DATE listing of upcoming events relevant to [[digital forensics]].  It is not an all inclusive list, but includes most well-known activities.  Some events may duplicate events on the generic [[conferences]] page, but entries in this list have specific dates and locations for the upcoming event.
  
==WIKI NEWS==
+
This listing is divided into three sections (described as follows):<br>
2013-05-15: You can now subscribe to Forensics Wiki Recent Changes with the [[ForensicsWiki FeedBurner Feed]]
+
<ol><li><b><u>[[Upcoming_events#Calls_For_Papers|Calls For Papers]]</u></b> - Calls for papers for either Journals or for Conferences, relevant to Digital Forensics (Name, Closing Date, URL)</li><br>
 +
<li><b><u>[[Upcoming_events#Conferences|Conferences]]</u></b> - Conferences relevant for Digital Forensics (Name, Date, Location, URL)</li><br>
 +
<li><b><u>[[Training Courses and Providers]]</u></b> - Training </li><br></ol>
  
{| width="100%"
+
== Calls For Papers ==
|-
+
Please help us keep this up-to-date with deadlines for upcoming conferences that would be appropriate for forensic research.
| width="60%" style="vertical-align:top" |
+
<!-- Selected Forensics Research --> 
+
<div style="margin-top:0.5em; border:2px solid #ff0000; padding:0.5em 0.5em 0.5em 0.5em; background-color:#ffff99; align:center; border:1px solid #ddccff;">
+
<h2 style="margin:0; background-color:#ffff33; font-size:120%; font-weight:bold; border:1px solid #afa3bf; text-align:left; color:#000; padding-left:0.4em; padding-top:0.2em; padding-bottom:0.2em;"> Featured Forensic Research </h2>
+
 
+
<small>May 2014</small>
+
<bibtex>
+
@inproceedings{Hurley:2013:MAC:2488388.2488444,
+
author = {Sven Ka ̈lber, Andreas Dewald, Steffen Idler},
+
title = {Forensic Zero-Knowledge Event Reconstruction on Filesystem Metadata},
+
booktitle = {Lecture Notes in Informatics},
+
volume="P-228",
+
year=2014,
+
url = {http://subs.emis.de/LNI/Proceedings/Proceedings228/331.pdf},
+
}
+
</bibtex>
+
 
+
Abstract: Criminal investigations today can hardly be imagined without the forensic analysis of digital devices, regardless of whether it is a desktop computer, a mobile phone, or a navigation system. This not only holds true for cases of cybercrime, but also for traditional delicts such as murder or blackmail, and also private corporate in- vestigations rely on digital forensics. This leads to an increasing number of cases with an ever-growing amount of data, that exceeds the capacity of the forensic experts. To support investigators to work more efficiently, we introduce a novel approach to auto- matically reconstruct events that previously occurred on the examined system and to provide a quick overview to the investigator as a starting point for further investigation. In contrast to the few existing approaches, our solution does not rely on any previously profiled system behavior or knowledge about specific applications, log files, or file for- mats. We further present a prototype implementation of our so-called zero knowledge event reconstruction approach, that solely tries to make sense of characteristic struc- tures in file system metadata such as file- and folder-names and timestamps.
+
 
+
(See also [[Past Selected Articles]])
+
 
+
| width="40%" style="vertical-align:top" |
+
 
+
<div style="margin-top:0.5em; border:2px solid #00ff00; padding:0.5em 0.5em 0.5em 0.5em; background-color:#ffeeff; align:center; border:1px solid #ffccff;">
+
<h2 style="margin:0; background-color:#ffff33; font-size:120%; font-weight:bold; border:1px solid #afa3bf; text-align:left; color:#000; padding-left:0.4em; padding-top:0.2em; padding-bottom:0.2em;">  Featured Article </h2>
+
;[[Forensic Linux Live CD issues]]
+
:Forensic Linux Live CD distributions are widely used during computer forensic investigations. Currently, many vendors of such Live CD distributions state that their Linux do not modify the contents of hard drives or employ "write protection." Testing indicates that this may not always be the case. [[Forensic Linux Live CD issues|Read More...]]
+
  
 +
{| border="0" cellpadding="2" cellspacing="2" align="top"
 +
|- style="background:#bfbfbf; font-weight: bold"
 +
! width="30%|Title
 +
! width="15%"|Due Date
 +
! width="15%"|Notification Date
 +
! width="40%"|Website
 +
|-
 +
|6th International Conference on Digital Forensics & Cyber Crime
 +
|May 16, 2014
 +
|Jul 30, 2014
 +
|http://d-forensics.org/2014/show/cf-calls
 +
|-
 +
|2014 Annual Computer Security Applications Conference
 +
|Jun 01, 2014
 +
|Aug 15, 2014
 +
|http://www.acsac.org/2014/cfp/papers/
 +
|-
 +
|Open Source Digital Forensics Conference
 +
|Jun 01, 2014
 +
|
 +
|http://www.basistech.com/osdfcon/cfp/
 +
|-
 +
|67th Annual Scientific Meeting of the American Academy of Forensic Sciences
 +
|Aug 01, 2014
 +
|Nov 01, 2014
 +
|http://www.aafs.org
 +
|-
 +
|Eleventh Annual IFIP WG 11.9 International Conference on Digital Forensics
 +
|Oct 01, 2014
 +
|Nov 15, 2014
 +
|http://www.ifip119.org
 +
|-
 
|}
 
|}
  
 +
See also [http://www.wikicfp.com/cfp/servlet/tool.search?q=forensics WikiCFP 'Forensics']
  
<!-- This begins the two-column section -->
+
== Conferences ==
 
+
{| border="0" cellpadding="2" cellspacing="2" align="top"
{| width="100%"
+
|- style="background:#bfbfbf; font-weight: bold"
 +
! width="40%"|Title
 +
! width="20%"|Date/Location
 +
! width="40%"|Website
 +
|-
 +
|8th International Conference on IT Security Incident Management & IT Forensics
 +
|May 12-14<br>Muenster, Germany
 +
|http://www1.gi-ev.de/fachbereiche/sicherheit/fg/sidar/imf/imf2014/
 +
|-
 +
|2014 IEEE Symposium on Security and Privacy
 +
|May 16-23<br>Berkley, CA, USA
 +
|http://www.ieee.org/conferences_events/conferences/conferencedetails/index.html?Conf_ID=16517
 +
|-
 +
|9th ADFSL Conference on Digital Forensics, Security and Law
 +
|May 28-29<br>Richmond, VA
 +
|http://www.digitalforensics-conference.org/
 +
|-
 +
|Techno-Security and Forensics Conference
 +
|Jun 01-04<br>Myrtle Beach, SC, USA
 +
|http://www.techsec.com/html/Security%20Conference%202014.html
 +
|-
 +
|Mobile Forensics World
 +
|Jun 01-04<br>Myrtle Beach, SC, USA
 +
|http://www.techsec.com/html/MFC-2014-Spring.html
 +
|-
 +
|12th International Conference on Applied Cryptography and Network Security
 +
|Jun 10-13<br>Lausanne, Switzerland
 +
|http://acns2014.epfl.ch/
 +
|-
 +
|2nd ACM Workshop on Information Hiding and Multimedia Security
 +
|Jun 11-13<br>Salzburg, Austria
 +
|http://www.ihmmsec.org/
 +
|-
 +
|54th Conference on Audio Forensics
 +
|Jun 12-14<br>London, England
 +
|http://www.aes.org/conferences/54/
 +
|-
 +
|Cyber and NetCentric Workshop (Requires US Security Clearance)
 +
|Jun 17-19<br>Lincoln Laboratories, Lexington, MA
 +
|https://conferences.ll.mit.edu/cnw/
 +
|-
 +
|2014 USENIX Annual Technical Conference
 +
|Jun 19-20<br>Philadelphia, PA, USA
 +
|https://www.usenix.org/conference/atc14
 +
|-
 +
|26th Annual FIRST Conference: Back to the ‘root’ of Incident Response
 +
|Jun 22-27<br>Boston, MA
 +
|http://www.first.org/conference/2014
 +
|-
 +
|44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks
 +
|Jun 23-26<br>Atlanta, GA, USA
 +
|http://www.dsn.org/
 +
|-
 +
|Symposium On Usable Privacy and Security (SOUPS) 2014
 +
|Jul 09-11<br>Menlo Park, CA, USA
 +
|http://cups.cs.cmu.edu/soups/2014/
 +
|-
 +
|11th Conference on Detection of Intrusions and Malware & Vulnerability Assessment
 +
|July 10-11<br>Egham, UK
 +
|http://dimva2014.isg.rhul.ac.uk/
 +
|-
 +
|Black Hat USA 2014
 +
|Aug 02-07<br>Las Vegas, NV, USA
 +
|https://www.blackhat.com
 +
|-
 +
|DFRWS 2014
 +
|Aug 03-06<br>Denver, CO, USA
 +
|http://dfrws.org/2014/index.shtml
 +
|-
 +
|RCFG GMU 2014
 +
|Aug 04-08<br>Fairfax, VA, USA
 +
|http://www.rcfg.org/gmu/
 +
|-
 +
|23rd USENIX Security Symposium
 +
|Aug 20-22<br>San Diego, CA, USA
 +
|https://www.usenix.org/conferences
 +
|-
 +
|2014 HTCIA International Conference & Training Expo
 +
|Aug 25-27<br>Austin, TX
 +
|http://www.htcia.org/2013/11/2014-htcia-international-conference-training-expo/
 +
|-
 +
|International Conference on Availability, Reliability and Security (ARES)
 +
|Sep 08-12<br>Fribourg, Switzerland
 +
|http://www.ares-conference.eu/conference/
 +
|-
 +
|The New Security Paradigms Workshop (NSPW)
 +
|Sep 15-18<br>Victoria, British Columbia, Canada
 +
|http://www.nspw.org/2014
 +
|-
 +
|6th International Conference on Digital Forensics & Cyber Crime co-hosted with the Systematic Approaches to Digital Forensic Engineering (SADFE)
 +
|Sep 18-20<br>New Haven, CT
 +
|http://d-forensics.org/2014/show/home
 +
|-
 +
|17th International Symposium on Research in Attacks, Intrusions and Defenses (RAID)
 +
|Sep 24-26<br>Gothenburg, Sweden
 +
|http://www.raid2014.eu/
 +
|-
 +
|24th Virus Bulletin International Conference
 +
|Sep 24-26<br>Seattle, WA
 +
|http://www.virusbtn.com/conference/vb2014/index
 +
|-
 +
|25th Annual Conference & Digital Multimedia Evidence Training Symposium
 +
|Oct 06-10<br>Coeur d’Alene, ID, USA
 +
|http://www.leva.org/annual-training-conference/
 +
|-
 +
|5th Annual Open Source Digital Forensics Conference (OSDFCon)
 +
|Nov 05<br>Herndon, VA
 +
|http://www.basistech.com/osdfcon/
 +
|-
 +
|2014 Annual Computer Security Applications Conference (ACSAC)
 +
|Dec 08-12<br>New Orleans, LA
 +
|http://www.acsac.org/
 +
|-
 +
|Eleventh Annual IFIP WG 11.9 International Conference on Digital Forensics
 +
|Jan 26-28<br>Orlando, FL
 +
|http://www.ifip119.org
 +
|-
 +
|67th Annual Scientific Meeting of the American Academy of Forensic Sciences
 +
|Feb 16-25<br>Orlando, FL
 +
|http://www.aafs.org
 
|-
 
|-
| width="60%" style="vertical-align:top" |
 
 
<div style="margin-top:0.5em; padding:0.5em 0.5em 0.5em 0.5em; background-color:#eeeeff; align:right; border:1px solid #ddccff;">
 
 
<h2 style="margin:0; background-color:#ccccff; font-size:120%; font-weight:bold; border:1px solid #afa3bf; text-align:left; color:#000; padding-left:0.4em; padding-top:0.2em; padding-bottom:0.2em;">Topics</h2>
 
 
* '''[[File Analysis]]''':
 
** '''[[:Category:File Formats|File Formats]]''': [[PDF]], [[DOC]], [[DOCX]], [[JPEG]], [[GIF]], [[BMP]], [[LNK]], [[MP3]], [[AAC]], [[Thumbs.db]], ...
 
** '''[[Forensic file formats]]''': [[AFF]], [[gfzip]], [[sgzip]], ...
 
* '''[[File Systems]]''': [[FAT]], [[NTFS]], [[ext2]]/[[ext3]], [[ufs]], [[ffs]], [[reiserfs]], ...
 
** '''[[File Systems#Cryptographic_File_Systems|Cryptographic File Systems]]''': [[File Vault]], [[EFS]], [[CFS]], [[NCryptfs]], [[TCFS]], [[SFS]], ...
 
* '''[[Hardware]]''':
 
** '''[[Bus]]ses''': [[IDE]], [[SCSI]], [[Firewire]], [[USB]], ...
 
** '''[[Data storage media|Media]]''': [[RAM]], [[Hard Drive]]s, [[Memory Card]]s, [[SmartCard]]s, [[RFID]] Tags...
 
** '''[[Personal Digital Devices]]''': [[PDAs]], [[Cellphones]], [[SmartPhones]], [[Audio Devices]], ...
 
** '''[[Other Devices]]''': [[Printers]], [[Scanners]], ...
 
** '''[[Write Blockers]]''': ...
 
* '''Recovering data''': [[Recovering bad data|bad data]], [[Recovering deleted data|deleted data]], [[Recovering Overwritten Data|overwritten data]], [[Sanitization Standards]]
 
* [[Encryption]]
 
* [[GPS]]
 
* [[Forensic_corpora|Forensic Corpora]]
 
* [[Network forensics]]: [[OS fingerprinting]], [[Hidden channels]], [[Proxy server|Proxy servers]]
 
* [[Steganography]], [[Steganalysis]]
 
* '''[[Metadata]]:''' [[MAC times]], [[ACLs]], [[Email Headers]], [[Exif]], [[ID3]], [[OLE-2]], ...
 
* '''[[Legal issues]]:''' [[Caselaw|Case law]]
 
* '''Further information:''' [[Books]], [[Papers]], [[Reports]], [[Journals]], [[Websites]], [[Blogs]], [[Mailing lists]], [[Organizations]], [[Vendors]], [[Conferences]]
 
</div>
 
 
 
 
| width="40%" style="vertical-align:top" |
 
 
<!-- Tools -->
 
<div style="margin-top:0.5em; padding:0.5em 0.5em 0.5em 0.5em; background-color:#e0ffe0; align:right; border:1px solid #ddccff;">
 
 
<h2 style="margin:0; background-color:#ccffcc; font-size:120%; font-weight:bold; border:1px solid #afa3bf; text-align:left; color:#000000; padding-left:0.4em; padding-top:0.2em; padding-bottom:0.2em;">[[Tools]]</h2>
 
 
* '''[[:Category:Disk Imaging|Disk Imaging]]''': [[dd]], [[dc3dd]], [[dcfldd]], [[dd_rescue]], [[sdd]], [[aimage]], [[Blackbag]], ...
 
* '''[[Tools:Data Recovery|Data Recovery]]''': ...
 
* '''[[Tools#Disk_Analysis_Tools|Disk Analysis]]''': [[EnCase]], [[SMART]], [[Sleuthkit]], [[foremost]], [[Scalpel]], [[frag_find]]...
 
* '''[[Tools#Forensics_Live_CDs|Live CDs]]''': [[DEFT Linux]], [[Helix]] ([[Helix3 Pro|Pro]]), [[FCCU Gnu/Linux Boot CD]], [[Knoppix STD]], ...
 
* '''[[Tools:Document Metadata Extraction|Metadata Extraction]]''': [[wvWare]], [[jhead]], [[Hachoir | hachoir-metadata]], [[Photo Investigator]]...
 
* '''[[Tools:File Analysis|File Analysis]]''': [[file]], [[ldd]], [[ltrace]], [[strace]], [[strings]], ...
 
* '''[[Tools:Network_Forensics|Network Forensics]]''': [[Snort]],  [[Wireshark]], [[Kismet]],  [[NetworkMiner]]...
 
* '''[[:Category:Anti-forensics tools|Anti-Forensics]]''': [[Slacker]], [[Timestomp]], [[wipe]], [[shred]], ...
 
* '''[[Tools#Other_Tools|Other Tools]]''': [[biew]], [[hexdump]], ...
 
</div>
 
 
<div style="margin-top:0.5em; padding:0.5em 0.5em 0.5em 0.5em; background-color:#c0ffff; align:right; border:1px solid #ddccff;">
 
 
<h2 style="margin:0; background-color:#99ffff; font-size:120%; font-weight:bold; border:1px solid #afa3bf; text-align:left; color:#000000; padding-left:0.4em; padding-top:0.2em; padding-bottom:0.2em;">[[:Category:Top-Level|Categories]]</h2>
 
 
The contents of this wiki are organized into various [[:Category:Top-Level|categories]]:
 
 
* [[:Category:Tools|Tools]]
 
* [[:Category:Disk file systems|Disk file systems]]
 
* [[:Category:File Formats|File Formats]]
 
* [[:Category:Howtos|Howtos]]
 
* [[:Category:Licenses|Licenses]]
 
* [[:Category:Operating systems|Operating systems]]
 
* [[:Category:People|People]]
 
* [[:Category:Bibliographies|Bibliographies]]
 
 
</div>
 
 
 
 
 
|}
 
|}
  
<div style="margin-top:0.5em; padding:0.5em 0.5em 0.5em 0.5em; background-color:#faf0ff; align:right; border:1px solid #ddccff;">
+
==See Also==
'''You can help!'''  We have a list of [[:Category:Articles_that_need_to_be_expanded|articles that need to be expanded]]. If you know anything about any of these topics, please feel free to chip in.
+
* [[Training Courses and Providers]]
</div>
+
==References==
+
* [http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm Computer Security Conference Ranking and Statistic]
 
+
* [http://www.kdnuggets.com/meetings/ Meetings and Conferences in Data Mining and Discovery]
 
+
* http://www.conferencealerts.com/data.htm Data Mining Conferences World-Wide]
 
+
__NOTOC__
+

Revision as of 07:15, 13 May 2014

PLEASE READ BEFORE YOU EDIT THE LISTS BELOW
When events begin the same day, events of a longer length should be listed first. New postings of events with the same date(s) as other events should be added after events already in the list. Please use three-letter month abbreviations (i.e. Sep, NOT Sept. or September), use two digit dates (i.e. Jan 01 NOT Jan 1), and use date ranges rather than listing every date during an event(i.e. Jan 02-05, NOT Jan 02, 03, 04, 05).
Some events may be limited to Law Enforcement Only or to a specific audience. Such restrictions should be noted when known.

This is a BY DATE listing of upcoming events relevant to digital forensics. It is not an all inclusive list, but includes most well-known activities. Some events may duplicate events on the generic conferences page, but entries in this list have specific dates and locations for the upcoming event.

This listing is divided into three sections (described as follows):

  1. Calls For Papers - Calls for papers for either Journals or for Conferences, relevant to Digital Forensics (Name, Closing Date, URL)

  2. Conferences - Conferences relevant for Digital Forensics (Name, Date, Location, URL)

  3. Training Courses and Providers - Training

Calls For Papers

Please help us keep this up-to-date with deadlines for upcoming conferences that would be appropriate for forensic research.

Title Due Date Notification Date Website
6th International Conference on Digital Forensics & Cyber Crime May 16, 2014 Jul 30, 2014 http://d-forensics.org/2014/show/cf-calls
2014 Annual Computer Security Applications Conference Jun 01, 2014 Aug 15, 2014 http://www.acsac.org/2014/cfp/papers/
Open Source Digital Forensics Conference Jun 01, 2014 http://www.basistech.com/osdfcon/cfp/
67th Annual Scientific Meeting of the American Academy of Forensic Sciences Aug 01, 2014 Nov 01, 2014 http://www.aafs.org
Eleventh Annual IFIP WG 11.9 International Conference on Digital Forensics Oct 01, 2014 Nov 15, 2014 http://www.ifip119.org

See also WikiCFP 'Forensics'

Conferences

Title Date/Location Website
8th International Conference on IT Security Incident Management & IT Forensics May 12-14
Muenster, Germany
http://www1.gi-ev.de/fachbereiche/sicherheit/fg/sidar/imf/imf2014/
2014 IEEE Symposium on Security and Privacy May 16-23
Berkley, CA, USA
http://www.ieee.org/conferences_events/conferences/conferencedetails/index.html?Conf_ID=16517
9th ADFSL Conference on Digital Forensics, Security and Law May 28-29
Richmond, VA
http://www.digitalforensics-conference.org/
Techno-Security and Forensics Conference Jun 01-04
Myrtle Beach, SC, USA
http://www.techsec.com/html/Security%20Conference%202014.html
Mobile Forensics World Jun 01-04
Myrtle Beach, SC, USA
http://www.techsec.com/html/MFC-2014-Spring.html
12th International Conference on Applied Cryptography and Network Security Jun 10-13
Lausanne, Switzerland
http://acns2014.epfl.ch/
2nd ACM Workshop on Information Hiding and Multimedia Security Jun 11-13
Salzburg, Austria
http://www.ihmmsec.org/
54th Conference on Audio Forensics Jun 12-14
London, England
http://www.aes.org/conferences/54/
Cyber and NetCentric Workshop (Requires US Security Clearance) Jun 17-19
Lincoln Laboratories, Lexington, MA
https://conferences.ll.mit.edu/cnw/
2014 USENIX Annual Technical Conference Jun 19-20
Philadelphia, PA, USA
https://www.usenix.org/conference/atc14
26th Annual FIRST Conference: Back to the ‘root’ of Incident Response Jun 22-27
Boston, MA
http://www.first.org/conference/2014
44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Jun 23-26
Atlanta, GA, USA
http://www.dsn.org/
Symposium On Usable Privacy and Security (SOUPS) 2014 Jul 09-11
Menlo Park, CA, USA
http://cups.cs.cmu.edu/soups/2014/
11th Conference on Detection of Intrusions and Malware & Vulnerability Assessment July 10-11
Egham, UK
http://dimva2014.isg.rhul.ac.uk/
Black Hat USA 2014 Aug 02-07
Las Vegas, NV, USA
https://www.blackhat.com
DFRWS 2014 Aug 03-06
Denver, CO, USA
http://dfrws.org/2014/index.shtml
RCFG GMU 2014 Aug 04-08
Fairfax, VA, USA
http://www.rcfg.org/gmu/
23rd USENIX Security Symposium Aug 20-22
San Diego, CA, USA
https://www.usenix.org/conferences
2014 HTCIA International Conference & Training Expo Aug 25-27
Austin, TX
http://www.htcia.org/2013/11/2014-htcia-international-conference-training-expo/
International Conference on Availability, Reliability and Security (ARES) Sep 08-12
Fribourg, Switzerland
http://www.ares-conference.eu/conference/
The New Security Paradigms Workshop (NSPW) Sep 15-18
Victoria, British Columbia, Canada
http://www.nspw.org/2014
6th International Conference on Digital Forensics & Cyber Crime co-hosted with the Systematic Approaches to Digital Forensic Engineering (SADFE) Sep 18-20
New Haven, CT
http://d-forensics.org/2014/show/home
17th International Symposium on Research in Attacks, Intrusions and Defenses (RAID) Sep 24-26
Gothenburg, Sweden
http://www.raid2014.eu/
24th Virus Bulletin International Conference Sep 24-26
Seattle, WA
http://www.virusbtn.com/conference/vb2014/index
25th Annual Conference & Digital Multimedia Evidence Training Symposium Oct 06-10
Coeur d’Alene, ID, USA
http://www.leva.org/annual-training-conference/
5th Annual Open Source Digital Forensics Conference (OSDFCon) Nov 05
Herndon, VA
http://www.basistech.com/osdfcon/
2014 Annual Computer Security Applications Conference (ACSAC) Dec 08-12
New Orleans, LA
http://www.acsac.org/
Eleventh Annual IFIP WG 11.9 International Conference on Digital Forensics Jan 26-28
Orlando, FL
http://www.ifip119.org
67th Annual Scientific Meeting of the American Academy of Forensic Sciences Feb 16-25
Orlando, FL
http://www.aafs.org

See Also

References